Hitron CVE-30360 User Manual

Up to 400mbps
Hide thumbs Also See for CVE-30360:
Table of Contents

Advertisement

VERSION 1.1
AUGUST 2011
DEFAULT LOGIN DETAILS
IP Address
192.168.0.1
Username
admin
Password
password
USER'S GUIDE
CVE-30360

Advertisement

Table of Contents
loading

Summary of Contents for Hitron CVE-30360

  • Page 1 USER’S GUIDE CVE-30360 VERSION 1.1 AUGUST 2011 DEFAULT LOGIN DETAILS IP Address 192.168.0.1 Username admin Password password...
  • Page 3: About This User's Guide

    ABOUT THIS USER’S GUIDE INTENDED AUDIENCE This manual is intended for people who want to configure the CVE-30360’s features via its Graphical User Interface (GUI). HOW TO USE THIS USER’S GUIDE This manual contains information on each the CVE-30360’s GUI screens, and describes how to use its various features.
  • Page 4 Settings in the GUI, then Advanced settings. A key stroke is denoted by square brackets and uppercase text. For example: Press [ENTER] to continue. CUSTOMER SUPPORT For technical assistance or other customer support issues, please consult your Hitron representative. ABOUT THIS USER’S GUIDE...
  • Page 5 This User’s Guide is provided “as is” without express or implied warranty of any kind. Neither Hitron Technologies nor its agents assume any liability for inaccuracies in this User’s Guide, or losses incurred by use or misuse of the information in this User’s Guide.
  • Page 6 HITRON CVE-30360 USER’S GUIDE ABOUT THIS USER’S GUIDE...
  • Page 7: Table Of Contents

    1.2 Hardware Connections ...............16 1.3 LEDs ....................18 1.4 IP Address Setup ................20 1.4.1 Manual IP Address Setup ............21 1.5 Logging into the CVE-30360 ..............22 1.6 GUI Overview ..................23 1.7 Resetting the CVE-30360 ..............23 Cable ....................25 2.1 Cable Overview ..................25 2.1.1 DOCSIS ..................25...
  • Page 8 HITRON CVE-30360 USER’S GUIDE 2.1.6 Routing Mode ................28 2.1.7 Configuration Files ..............29 2.1.8 Downstream and Upstream Transmissions ......29 2.1.9 Cable Frequencies ..............29 2.1.10 Modulation ................29 2.1.11 TDMA, FDMA and SCDMA ............. 30 2.2 The System Info Screen ..............30 2.3 The Initialization Screen ..............
  • Page 9 HITRON CVE-30360 USER’S GUIDE Parental Control ................63 5.1 Parental Control Overview ..............63 5.1.1 Website Blocking ...............63 5.2 The Web Site Blocking Screen ............63 5.3 The Scheduling Screen ..............65 5.4 The Local Logs Screen ..............67 Wireless ................... 69 6.1 Wireless Basics ..................69 6.1.1 Wireless Standards ..............70...
  • Page 10 HITRON CVE-30360 USER’S GUIDE TABLE OF CONTENTS...
  • Page 11: List Of Figures

    LIST OF FIGURES FIGURE 1: Application Overview ................15 FIGURE 2: Hardware Connections ..............17 FIGURE 3: LEDs ....................19 FIGURE 4: Login ....................22 FIGURE 5: GUI Overview ...................23 FIGURE 6: The Cable > System Info Screen .............31 FIGURE 7: The Cable > Initialization Screen .............33 FIGURE 8: The Cable >...
  • Page 12 HITRON CVE-30360 USER’S GUIDE FIGURE 32: The EMTA > DHCP Screen ............89 LIST OF FIGURES...
  • Page 13: List Of Tables

    LIST OF TABLES TABLE 1: Hardware Connections ..............17 TABLE 2: LEDs ....................19 TABLE 3: GUI Overview ..................23 TABLE 4: Private IP Address Ranges ...............26 TABLE 5: IP Address: Decimal and Binary ............27 TABLE 6: Subnet Mask: Decimal and Binary ............27 TABLE 7: The Cable >...
  • Page 14 HITRON CVE-30360 USER’S GUIDE LIST OF TABLES...
  • Page 15: Introduction

