Advertisement

Quick Links

Banister, Valerie
Setup and User Guide
[Type the abstract of the document here. The abstract is typically a short summary of the contents of
the document.]
T G 5 9 0

Advertisement

Table of Contents
loading

Summary of Contents for Technicolor TG590

  • Page 1 Banister, Valerie Setup and User Guide [Type the abstract of the document here. The abstract is typically a short summary of the contents of the document.] T G 5 9 0...
  • Page 2 Distribution and copying of this document, use and communication of its contents is not permitted without written authorization from Technicolor. The content of this document is furnished for informational use only, may be subject to change without notice, and should not be construed as a commitment by Technicolor.
  • Page 3: Product Overview

    The TG590 uses Auto-Sensing to automatically determine the current WAN connection. This makes the TG590 the ideal solution for home and Small Office/Home Office (SOHO) users who not only want speed, but also the flexibility to handle their complex networking needs.
  • Page 4: Table Of Contents

    TABLE OF CONTENTS Introduction Contents / Accessories Minimum System Requirements Features Getting to Know the TG590 TG590 Setup Introduction Setting Up the TG590 Network Configuration Configuring the TG590 Features Main Screen Setting Up a Wireless Network Introduction Overview Connecting a Wireless Device...
  • Page 5 Using Network Connections Introduction Accessing Network Connections Network (Home/Office) Connection Ethernet Connection Wireless Access Point Connection Coax Connection Broadband Ethernet Connection Broadband Coax Connection Configuring Security Introduction Overview Firewall Access Control Port Forwarding DMZ Host Port Triggering Remote Administration Static NAT Advanced Filtering 6.10 Security Log...
  • Page 6 Configuring Advanced Settings Introduction Using Advanced Settings Utilities DNS Settings Network Settings Configuration Settings Time Settings Firmware Upgrade (Future Release) Routing Settings Monitoring the TG590 Introduction Router Status Advanced Status Troubleshooting 10.0 Introduction 10.1 Troubleshooting Tips 10.2 Frequently Asked Questions...
  • Page 7: Introduction

    In a few minutes, you will establish an Internet connection and create a network (home/office) for data and media sharing between multiple devices using the Universal Plug-and-Play support built-in to the TG590. In this chapter, we will take a closer look at following features:...
  • Page 8: Contents / Accessories

    White (RJ-45; If one of these items is missing, please call the Help Desk at 800-837-4966. Safety Instruction Please read “Safety Instructions and Regulatory Notices” before you start with the installation of the TG590. Minimum System Requirements Applicability The TG590 must be used with the following systems and software: Computer with Ethernet or Wi-Fi capability •...
  • Page 9: Features

    Features Once the installation of your TG590 is completed you will be able to benefit from all the services offered. This Setup and User Guide will focus on the following features: Multiple networking standards support, including: MoCA 1.1 for WAN and LAN •...
  • Page 10 Other options, including: DHCP server option • DHCP server/PPPoE server auto-detection • DNS server • LAN IP and WAN IP address selection • MAC address cloning • Port forwarding • PPPoE support • QoS support (end to end layer 2/3) featuring Diffserv, 802.1p/q prioritization, configurable •...
  • Page 11: Getting To Know The Tg590

    This section introduces you to the different components of the TG590. On the top panel of your TG590, you can find a number of status LEDs, indicating the state of the device. The LEDs that are supported on the top panel are: Power •...
  • Page 12 Connected to the Internet, activity. Internet Amber Solid Failed to connect to the Internet. The TG590 is either powered off or starting up. Solid Failed to connect to the Internet. Green The TG590 is either powered off or starting up.
  • Page 13 The reset process will start about ten seconds after releasing the button. When the TG590 Router resets, all the lights on the front panel turn off, and then some of the lights start flashing. The TG590 Router has completed its reset process when the Power light glows steadily green.
  • Page 14: Tg590 Setup

