SMC D3G On Board Guide

Comcast Business Gateway

Help


MAIN


Feature Setup


Administration


Password Setup

LAN


LAN IP Setup


Static Routing


Ethernet Access Filter


Switch Controls


VPN


IPSec Configuration


Tunnel List


Tunnel ADD/EDIT


PPTP/L2TP Configuration


Firewall

Firewall Options


Port Configuration


Port Forwarding


Port Forwarding ADD/EDIT


Port Triggering


Port Triggering ADD/EDIT


Port Blocking


Port Blocking ADD/EDIT


True Static IP Port Management


True Static IP Port Management ADD/EDIT


Web Site Blocking

Web Site Blocking


Web Site Blocking Schedule


DMZ


1-to-1 NAT

Gateway Summary


Gateway Status


Network

Cable Modem


HELP


MAIN


This page provides a simple description for this device and some direct hyperlink to some basic configuration pages
, like initial setup, LAN setup, Gateway status, etc. Users could also navigate through the left menu bar to
any setting pages they want.


Feature Settings -> Administration -> Password


Password

Use a password to protect the gateway from unauthorized access and to prevent unauthorized users from making changes to the feature settings.

To change the password:

  1. 1. Type in the current password in the Enter Current Password field.

  2. 2. In the Enter New Password field, type in the new password.

  3. 3. Retype the new password in the Re-enter New Password field.

  4. 4. Click Apply.


Feature Settings -> LAN -> LAN IP Setup


LAN IP Setup

The LAN IP Setup section is the IP information distributed by the gateway to your local network (computers connected to your gateway).

To configure LAN:

  1. 1. Type in the LAN IP Address. The LAN IP Address is the gateway’s IP address as seen by users on the local network.

  2. 2. Type in the LAN Subnet Mask. LAN Subnet Mask allows for the definition of the LAN subnet size.

  3. 3. Enter the Domain Suffix.

  4. 4. Check Enable LAN DHCP. Here you can enable the DHCP server feature on this LAN IP to allow automatic allocation of IP addresses to the LAN client PCs.

  5. 5. Select the Lease Time for the IP Addresses assigned by the LAN DHCP server. A LAN client device that is assigned a LAN DHCP IP Address is generally re-assigned the same IP upon lease expiration.

  6. 6. Type in the DHCP Start IP. This will be the first available LAN IP Address that will be assigned by the LAN DHCP.

  7. 7. Type in the DHCP End IP. This will be the last available LAN IP Address that will be assigned by the LAN DHCP. The number of IP addresses between the DHCP Start IP and DHCP End IP will determine the DHCP IP Address pool size.

  8. 8. Uncheck Assign DNS Manually. If checked, allows you to manually define the primary and secondary DNS servers that will be assigned to all PC’s connected to the LAN via DHCP.

  9. 9. If Assign DNS Manually is selected, type in the Primary DNS server that will be used assigned to LAN devices.

  10. 10. If Assign DNS Manually is selected, type in the Secondary DNS server that will be used assigned to LAN devices.

  11. 11. Type in the VPN Start IP (if applicable). This will be the first available PPTP/L2TP over IPSec IP Address that will be assigned to a remote VPN user.

  12. 12. Type in the VPN End IP (if applicable). This will be the last available PPTP/L2TP over IPSec IP Address that will be assigned to a remote VPN user. The number of IP addresses between the VPN Start IP and VPN End IP will determine the VPN IP Address pool size. Please note that this pool’s range must be separate from and not overlap the LAN DHCP pool.

  13. 13. Click Apply.


Feature Settings -> LAN -> Static Routing


Static Routes

Users can add Static Routes to routers connected to the gateway’s LAN.

To create Static Route:

  1. 1. Type a Name for the route in order to make the route easier to remember (has no effect on the static routing function).

  2. 2. Type the router Destination IP.

  3. 3. Type the router’s Subnet Mask.

  4. 4. Type the local IP address that will serve as the Gateway IP for the route.

  5. 5. Click Add.

For example, there is a router ‘Comcast’ connected to the Comcast Workplace gateway, which has a subnet ‘111.222.33.0’ connected to it, and its IP in the Comcast Workplace gateway subnet is ‘192.168.100.33’. We can add a static route called ‘Comcast’ and configure the destination IP to ‘111.222.33.0’, the subnet mask to ‘255.255.255.0’ and the gateway IP to ‘192.168.100.33’.

Once added, users can also delete the settings by clicking the Remove link on the Static Route table. Users can add static routes until no more static routes are available or needed (Maximum static routes are 8).


Feature Settings -> LAN -> Ethernet Access Filter



Access Filtering allows you to create a list of computers that have the ability to connect to the gateway via the LAN switch. Any computer not designated on the list will not be able to connect to your gateway. To set up Ethernet Access Filters:

  1. 1. Check the box next to Enable  Access Filter.

  2. 2. Click on the Connected Devices button.

  3. 3. Check the Add button for the wireless computer you wish to allow.

  4. 4. Click Apply.

  5. 5. This  computer will now have access to your gateway and the MAC address will display in the pull-down menu.