    Internet via the cable connection. Computers with a wired connection to the CVE-30360 are on the Local Area Network (LAN), computers with a wireless connection to the CVE-30360 are on the Wireless Local Area Network (WLAN) and the CVE-30360 connects to the service provider over the Wide Area Network (WAN).
  • Page 16: Key Features

    MAC filtering, port forwarding and port triggering, and De-Militarized Zone (DMZ)  Parental control: scheduled website blocking and access logs  Settings backup and restore  Secure configuration interface, accessible by Web browser HARDWARE CONNECTIONS This section describes the CVE-30360’s physical ports and buttons. INTRODUCTION...
  • Page 17: Figure 2: Hardware Connections

    Reset Use this button to reboot or reset your CVE-30360.  Press the button and hold it for less than five seconds to reboot the CVE-30360. The CVE-30360 restarts, using your existing settings.
  • Page 18: Leds

    NEVER use another power adapter with your CVE-30360. Doing so could harm your CVE-30360. ON/OFF Use this button to turn your CVE-30360 on or off.  To turn the CVE-30360 on, press and hold the ON/ OFF button for less than 1 second.
  • Page 19: Figure 3: Leds

    HITRON CVE-30360 USER’S GUIDE FIGURE 3: LEDs TABLE 2: LEDs STATUS DESCRIPTION LINE 1 Your service plan does not include voice service. LINE 2 NOTE: The number of LINE LEDs that light up depends on your voice service plan. Blinking A telephone is connected to the relevant Line port, and is off-hook.
  • Page 20: Ip Address Setup

    USB connection, and the WIRELESS LED lights up once the wireless network is ready. IP ADDRESS SETUP Before you log into the CVE-30360’s GUI, your computer’s IP address must be in the same subnet as the CVE-30360. This allows your computer to communicate with the CVE-30360.
  • Page 21: Manual Ip Address Setup

    If the login screen displays, your computer is already configured correctly.  If the login screen does not display, either the CVE-30360’s DHCP server is not active or your computer is not configured correctly. Follow the procedure in Manual IP Address Setup...
  • Page 22: Logging Into The Cve-30360

    192.168.0.254 (default). In the Subnet mask field, enter 255.255.255.0 (default). NOTE: If your CVE-30360 is not using the default IP address, enter an IP address and subnet mask that places your computer in the same subnet as the CVE- 30360.
  • Page 23: Gui Overview

    RESETTING THE CVE-30360 When you reset the CVE-30360 to its factory defaults, all user-configured settings are lost, and the CVE-30360 is returned to its initial configuration state. There are two ways to reset the CVE-30360:...
  • Page 24 HITRON CVE-30360 USER’S GUIDE  Press the RESET button on the CVE-30360, and hold it in for ten seconds or longer.  Click LAN > Backup. In the screen that displays, click the Factory Reset button. The CVE-30360 turns off and on again, using its factory default settings.
  • Page 25: Cable

    The Data Over Cable Service Interface Specification (DOCSIS) is a telecommunications standard that defines the provision of data services) Internet access) over a traditional cable TV (CATV) network. Your CVE-30360 supports DOCSIS version 3.0. 2.1.2 IP ADDRESSES AND SUBNETS Every computer on the Internet must have a unique Internet Protocol (IP) address.
  • Page 26: Subnets

    Local Area Network (LAN) and Wireless Local Area Network (WLAN), if enabled. You are free to assign IP addresses to computers on the LAN and WLAN manually, or to allow the CVE-30360 to assign them automatically via DHCP (Dynamic Host Configuration Protocol). IANA has reserved the following...
  • Page 27: Dhcp

    By default, the CVE-30360 is a DHCP client on the WAN (the CATV connection). It broadcasts an IP address over the cable network, and receives one from the service provider. By default, the CVE-30360 is a DHCP server on the LAN; it provides IP addresses to computers on the LAN which request them.
  • Page 28: Dhcp Lease