    Connecting the TG590 Configuring the Network Configuring the TG590 Features Main Screen Feature availability Depending on the configuration offered by your service provider, some features may not be available on your TG590. For more information, please contact your service provider.
  • Page 15 Connecting the TG590 Please refer to Quick Installation Guide.
  • Page 16: Setting Up The Tg590

    1. Unpack the TG590 and black Power cord from the box. Make sure the power button is off. 2. Plug the black power cord in the black port on the back of the TG590; and then, into a power outlet.
  • Page 17 The reset process will start about ten seconds after releasing the button. When the TG590 resets, all the lights on the front panel turn off, and then some of the lights start flashing. The TG590 has completed its reset process when the Power light glows steadily green.
  • Page 18 USB host functionality will be available for devices such as external storage and cameras. Wireless Antenna (Built-in) The TG590’s wireless antenna is built-in and used to transmit a wireless signal to other wireless devices on its wireless network.
  • Page 19: Network Configuration

    Each network interface on the computer should either be configured with a statically defined IP address and DNS address, or instructed to automatically obtain an IP address using the DHCP server. The TG590 is set up, by default, with an active DHCP server, and we recommend leaving this setting as is.
  • Page 20 Windows NT 1. Click Network in the Control Panel. The “Network” window appears. 2. In the “Protocol” tab, select Internet Protocol (TCP/IP), then click Properties. 3. In the “IP Address” tab, click the “Obtain an IP address automatically” radio button. 4.
  • Page 21: Configuring The Tg590

    Write the password down on a piece of paper and keep it in a safe place, since it will be needed to access the TG590 ’s GUI (Graphical User Interface) in the future.
  • Page 22 Connect the coax to the set top Power up the set top box. Make sure the Coax LAN light on the front of the TG590 glows steadily green. This may take a few minutes. When it does, the set top box is connected to the TG590 Note: The LED may be green from another set top.
  • Page 23: Main Screen

    Main Screen After logging into the TG590’s GUI (see “Configuring the TG590” at the beginning of this chapter), the “Main” screen appears. The Main screen has a menu occupying the top of the screen with the following: Wireless Settings, My Network, Firewall Settings, Parental Control, Advanced, and System Monitoring.
  • Page 24 This section displays the status of the TG590’s network and Internet connection. A green light signifies the TG590 is connected; a yellow light means the TG590 is attempting to connect; and a red light signifies the TG590 ’s connection is down.
  • Page 25: Overview

    With the built-in wireless access point you no longer need a cable connection between your computer and your TG590. Wireless networking allows you to connect two or more devices without the wires, making your devices more accessible and simple to use. This chapter explains how to create a wireless network using the TG590, including accessing and configuring wireless security options.
  • Page 26: Connecting A Wireless Client

    TG590 ’s case) in the appropriate text box or field (this varies depending on the wireless client’s manufacturer). 2. Enter the TG590’s WPA2 key (also found on the sticker on the bottom of the TG590’s case) in the wireless client’s configuration interface.
  • Page 27: Wireless Status

    32 characters. Make sure the SSID is the same for all devices to be connected to the wireless network. The TG590 comes from the factory with an SSID already entered and displayed. The default SSID can also be found on a sticker on the bottom of the TG590.
  • Page 28 Displays what kind of security is active on the wireless connection, and the security encryption key. 3.3e SSID Broadcast Displays whether the TG590 is broadcasting its SSID. If activated, the SSID of the TG590’s wireless network is broadcast wirelessly. 3.3f...
  • Page 29: Basic Security Settings

    5) Write down or print the screen displaying the wireless settings on the screen. Other wireless devices wishing to join the TG590 ’s wireless network must use these same settings to access the TG590 network. 6) Click Apply to save the settings.
  • Page 30: Accessing My Network Settings

