Hitron CVE-30360 Manuale utente

USER’S GUIDE
DEFAULT LOGIN DETAILS
IP Address 192.168.0.1
Username admin
Password password
CVE-30360
VERSION 1.1
AUGUST 2011


3
ABOUT THIS USER’S GUIDE
ABOUT THIS USER’S GUIDE
INTENDED AUDIENCE
This manual is intended for people who want to configure the CVE-30360’s features
via its Graphical User Interface (GUI).
HOW TO USE THIS USER’S GUIDE
This manual contains information on each the CVE-30360’s GUI screens, and
describes how to use its various features.
Use the Introduction (page 15) to see an overview of the topics covered in this
manual.
Use the Table of Contents (page 7), List of Figures (page 11) and List of Tables
(page 13) to quickly find information about a particular GUI screen or topic.
Use the Index (page 95) to find information on a specific keyword.
Use the rest of this User’s Guide to see in-depth descriptions of the CVE-
30360’s features.
RELATED DOCUMENTATION
Quick Installation Guide: see this for information on getting your CVE-30360
up and running right away. It includes information on system requirements,
package contents, the installation procedure, and basic troubleshooting tips.
Online Help: each screen in the CVE-30360’s Graphical User Interface (GUI)
contains a Help button. Click this button to see additional information about
configuring the screen.
DOCUMENT CONVENTIONS
This User’s Guide uses various typographic conventions and styles to indicate
content type:

4
HITRON CVE-30360 USER’S GUIDE
ABOUT THIS USER’S GUIDE
Bulleted paragraphs are used to list items, and to indicate options.
1 Numbered paragraphs indicate procedural steps.
NOTE: Notes provide additional information on a subject.
Warnings provide information about actions that could harm
you or your device.
Product labels, field labels, field choices, etc. are in bold type. For example:
A mouse click in the Graphical User Interface (GUI) is denoted by a right angle
bracket ( > ). For example:
means that you should click Settings in the GUI, then Advanced settings.
A key stroke is denoted by square brackets and uppercase text. For example:
CUSTOMER SUPPORT
For technical assistance or other customer support issues, please consult your Hitron
representative.
Select UDP to use the User Datagram Protocol.
Click Settings > Advanced Settings.
Press [ENTER] to continue.

5
HITRON CVE-30360 USER’S GUIDE
ABOUT THIS USER’S GUIDE
Copyright 2011 Hitron Technologies. All rights reserved. All trademarks and
registered trademarks used are the properties of their respective owners.
DISCLAIMER: The information in this User’s Guide is accurate at the time of writing.
This User’s Guide is provided “as is” without express or implied warranty of any kind.
Neither Hitron Technologies nor its agents assume any liability for inaccuracies in this
User’s Guide, or losses incurred by use or misuse of the information in this User’s
Guide.

6
HITRON CVE-30360 USER’S GUIDE
ABOUT THIS USER’S GUIDE

7
TABLE OF CONTENTS
TABLE OF CONTENTS
About This User’s Guide..................................................................3
Table of Contents..............................................................................7
List of Figures .................................................................................11
List of Tables...................................................................................13
Introduction.....................................................................................15
1.1 CVE-30360 Overview .........................................................................15
1.1.1 Key Features .............................................................................16
1.2 Hardware Connections .......................................................................16
1.3 LEDs ..................................................................................................18
1.4 IP Address Setup ...............................................................................20
1.4.1 Manual IP Address Setup ..........................................................21
1.5 Logging into the CVE-30360 ..............................................................22
1.6 GUI Overview .....................................................................................23
1.7 Resetting the CVE-30360 ..................................................................23
Cable................................................................................................25
2.1 Cable Overview ..................................................................................25
2.1.1 DOCSIS .....................................................................................25
2.1.2 IP Addresses and Subnets ........................................................25
2.1.2.1 IP Address Format ............................................................25
2.1.2.2 IP Address Assignment .....................................................25
2.1.2.3 Subnets .............................................................................26
2.1.3 DHCP .........................................................................................27
2.1.4 DHCP Lease ..............................................................................28
2.1.5 MAC Addresses .........................................................................28