    (or other device). For example, if a single computer has an Ethernet card (to connect to your CVE-30360 via one of the LAN ports) and also has a wireless card (to connect to your CVE-30360 over the wireless interface) the MAC addresses of the two cards will be different.
  • Page 29: Configuration Files

    HITRON CVE-30360 USER’S GUIDE When the CVE-30360 is not in routing mode, the service provider assigns an IP address to each computer connected to the CVE-30360 directly. The CVE-30360 does not perform any routing operations, and traffic flows between the computers and the service provider.
  • Page 30: Tdma, Fdma And Scdma

    SCDMA allows multiple users to share the same frequency channel by assigning a unique orthogonal code to each user. THE SYSTEM INFO SCREEN Use this screen to see general information about your CVE-30360’s hardware, its software, and its connection to the Internet. NOTE: Most of the information that displays in this screen is for troubleshooting purposes only.
  • Page 31: Figure 6: The Cable > System Info Screen

    MAC Address RF MAC Address This displays the Media Access Control (MAC) address of the CVE-30360’s RF module. This is the module that connects to the Internet through the CATV connection. Ethernet MAC This displays the Media Access Control (MAC) address of Address the CVE-30360’s Ethernet module.
  • Page 32: The Initialization Screen

    This screen displays the steps successfully taken to connect to the Internet over the CATV connection. Use this screen for troubleshooting purposes to ensure that the CVE-30360 has successfully connected to the Internet; if an error has occurred you can identify the stage at which the failure occurred.
  • Page 33: The Status Screen

    HITRON CVE-30360 USER’S GUIDE FIGURE 7: The Cable > Initialization Screen For each step:  Process displays when the CVE-30360 is attempting to complete a connection step.  Success displays when the CVE-30360 has completed a connection step. THE STATUS SCREEN Use this screen to discover information about: ...
  • Page 34: Figure 8: The Cable > Status Screen

    Internet over the CATV connection.  Permitted displays if you can access the Internet.  Denied displays if you cannot access the Internet. Downstream NOTE: The downstream signal is the signal transmitted to the CVE-30360. CABLE...
  • Page 35: Table 8: The Cable > Status Screen

    CATV interface. This is the frequency to which the CVE-30360 is locked in; it will only scan for another frequency if this frequency becomes unavailable. If you want the CVE-30360 to attempt to connect at a different frequency, enter it in the field and click Apply. NOTE: Do not change the frequency unless you have a good reason to do so.
  • Page 36: The Password Screen

    This displays the current date and time. THE PASSWORD SCREEN Use this screen to change the password with which you log in to the CVE-30360. NOTE: If you forget your password, you will need to reset the CVE-30360 to its factory defaults.
  • Page 37: Table 9: The Cable > Password Screen

    HITRON CVE-30360 USER’S GUIDE TABLE 9: The Cable > Password Screen (continued) Cancel Click this to return the fields in this screen to their last- saved values without saving your changes. Help Click this to see information about the fields in this screen.
  • Page 38 HITRON CVE-30360 USER’S GUIDE CABLE...
  • Page 39: Lan

    28). The LAN is a separate network from the Wide Area Network (WAN). In the case of the CVE-30360, the WAN refers to all computers and other devices available on the cable (CATV) connection. By default, computers on the WAN cannot identify individual computers on the LAN;...
  • Page 40: Domain Suffix

    Internet even if the IP address of the website’s server has changed. Similarly, the CVE-30360 allows you to define a Domain Suffix to the LAN. When you enter the domain suffix into your browser, you can reach the CVE-30360 no matter what IP address it has on the LAN.
  • Page 41: Figure 10: The Lan > Lan Ip Screen

    CVE-30360 uses to resolve domain names into IP addresses. Private LAN IP Setting IP Address Use this field to define the IP address of the CVE-30360 on the LAN. Subnet Mask Use this field to define the LAN subnet. Use dotted...
  • Page 42: The Switch Setup Screen