    In this chapter, we will take a closer look at following features: Topic Page Accessing My Network Settings Network Status Network Connections Feature availability Depending on the configuration offered by your service provider, some features may not be available on your TG590. For more information, please contact your service provider.
  • Page 32 Wireless Access Point Connection Coax Connection Broadband Ethernet Connection Broadband Coax Connection Feature availability Depending on the configuration offered by your service provider, some features may not be available on your TG590. For more information, please contact your service provider.
  • Page 33: Accessing Network Connections

    The settings covered in this chapter should be configured by experienced network technicians only. To access the TG590’s network connections, in the “My Network” screen: Click Network Connections from the menu on the left side. The “Network Connections” screen appears.
  • Page 34: Network (Home/Office) Connection

    The remainder of this chapter describes the various network connections available on the TG590. Network (Home/Office) Connection Select Network (Home/Office) in the Network Connections screen to generate the “Network (Home/Office) Properties” screen. This screen displays a list of the local network’s properties. The only modifications that can be made from this screen are disabling the connection (by clicking Disable) or renaming the connection (by entering a new name in the “Rule Name”...
  • Page 35 1. Select DHCP Server. 2. Enter the IP address at which the TG590 Router starts issuing addresses in the “Start IP Address” text boxes. Since the TG590 Router’s default IP address is 192.168.1.1, the Start IP Address should be 192.168.1.2.
  • Page 36: Ethernet Connection

    DHCP Relay Select this option to have the TG590 Router function as a DHCP relay, and enter the IP address in the screen that appears.
  • Page 37 Note: If disabling the connection, the TG590 Router must be rebooted for the change to take effect. 5.3a Configuring the Ethernet Connection Click Settings at the bottom-right of the Ethernet Properties screen to generate the “Configure Ethernet” screen. General The top part of the Configure Ethernet screen displays general communication parameters. We recommend not changing the default values in this section unless familiar with networking concepts.
  • Page 38: Coax Connection

    (by clicking Disable) or renaming the connection (by entering a new name in the “Name” text box). Note: If disabling the connection, the TG590 Router must be rebooted for the change to take effect. 5.4a Configure Coax Click Settings at the bottom-right of the Coax Properties screen generates the “Configure Coax”...
  • Page 39: Broadband Ethernet Connection

    Coax Link Ethernet connection. Coax Connection Status Click Go to LAN Coax Stats to generate the “Coax Connection Status” screen, which gives an overview of all the devices connected to the TG590 Router via coaxial cable. Broadband Ethernet Connection A Broadband Ethernet connection connects the TG590 Router to the Internet using an Ethernet cable.
  • Page 40 The “IP Address Distribution” section of the Configure Broadband Connection (Ethernet) screen is used to configure the TG590 Router’s Dynamic Host Configuration Protocol (DHCP) server parameters. DHCP automatically assigns IP addresses to network devices. If enabled, make sure to configure the network devices as “DHCP Clients.”...
  • Page 41 Apply. DHCP Relay Select this option to have the TG590 Router function as a DHCP relay. To enter a new IP address for the relay, click New IP Address. The “DHCP Relay Server Address” screen appears. Enter the new IP address in the appropriate text boxes, then click Apply.
  • Page 42 1) Select Advanced from the Routing drop-down menu. 2) Enter a device metric in the “Device Metric” text box. The device metric is a value used by the TG590 Router to determine whether one route is superior to another, considering parameters such as bandwidth and delay time.
  • Page 43: Coax Broadband Connection