8
HITRON CVE-30360 USER’S GUIDE
TABLE OF CONTENTS
2.1.6 Routing Mode ............................................................................28
2.1.7 Configuration Files ....................................................................29
2.1.8 Downstream and Upstream Transmissions ..............................29
2.1.9 Cable Frequencies ....................................................................29
2.1.10 Modulation ...............................................................................29
2.1.11 TDMA, FDMA and SCDMA .....................................................30
2.2 The System Info Screen ....................................................................30
2.3 The Initialization Screen ....................................................................32
2.4 The Status Screen .............................................................................33
2.5 The Password Screen .......................................................................36
LAN .................................................................................................. 39
3.1 LAN Overview ....................................................................................39
3.1.1 Local Area Networks .................................................................39
3.1.2 LAN IP Addresses and Subnets ................................................39
3.1.3 Domain Suffix ............................................................................40
3.1.4 Debugging (Ping and Traceroute) .............................................40
3.2 The LAN IP Screen ............................................................................40
3.3 The Switch Setup Screen ..................................................................42
3.4 The Debug Screen .............................................................................43
3.5 The Backup Screen ...........................................................................44
Firewall ............................................................................................ 47
4.1 Firewall Overview ..............................................................................47
4.1.1 Firewall ......................................................................................47
4.1.2 Intrusion detection system .........................................................47
4.1.3 Ping ...........................................................................................47
4.1.4 MAC Filtering .............................................................................47
4.1.5 IP Filtering .................................................................................48
4.1.6 Port Forwarding .........................................................................48
4.1.7 Port Triggering ...........................................................................48
4.1.8 DMZ ...........................................................................................49
4.2 The Firewall Options Screen .............................................................49
4.3 The MAC Filtering Screen .................................................................50
4.4 The IP Filtering Screen ......................................................................53
4.4.1 Adding or Editing an IP Filtering Rule .......................................54
4.5 The Forwarding Screen .....................................................................56
4.5.1 Adding or Editing a Port Forwarding Rule .................................58
4.6 The Port Triggering Screen ...............................................................59
4.6.1 Adding or Editing a Port Triggering Rule ...................................61

9
HITRON CVE-30360 USER’S GUIDE
TABLE OF CONTENTS
Parental Control..............................................................................63
5.1 Parental Control Overview .................................................................63
5.1.1 Website Blocking .......................................................................63
5.2 The Web Site Blocking Screen ..........................................................63
5.3 The Scheduling Screen ......................................................................65
5.4 The Local Logs Screen ......................................................................67
Wireless ...........................................................................................69
6.1 Wireless Basics ..................................................................................69
6.1.1 Wireless Standards ....................................................................70
6.1.2 Service Sets and SSIDs ............................................................70
6.1.3 Basic Wireless Security .............................................................71
6.2 Wireless Tutorials ...............................................................................71
6.2.1 Choosing a Security Method ......................................................71
6.2.2 Changing the Wireless Password ..............................................72
6.2.3 Changing the Network Name (SSID) .........................................73
6.2.4 Hiding the Network ....................................................................73
6.2.5 Improving the Wireless Network’s Performance ........................73
6.3 Advanced Wireless Networking .........................................................74
6.3.1 Advanced Wireless Security ......................................................74
6.3.2 Other Wireless Concepts ...........................................................75
6.3.2.1 WPS ..................................................................................75
6.3.2.2 WMM .................................................................................76
6.4 The Wireless Screens ........................................................................76
6.4.1 The Basic Screen ......................................................................76
6.4.2 The Security Screen ..................................................................78
6.4.3 The Access Control Screen .......................................................82
6.4.4 The WiFi Site Survey Screen .....................................................84
EMTA................................................................................................87
7.1 The Status Screen .............................................................................87
7.2 The DHCP Screen .............................................................................88
Troubleshooting..............................................................................91
Index.................................................................................................95

10
HITRON CVE-30360 USER’S GUIDE
TABLE OF CONTENTS
Altri manuali per CVE-30360
2
Indice
Altri manuali Hitron Router di rete
Manuali Router di rete popolari di altre marche

NETGEAR
NETGEAR FS526T - Switch Manuale utente

Korenix
Korenix JetNet 5710G Series Manuale utente

Automated Logic
Automated Logic ZN551 Manuale del proprietario

Cisco
Cisco ASR 1000 Series Manuale dell'operatore

EnGenius
EnGenius ESR-9710 Manuale utente

Cisco
Cisco 805 Series Istruzioni operative e di sicurezza

