    LAN, or if you wish to assign IP addresses to your computers and other network devices manually. Lease Time Use this field to define the time after which the CVE-30360 renews the IP addresses of all the network devices connected to the CVE-30360 on the LAN (when DHCP is enabled).
  • Page 43: The Debug Screen

    CVE-30360 and the connected device in both directions simultaneously.  This displays Half when data can flow inbetween the CVE-30360 and the connected device in only one direction at a time.  Active Select a Port’s checkbox to enable communications between the CVE-30360 and devices connected to the port.
  • Page 44: The Backup Screen

    THE BACKUP SCREEN Use this screen to back up your CVE-30360’s settings to your computer, to load settings from a backup you created earlier, to reboot your CVE-30360, or to return it to its factory default settings. Click LAN > Backup. The following screen displays.
  • Page 45 The following table describes the labels in this screen. TABLE 13: The LAN > Backup Screen Backup/Restore Setting Backup Settings Click this to create a backup of all your CVE-30360’s Locally settings on your computer. Restore Settings Use these fields to return your CVE-30360’s settings to Locally those specified in a backup that you created earlier.
  • Page 46 HITRON CVE-30360 USER’S GUIDE...
  • Page 47: Firewall

    4.1.3 PING The CVE-30360 allows you to use the ping utility on the LAN (in the LAN > Debug screen) and also on the WAN (in the Firewall > Firewall Options screen). For more information, see Debugging (Ping and Traceroute) on page 40.
  • Page 48: Ip Filtering

    HITRON CVE-30360 USER’S GUIDE  Deny the devices on the list access to the CVE-30360 and the network (in which case all other devices can access the network)  Allow the devices on the list to access the network (in which case no other devices can access the network) 4.1.5...
  • Page 49: Dmz

    THE FIREWALL OPTIONS SCREEN Use this screen to turn firewall features on or off, and to configure your network’s Demilitarized Zone (DMZ). You can enable or disable the CVE-30360’s intrusion detection system, and allow or prevent responses to ICMP requests from the WAN.
  • Page 50: The Mac Filtering Screen

    NOTE: To see a list of all the computers connected to the CVE-30360 on the LAN, click the Connected Computers button in the Firewall > IP Filtering, Forwarding, Port Triggering or Firewall Options screens.
  • Page 51: Figure 15: The Firewall > Mac Filtering Screen

    TABLE 15: The Firewall > MAC Filtering Screen MAC Filter Options MAC Filter Options Use this field to control whether the CVE-30360 performs MAC filtering.  Select Allow-All to turn MAC filtering off. All devices may access the CVE-30360 and the network.
  • Page 52 Select Deny to add the device to the Deny Table. Manually-Added LAN Devices Device Name Enter the name to associate with a network device that you want to permit or deny access to the CVE-30360 and the network. NOTE: This name is arbitrary, and does not affect functionality in any way.
  • Page 53: The Ip Filtering Screen

    HITRON CVE-30360 USER’S GUIDE TABLE 15: The Firewall > MAC Filtering Screen (continued) Click this to add the device to the list you specified. Cancel Click this to clear the Manually-Added LAN Devices fields. Apply Click this to save your changes to the fields in this screen.
  • Page 54: Adding Or Editing An Ip Filtering Rule

    HITRON CVE-30360 USER’S GUIDE TABLE 16: The Firewall > IP Filtering Screen (continued) Port Range This displays the start and end values of the ports to which communications from the specified IP addresses is not permitted. Protocol This displays the type of communications that are not permitted: ...
  • Page 55: Figure 17: The Firewall > Ip Filtering > Add/Edit Screen

    Enter the start port number in the first field, and the end port number in the second field. To specify only a single port, enter its number in both fields. Protocol Use this field to specify whether the CVE-30360 should block communication via:  Transmission Control Protocol (TCP) ...
  • Page 56: The Forwarding Screen