    Coax Broadband Connection A Coax Broadband connection connects the TG590 Router to the Internet using a coaxial cable. Click Broadband Connection (Coax) in the Network Connections screen to generate the “Broadband Connection (Coax) Properties” screen. This screen displays a list of the connection’s properties. The only modifications that can be made from this screen are disabling the connection (by clicking Disable) or renaming the connection (by entering a new name in the “Name”...
  • Page 44 CM Ratio Select the CM Ratio from the drop-down menu here. WAN Coax Connection Speeds This section displays the TG590 Router’s Tx and Rx speeds (in Mbps). Internet Protocol This section includes three options: No IP Address, Obtain an IP Address Automatically, and Use the Following IP Address.
  • Page 45 DHCP Relay Select this option to have the TG590 Router function as a DHCP relay, and enter the IP address in...
  • Page 47 Routing The TG590 can be configured to use dynamic routing. Dynamic routing automatically adjusts how packets travel on the network. There are two options in the “Routing” section of the Configure Broadband Connection (Coax) screen:...
  • Page 48 1. Select Advanced from the Routing drop-down list. 2. Enter a device metric in the “Device Metric” text box. The device metric is a value used by the TG590 Router to determine whether one route is superior to another, considering parameters such as bandwidth and delay time.
  • Page 49 WAN PPPoE Connection WAN Point-to-Point Protocol over Ethernet (PPPoE) relies on two widely accepted standards: Point-to-Point Protocol and Ethernet. PPPoE enables Ethernet networked computers to exchange information with computers on the Internet. PPPoE supports the protocol layers and authentication widely used in PPP and enables a point-to-point connection to be established in the normally multipoint architecture of Ethernet.
  • Page 50 Protocol (PAP), Challenge Handshake Authentication Protocol (CHAP), and Microsoft CHAP versions 1 and 2. Select the authentication protocols the TG590 Router may use when negotiating with a PPTP server in this section. Select all the protocols if no information is available about the server’s authentication methods. Note that encryption is performed only if Microsoft CHAP, Microsoft CHAP version 2, or both are selected.
  • Page 51 “Override Subnet Mask” and entering a different subnet mask. Use the Following IP Address Select this option to configure the TG590 to use a permanent (static) IP address. The ISP should provide this address.
  • Page 52 Default Route Click in this check box to make the connection the default route. Multicast - IGMP Proxy Default Click in this check box to enable the TG590 to issue IGMP (Internet Group Management Protocol) host messages on behalf of hosts the TG590 Router discovers through standard IGMP interfaces.
  • Page 53 Routing Table Clicking New Route generates the “New Route” screen, where a new route can be configured. Internet Connection Firewall Click in the “Enabled” check box to activate the TG590 Router’s firewall on the WAN PPPoE connection.
  • Page 54 DMZ Host Port Triggering Static NAT (Future Release) Advanced Filtering Security Log Feature availability Depending on the configuration offered by your service provider, some features may not be available on your TG590. For more information, please contact your service provider.
  • Page 55: Firewall

    Firewall The firewall is the foundation of the TG590 ’s security suite, and it has been tailor-made to meet the need of the residential/office network user and is configured to give the best protection and flexibility to users using interactive applications, such as Internet gaming and video conferencing.
  • Page 56 To configure the TG590’ s firewall security settings: 1. From the General screen, select a security level by clicking the appropriate radio button. Using the Minimum Security setting may expose the local network to significant security risks, and thus should only be used for short periods of time.
  • Page 57: Access Control

    Access Control Access control is used to block specific computers within the local network (or even the whole network) from accessing certain services on the Internet. For example, one computer can be prohibited from surfing the Internet, another computer from transferring files using FTP, and the whole network from receiving incoming email.
  • Page 58 3. If this access control rule applies to all networked devices, select Any from the “Networked Computer/Device” list box. If this rule applies to certain devices only, select User Defined and click Add. Then, create and add a network object (for more details about adding network objects, see the “Advanced Connection”...
  • Page 59: Port Forwarding

    Port Forwarding In its default state, the TG590 blocks all external users from connecting to or communicating with the network, making it safe from hackers who may try to intrude on the network and damage it. However, the network can be exposed to the Internet in certain limited and controlled ways to enable some applications to work from the local network (game, voice, and chat applications, for example) and to enable Internet access to servers in the network.
  • Page 60: Dmz Host

    network). DMZ Host The DMZ (De-Militarized Zone) host feature allows one device on the network to operate outside the firewall. Designate a DMZ host: To use an Internet service, such as an online game or video-conferencing program, not present in the •...
  • Page 61 2. Click in the “DMZ Host IP Address” check box, then enter the IP address of the computer to be designated as a DMZ host. Note: Only one network computer can be a DMZ host at any time. 3. Click Apply. Note: to disable the DMZ Host, Click in the “DMZ Host IP Address”...
  • Page 62: Port Triggering