    HITRON CVE-30360 USER’S GUIDE TABLE 17: The Firewall > IP Filtering > Add/Edit Screen Cancel Click this to return the fields in this screen to their last- saved values without saving your changes. Help Click this to see information about the fields in this screen.
  • Page 57 WAN.  The Private field displays the port range to which the CVE-30360 forwards traffic to the device on the LAN. Protocol This field displays the protocol or protocols to which this rule applies: ...
  • Page 58: Adding Or Editing A Port Forwarding Rule

    Public Port Range Use these fields to specify the incoming port range. These are the ports on which the CVE-30360 received traffic from the originating host on the WAN. Enter the start port number in the first field, and the end port number in the second field.
  • Page 59: The Port Triggering Screen

    HITRON CVE-30360 USER’S GUIDE TABLE 19: The Firewall > Forwarding > Add/Edit Screen Protocol Use this field to specify whether the CVE-30360 should forward traffic via:  Transmission Control Protocol (TCP)  User Datagram Protocol (UDP)  Transmission Control Protocol and User Datagram Protocol (TCP/UDP) ...
  • Page 60: Figure 20: The Firewall > Port Triggering Screen

    LAN, it automatically opens the Target ports.  The Target field displays the range of triggered ports. These ports are opened automatically when the CVE-30360 detects activity on the Trigger ports from computers on the LAN. Protocol This displays the protocol of the port triggering rule.
  • Page 61: Adding Or Editing A Port Triggering Rule

    HITRON CVE-30360 USER’S GUIDE TABLE 20: The Firewall > Port Triggering Screen Add New Click this to define a new port triggering rule. See Adding or Editing a Port Triggering Rule on page information on the screen that displays. Edit Select a port triggering rule’s radio button (...
  • Page 62 To specify only a single port, enter its number in both fields. Protocol Use this field to specify whether the CVE-30360 should activate this trigger when it detects activity via:  Transmission Control Protocol (TCP) ...
  • Page 63: Parental Control

    PARENTAL CONTROL This chapter describes the screens that display when you click Parent Control in the toolbar. PARENTAL CONTROL OVERVIEW This section describes some of the concepts related to the Parent Control screens. 5.1.1 WEBSITE BLOCKING The Parent Control screens allow you to block access from computers on the LAN to certain websites, or websites whose URLs (website addresses) contain the keywords you specify.
  • Page 64: Figure 22: The Parent Control > Web Site Blocking Screen

    HITRON CVE-30360 USER’S GUIDE FIGURE 22: The Parent Control > Web Site Blocking Screen The following table describes the labels in this screen. TABLE 22: The Parent Control > Web Site Blocking Screen Web Site Blocking Options Enable Web Site Use this field to turn web site blocking on or off.
  • Page 65: The Scheduling Screen

    HITRON CVE-30360 USER’S GUIDE TABLE 22: The Parent Control > Web Site Blocking Screen (continued) Blocked Key Words/ This displays the list of websites and keywords to which URLs users on the LAN are denied access.  Select a URL or keyword and click Remove to delete it from the list.
  • Page 66: Figure 23: The Parent Control > Scheduling Screen

    HITRON CVE-30360 USER’S GUIDE FIGURE 23: The Parent Control > Scheduling Screen The following table describes the labels in this screen. TABLE 23: The Parent Control > Scheduling Screen Days of the Week Select the days of the week on which you want the website blocking filter to be in effect.
  • Page 67: The Local Logs Screen

    HITRON CVE-30360 USER’S GUIDE THE LOCAL LOGS SCREEN Use this screen to see information about events that have triggered the website blocking filter. Click Parent Control > Local Logs. The following screen displays. FIGURE 24: The Parent Control > Local Logs Screen The following table describes the labels in this screen.
  • Page 68 HITRON CVE-30360 USER’S GUIDE PARENTAL CONTROL...
  • Page 69: Wireless