    • The firewall blocks inbound traffic by default. The server replies to the TG590’s IP, and the connection is not sent back to the host, since it is not • part of a session.
  • Page 63 Triggering screen as an active protocol. 4. If User Defined is selected in step 2, the “Edit Port Triggering Rule” screen appears. Enter a service name in the appropriate text box, then configure its inbound and outbound trigger ports by clicking the appropriate links..
  • Page 64: Advanced Filtering

    Advanced Filtering Advanced filtering is designed to allow comprehensive control over the firewall’s behavior. Specific input and output rules can be defined, the order of logically similar sets of rules controlled, and distinctions made between rules that apply to Internet and rules that apply to local network devices. To access, select Advanced Filtering from any Security screen.
  • Page 65: Security Log

    To access the security log, select Security Log from any Security screen. The “Security Log” screen appears. 6.6a Time The time (based on the TG590’s date and time settings) the event occurred. 6.6b Event There are three kinds of events listed in the system log: Firewall Info, Firewall Setup, and System Log.
  • Page 66 6.6e Security Log Settings To view or change the security log settings: 1. Click Settings in the Security Log screen. The “Security Log Settings” screen appears. 2. Select the type of activities that will generate a log message: Accepted Incoming Connections - activating this check box generates a log message for each successful attempt to establish an inbound connection to the local network.
  • Page 67 6.6a Inbound/Outbound Packets - Rule Sets There are numerous rules automatically inserted by the firewall to provide improved security and block harmful attacks. These pre-populated rules displayed are required for operation on the Verizon Network. To configure advanced filtering rules, click Add next to the rule title. The “Add Advanced Filter” screen appears.
  • Page 68 Accept Packet - Allow access to packets that match the source and destination IP addresses and protocol ports defined in upper section of the screen. The data transfer session will not be handled using Stateful Packet Inspection (SPI), so other packets that match this rule will not be automatically allowed access. This setting is useful when creating rules that allow broadcasting.
  • Page 69: Parental Control

    In this chapter, we will take a closer look at following features: Topic Page Setting the Parental Controls Rule Summary Parental Control Log Feature availability Depending on the configuration offered by your service provider, some features may not be available on your TG590. For more information, please contact your service provider.
  • Page 71 Setting the Parental Controls To create a basic access policy for a computer on the TG590’s network, click Parental Control from the top of the Home screen and follow these instructions: 1. The “Parental Control” screen appears. From the “Networked Computer/Device” list box, select a computer/device, and then click Add.
  • Page 72 4. If needed, you can create a schedule for when you want the rule to be active, or inactive. In the “Create Schedule” section, select the affected days. 5. Select whether the rule will be active or inactive during the schedule you created by clicking the radio button next to the appropriate option.
  • Page 73: Rule Summary

    Clicking Rule Summary from the menu on the left side generates the “Rule Summary” screen. The Rule Summary screen displays a list of all rules created for the TG590. Additionally, the rule can be viewed by clicking the magnifying glass in the “View Rule” column, or edited by clicking on the icon in the...
  • Page 74 Parental Control Log Clicking Parental Control Log from the menu on the left side generates the “Parental Control Log” screen. The Parental Control Log screen displays a list of all events/sites visited or attempted. Additionally, the log can be filtered by the “Date/Time”. A log can also be saved, refreshed to view recent activity, or cleared.
  • Page 75 DNS Settings Network Settings Configuration Settings Time Settings Firmware Upgrade Routing Settings Feature availability Depending on the configuration offered by your service provider, some features may not be available on your TG590. For more information, please contact your service provider.
  • Page 76: Using Advanced Settings

    Using Advanced Settings To access the TG590’s Advanced Settings, click Advanced at the top of the Home screen. Click “Yes” in the “Warning” screen, and the “Advanced” screen appears.
  • Page 77 The following settings are explained in this chapter: Diagnostics - perform diagnostic tests on the TG590 • Restore Defaults - reset the TG590 to its default settings • Reboot Router - restart the TG590 • MAC Cloning - clone MAC addresses •...
  • Page 78 • • IGMP Proxy - ? • Port Forwarding Rules - configure the TG590’s ports Date and Time - configure the TG590 ’s clock and calendar • • Scheduler Rules - schedule firewall activation Routing - manage routing policies •...
  • Page 79: Utilities

    Utilities The first collection of Advanced Connection (beneath the Toolbox icon) is the Utilities. 8.2a Diagnostics The Diagnostics screen can assist in testing network connectivity. This feature pings (ICMP echo) an IP address and displays the results, such as the number of packets transmitted and received, round trip time, and success status.
  • Page 80 8.2b Restore Defaults If the TG590’s factory default settings need to be restored (to build a new network from the beginning, for example), use the following procedure: 1. Click Restore Defaults in the Advanced screen. The “Attention” screen appears. 2. If needed, click Save Configuration File to save the TG590’s current configuration to a file. The TG590’s current settings can then be reapplied after restoring default settings (see “Configuration...
  • Page 81 2. The “Reboot Router” screen appears. 2. Click OK to restart the TG590. This may take up to two minutes. Note: To access the TG590’s GUI after restarting the TG590, click the web browser’s “Refresh” button, then log in using the...
  • Page 82 3. Enter the MAC address to be cloned in the “To Physical Address” text boxes. 4. Click Clone My MAC Address to capture the MAC address of the computer currently accessing the TG590’s GUI. The TG590 will now have the new MAC address.
  • Page 83 8.2e ARP (Address Resolution Protocol) Table Clicking ARP Table in the Advanced screen generates the “ARP Table” screen. This screen displays the IP and MAC addresses of each DHCP connection. 8.2f Users To manage individual users: 1. Click Users in the Advanced screen, which generates the “Users” screen.
  • Page 84 2. Click New User, which generates the “User Settings” screen. 3. When adding a user, specify the following parameters: User Name - The name a remote user will use to access the home or office network. This entry is case- •...
  • Page 85 Note: Changing any of the user parameters will prompt the connection associated with the user to terminate. For changes to take effect, activate the connection manually after modifying user parameters.
  • Page 86 8.2g Quality of Service The TG590’s QoS (Quality of Service) capabilities are covered in detail in appendix A of this manual.
  • Page 87 8.2h Local Administration Clicking Local Administration in the Advanced screen generates the “Local Administration” screen. This screen allows the user to grant local Telnet access using a particular Telnet port. To use, select a Telnet port by clicking in the appropriate check box, then click Apply.
  • Page 88: Dns Settings

    DNS Settings The second section of the Advanced window is the DNS (Domain Name System) settings section, which includes “Dynamic DNS” and “DNS Server.” 8.3a Dynamic DNS Dynamic DNS creates a dynamic IP address to be aliased to a static hostname, allowing a computer on the network to be more easily accessible from the Internet.
  • Page 89 Setting up Dynamic DNS To set up Dynamic DNS on the TG590, click Dynamic DNS in the Advanced screen. When the “Dynamic DNS” screen appears, click New Dynamic DNS Entry. Another Dynamic DNS screen appears.
  • Page 90 Connection: Select the connection with which to couple the Dynamic DNS service. Options include Broadband • Connection (Ethernet), Broadband Connection (Coax) • Provider: Select the TG590’s Dynamic DNS account provider from the drop-down list. • User Name: Enter the Dynamic DNS user name in this text box.
  • Page 91 Offline: Disable the Dynamic DNS feature by clicking this check box. This feature is available only to users who • have purchased some type of upgrade credit from the Dynamic DNS provider. Note: Changing the redirection URL can only be performed via the Dynamic DNS provider’s website. SL Mode If the Dynamic DNS service chosen supports SSL, select the SSL mode from the drop-down menu (options: None, Chain, Direct).
  • Page 92 The Domain Name System (DNS) translates domain names into IP addresses and vice versa. The TG590 ’s DNS server is an auto-learning DNS, which means that when a new computer is connected to the network, the DNS server learns its name and automatically adds it to the DNS table. Other network users can immediately communicate with this computer using either its name or its IP address.
  • Page 93 To add a new entry to the list: Click Add DNS Entry in the DNS Server screen. The “DNS Entry” screen appears. 2. Enter the computer’s host name in the “Host Name” text box. 3. Enter the computer’s IP address in the “IP Address” text boxes. 4.
  • Page 94: Network Settings