    In the following figure, the wireless network is the part in the circle. The laptop and the PC are called “wireless clients” and connect to the CVE-30360, which is called the “access point” or “AP”. The wireless clients can use the AP to access other devices (such as the printer) or the Internet.
  • Page 70: Wireless Standards

    Wireless clients must know the SSID in order to be able to connect to the AP. You can configure the CVE-30360 to broadcast the SSID (in which case, any client who scans the airwaves can discover the SSID), or to “hide” the SSID (in which case it is not broadcast, and only users who already know the SSID can connect).
  • Page 71: Basic Wireless Security

    CHOOSING A SECURITY METHOD The security method that you choose to use for your wireless network depends upon the security methods supported by the devices on the network (the CVE-30360, your PC, your laptop, and so on). Not all devices support the same security methods, so you must find out what security methods each of the supports, and choose a method that they all support.
  • Page 72: Changing The Wireless Password

    PBC button in their configuration utilities, in addition to or instead of a physical button). Once you have chosen a security method, you can select it on the CVE-30360 in the Wireless > Security screen’s Security Mode field (see The Security Screen page 78).
  • Page 73: Changing The Network Name (Ssid)

    Wireless > Basic screen and click the PIN button. In the screen that displays, enter the WPS PIN that you want to use for the CVE-30360, or the WPS PIN of the client device you want to add to the network.
  • Page 74: Advanced Wireless Networking

    If so, you can change the wireless channel to one that isn’t so congested. To conduct a site audit on the CVE-30360, go to the Wireless > WiFi Site Survey screen. Click Scan. The screen that displays shows the wireless...
  • Page 75: Other Wireless Concepts

    WEP. There are two types of WPA: the “enterprise” version (known simply as WPA) requires the use of a central authentication database server, whereas the “personal” version (supported by the CVE-30360) allows users to authenticate using a “pre-shared key” or password instead.
  • Page 76: Wmm

    6.4.1 THE BASIC SCREEN Use this screen to configure your CVE-30360’s basic wireless settings. You can turn the wireless module on or off, select the wireless mode and channel, run WPS and configure the wireless network’s SSID. Click Wireless > Basic. The following screen displays.
  • Page 77: Figure 27: Wps Pin

    Click the PIN button to begin the PIN configuration process. In the screen that displays, enter the WPS PIN that you want to use for the CVE-30360, or the WPS PIN of the client device you want to add to the network.
  • Page 78: The Security Screen

    HITRON CVE-30360 USER’S GUIDE TABLE 25: The Wireless > Basic Screen (continued) SSID Setting This displays Primary SSID. NOTE: You may have additional BSSIDs, depending on your contract with your service provider. SSID Name Enter the name that you want to use for your wireless network.
  • Page 79: Figure 28: The Wireless > Security Screen

    HITRON CVE-30360 USER’S GUIDE FIGURE 28: The Wireless > Security Screen The following table describes the labels in this screen. TABLE 26: The Wireless > Security Screen Wireless Security SSID Select the SSID for which you want to configure security.
  • Page 80 The CVE-30360 supports up to four WEP keys, of which you can select one as the default. You should input the same four keys, in the same order, in your network’s wireless clients.
  • Page 81 Group Key Update Enter the frequency (in seconds) with which you want Interval the CVE-30360 to create new pre-shared keys, and issue them to the wireless client. Pre-Shared Key Enter the pre-shared key that you want to use for your wireless network.
  • Page 82: The Access Control Screen

    To configure MAC address filtering on the wired LAN, see The MAC Filtering Screen on page 50. You can set the CVE-30360 to allow only certain devices to access the CVE-30360 and the network wirelessly, or to deny certain devices access.
  • Page 83: Table 27: The Wireless > Access Control Screen

    NOTE: This name is arbitrary, and does not affect functionality in any way. MAC Address Specify the MAC address of the network device that you want to permit or deny access to the CVE-30360 and the network wirelessly. WIRELESS...
  • Page 84: The Wifi Site Survey Screen