    8.4a Network Objects A network object is used to define a part of the TG590’s network (a group of computers, for example) by MAC addresses, IP addresses, and/or host names. The defined part becomes a “network object,” and settings, such as configuring system rules, can be applied to all the devices defined as part of the network object at once.
  • Page 95 Click Add. The “Edit Network Object” screen appears. Specify a name for the network object in the “Description” text box. Click Add. The “Edit Item” screen appears. Select the type of network object type from the “Network Object Type” list box. Options include IP address, IP Subnet, IP Range, MAC Address, Host Name, and DHCP Option.
  • Page 96 8.4c Protocols Protocols feature a list of preset and user-defined applications and common port settings. Protocols can be used in various security features, such as Access Control and Port Forwarding. New protocols can be added to support new applications or existing ones can be edited when needed. To define a protocol: 1.
  • Page 97 2. Click Add at the bottom of the screen. The “Edit Service” screen appears. 3. Name the service in the “Service Name” text box and, if needed, enter a description of the service in the “Service Description” text box, then click Add Service Ports. The “Edit Service Server Ports” screen appears.
  • Page 98: Configuration Settings

    Configuration Settings This section includes settings that affect the TG590’s configuration.
  • Page 99: A Configuration File

    8.5a Configuration File Use the TG590’s Configuration File feature to view, save, and load configuration files, which are used to backup and restore the TG590 ’s current configuration. To do this: 1. Click Configuration File in the Advanced screen. The “Configuration File” screen appears.
  • Page 100 8.5b System Settings Clicking System Settings in the Advanced screen generates the “System Settings” screen, where various system and management parameters can be configured.
  • Page 101 Session Lifetime - After the TG590 has been inactive for a period of time, the user must reenter a user name and password to continue accessing the GUI. To change the length of this time period, enter the amount of time (in seconds) in the “Session Lifetime”...
  • Page 102 Primary/secondary Telnet ports Secure Telnet over SSL ports Management Application SSL Authentication Options This section allows the user to access the TG590’s GUI through a browser or Telnet as a secure socket layer (SSL) session. System Logging Use this section to configure the following system log options.
  • Page 103 Security Logging Use this section to configure the following security log options. Low Capacity Notification Enabled - Click in this check box to activate low capacity notification (works in tandem with “Allowed Capacity Before Email Notification” and “Security Log Buffer Size” options). Allowed Capacity Before Email Notification - Enter the percentage of security log buffer capacity reached to trigger an email notification.
  • Page 104 Port Configuration Port configuration allows the user to set up the TG590 ’s Ethernet ports as either full- or half-duplex ports, at either 10 Mbps, 100 Mbps, or 1 Gbps. Selecting the “Auto” option causes the port to negotiate the speed and...
  • Page 105: Time Settings