    This field displays the type of security that the target wireless network is using. Signal (%) This field displays the signal strength of the target wireless network, as received by the CVE-30360, as a percentage fro 0 (no reception) to 100 (perfect reception) W-mode This field displays the wireless network standard (for instance, 11n) that the target wireless network is using.
  • Page 85: Table 28: The Wireless > Wifi Site Survey Screen

    HITRON CVE-30360 USER’S GUIDE TABLE 28: The Wireless > WiFi Site Survey Screen (continued) ExtCH For IEEE 802.11n networks that support 40MHz wireless transmissions, this field displays whether the network uses channel bonding, and specifies whether the extension channel is above or below the primary control channel.
  • Page 86 HITRON CVE-30360 USER’S GUIDE WIRELESS...
  • Page 87: Emta

    EMTA This chapter describes the screens that display when you click EMTA in the toolbar. These screens display information about the CVE-30360’s embedded Multimedia Terminal Adapter module. NOTE: The fields in these screens are read-only, and are provided for troubleshooting purposes only.
  • Page 88: The Dhcp Screen

    This field displays the status of the remote telephony TFTP server. Telephony Call This field displays the status of the connection between Server Registration each of the CVE-30360’s phone lines and the remote call server. Telephony This field displays the overall status of voice call Registration registration.
  • Page 89 HITRON CVE-30360 USER’S GUIDE FIGURE 32: The EMTA > DHCP Screen The following table describes the labels in this screen. TABLE 30: The EMTA > DHCP Screen Address Information MTA MAC Address This field displays the Media Access Control (MAC) address of the Media Terminal Adapter (MTA) module.
  • Page 90 HITRON CVE-30360 USER’S GUIDE TABLE 30: The EMTA > DHCP Screen (continued) Lease Time This displays the amount of time for which the MTA Remaining module’s current DHCP lease is valid. Rebind Time This displays the amount of time until the MTA module...
  • Page 91: Troubleshooting

    Use this section to solve common problems with the CVE-30360 and your network. Problem: None of the LEDs Turn On The CVE-30360 is not receiving power, or there is a fault with the device. Ensure that you are using the correct power adaptor. ...
  • Page 92 (see LEDs on page 18). Make sure that your computer is on the same subnet as the CVE-30360; see Address Setup on page 20. If you are attempting to connect over the wireless network, there may be a problem with the wireless connection.
  • Page 93 Bear in mind that physical obstructions (walls, floors, trees, etc.) and electrical interference (other radio transmitters, microwave ovens, etc) reduce your CVE- 30360’s signal quality and coverage area. Ensure that the CVE-30360 and the wireless client are set to use the same wireless mode and SSID (see The Basic Screen...
  • Page 94 HITRON CVE-30360 USER’S GUIDE FCC Statement <Part 15B 15.105>This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
  • Page 95: Index

    HITRON CVE-30360 USER’S GUIDE INDEX Numbers cable connection status cable modem 16, 25, 26 CATV cipher type 16, 70, 77 802.11b/g/n configuration file connection process connection status, cable conventions, document customer support access control access logs access point accounts, login...
  • Page 96 HITRON CVE-30360 USER’S GUIDE eMTA IANA ICMP 16, 70 Ethernet IEEE 802.11b/g/n Ethernet cables interface, user 16, 47, 49 Ethernet port intrusion detection 20, 21, 25, 39, 92 IP address IP address lease IP address renewal 20, 21 IP address setup...
  • Page 97 HITRON CVE-30360 USER’S GUIDE PBC configuration 16, 75 PIN configuration 16, 40, 43, 47, 49 ping 16, 48, 56 port forwarding MAC address 16, 59 port triggering MAC address filtering port, Ethernet 16, 47, 50 MAC filtering ports main window...
  • Page 98 HITRON CVE-30360 USER’S GUIDE SCDMA voice-enabled cable modem scheduled website blocking VoIP (Voice over IP) scheduling 78, 79 security security, wireless service set settings backup and restore shared key authentication 70, 76 SSID Status 15, 26 status WAN connection status, cable connection...

Table of Contents