    Time Settings The Time settings section of the Advanced window features utilities that involve times, dates and schedules. 8.6a Date and Time To configure date and time, do the following: 1) Click Date and Time on the Advanced screen. The “Date and Time” screen appears.
  • Page 106 2) Select the local time zone from the drop-down list. The TG590 can automatically detect daylight saving setting for selected time zones. If the Daylight Saving Time setting for a time zone is not automatically detected, the following two fields will be displayed: Enabled - Select this check box to enable daylight saving time.
  • Page 107 Scheduler rules are used for limiting the activation of firewall rules to specific time periods, either for days of the week, or for hours of each day. To define a rule: Make sure the TG590’s date and time are set correctly. To do this, see the “Date and Time” section in this chapter.
  • Page 108 8. If applicable, click New Hours Range Entry to define an active/inactive hourly range. The “Edit Hour Range” screen appears. Enter a start and end time in the appropriate text boxes. Note: Make sure the TG590 ’s date and time settings are properly configured for the time zone. 9. Click Apply.
  • Page 109 Clock Set Click on this link from the Date and Time screen to set the TG590 ’s time and date. The Local Date can be set by using the drop-down list; and the Local Time can be manually entered into the text boxes. Then, click on Apply.
  • Page 110 8.8a Routing Access the routing table rules by clicking Routing in the Advanced screen. The “Routing” screen appears. Routing rules can be added, edited, or deleted from the Routing screen. To add a , click New Route. The “Route Settings” screen appears. When adding a routing rule, the following parameters must be specified: Route Name - Select the type of network from the drop-down list.
  • Page 111 IGMP (Internet Group Management Protocol) Multicasting The TG590 provides support for IGMP multicasting, which allows hosts connected to a network to be updated whenever an important change occurs in the network. A multicast is simply a message that is sent simultaneously to a pre-defined group of recipients.
  • Page 112 8.8b IP Address Distribution The TG590’s DHCP server makes it possible to easily add computers configured as DHCP clients to the network. It provides a mechanism for allocating IP addresses to these hosts and for delivering network configuration parameters to them.
  • Page 113 To view a summary of the services currently being provided by the DHCP server, click IP Address Distribution in the Advanced screen. The “IP Address Distribution” screen appears.
  • Page 114 Editing DHCP Server Settings To edit the DHCP server settings for a device: 1. Click the appropriate icon in the “Action” column. The “DHCP Settings” screen for the device appears. 2. Select the “IP Address Distribution” from the drop-down list. Options include DHCP Server, DHCP Relay, or Disable.
  • Page 115 This feature ensures that IP addresses not in use will become available for other computers on the network. Provide host name if not specified by client - when activated, the TG590 assigns the client a default •...
  • Page 116 To define a new connection with a fixed IP address: 1. Click New Static Connection in the DHCP Connections screen. The “DHCP Connection Settings” screen appears. 2. Enter a host name for this connection. 3. Enter the fixed IP address to assign to the computer. 4.
  • Page 117 In this chapter, we will take a closer look at suggested solutions for problems you may encounter while installing, configuring or using your TG590. Topic Page Package Contents System Requirements Feature availability Depending on the configuration offered by your service provider, some features may not be available on your TG590. For more information, please contact your service provider.
  • Page 118: Advanced Status

    The TG590’s System Monitoring screens display important system information, including basic settings, system log, key network device parameters and network traffic statistics. Status Click System Monitoring at the top of the Home screen to display the “ Status” screen, which displays the TG590’s basic settings. Advanced Status After selecting Advanced Status and clicking Yes in the Warning screen, the monitoring options appear: System Logging, Full Status/System wide Monitoring of Connections, Traffic Monitoring, and Broadband Monitoring.
  • Page 120 Check the LEDs If the TG590 does not work as expected, the status LEDs on the front panel may provide you enough information to locate the problem: Color State Description Solid Connected to the Ethernet device, no data traffic ongoing...
  • Page 121 Use WPA2-PSK as encryption. Resetting your TG590 If at some point you can no longer connect to the TG590 or you want to make a fresh install, it may be useful to perform a reset to factory defaults. Warning: A reset to factory default settings deletes all configuration changes you made.

Table of Contents