  6. 6. To remove a MAC address from the access filter, click the Remove link next to the appropriate MAC Address.


Feature Settings -> LAN -> Switch Controls


The gateway’s LAN interference is a 10/100BaseT Ethernet switch.  By default, the switch ports are set to automatically negotiate speed and duplex with any connected device.  Manual configuration may be desirable if the devices fail to properly auto-negotiate.  To manually configure the switch ports:

  1. 1. Go to Feature Settings -> LAN -> Switch Controls

  2. 2. Select the appropriate speed and duplex.

  3. 3. If you want to disable a LAN port, clear the check box in the Active column.

  4. 4. Click Apply when you are finished.


Feature Settings -> VPN -> IPSec Configuration -> Tunnel List


In this page, users can view the VPN tunnels that have been configured on the gateway. The info includes
the remote node’s ID and IP address, and its current status. Users can also negotiate the tunnel,
or break the existing tunnel by the pull down menu in the “Action” field. A keep alive feature is
available that allows a tunnel to automatically be re-established if broken. Clicking the
“Reconnect” checkbox will enable that. Users can create a tunnel by pressing the “Add New” button.
If users want to edit the existing tunnel, they can select the tunnel which they want to edit
and then press the “Edit” button. Users can also delete the existing tunnel by selecting the
tunnel and pressing the “Delete” button.



Feature Settings -> VPN -> IPSec Configuration -> Tunnel Add/Edit


In this page, users need to provide some basic information which is necessary for building a tunnel.

  1. 1. Local Host Setting/Intranet Configuration : This is the basic information for the local site of
    the VPN tunnel. Users need to provide the local ID and specify its format/ID Type (e.g. email,
    like a@a.com, IPv4 address, like 10.10.10.10, or fully qualified domain name like example.com).
    Users must be sure that the format and value of the “local ID” of the local site must be the same
    as the “remote ID” of the remote site for the VPN tunnel. Then the intranet subnet and intranet
    subnet mask are used together to define the local network which should be assigned for the VPN
    tunnel.

  2. 2. Remote Gateway: In this table, users should provide the “remote ID” for the VPN tunnel
    which should be the same as the “local ID” of the remote site. The ID type must also be
    specified as email, IPv4, or fully qualified domain name. Users need to provide the IP of
    the remote gateway of the VPN tunnel.

  3. 3. Key Management/IKE and IPSec : The parameters of these two are used for tunnel negotiation
    and data encryption after the tunnel is built. Please note that some gateways need to have a
    precise match for this setting in order to operate properly. Also the pre-shared key for
    authentication is defined here. Currently, only Pre-Shared key is supported for authentication.
    Users must have the same key for both sites of the VPN tunnel.

  4. 4. Tunnel Remote Host Configuration: Users can define the remote hosts which they want to access
    for the VPN tunnel. A maximum of three ranges or subnets are allowed. Users need to note that
    these settings must be inside of the allowed intranet range in the remote site’s configuration.

  5. 5. Tunnel Local Host Access Control List: Users define which subnet or which local IP range
    will have the access to participate in the VPN Tunnel.

If everything is set properly, press the Apply button to add the tunnel. This page then would
be replaced by “VPN – IPsec Tunnel Configuration” page.


Feature Settings -> VPN -> PPTP/L2TP Configuration


Remote users can connect to the workplace gateway via PPTP or L2TP over IPSec VPN tunnel.
In this page, login accounts can be created for remote PPTP/L2TP over IPSec users.

  1. 1. Enter the L2TP over IPSec Pre-Shared Phrase.

  2. 2. Type the Username and Password you would like added to the PPTP user list. Click Add.

  3. 3. Click Apply.


Feature Settings -> Firewall -> Firewall Options


Through Firewall Options, users can disable portions of the gateway firewall:

  1. 1. Disable Firewall for True Static IP Subnet Only: Disables all firewall functionality for
    devices assigned with an IP from the True Static IP subnet.

  2. 2. Disable Gateway Smart Packet Detection: Disables threat detection feature for all devices
    connected to the gateway.

  3. 3. Disable Ping on WAN Interface: Disables ICMP responses to pings on the gateway’s WAN interface.


Feature Settings -> Firewall -> Port Configuration -> Port Forwarding


Port Forwarding

Port Forwarding allows you to forward inbound Internet traffic used by a specifically identified
application to a computer on your gateway. This feature would primarily be used for devices on
your local network that have the ability to be accessed from the Internet. Since your gateway
provides firewall protection, only the gateway is visible to the Internet (with the exception
of Static IP configurations). The Port Forwarding feature opens a window so that incoming traffic
can be directed to your computer. To add a new port forwarding rule, click the add new button.
To edit an existing rule, select the rule from the port forwarding rule table, and click edit.
Make sure the Enable box is checked when you wish to enforce a specific port forwarding rule.

Commonly Used TCP/IP Ports and Protocols

The Comcast Business Gateway supports port forwarding and blocking, so that users can make local network services publicly available, block certain kinds of remote access, or block local users from accessing specific Internet services.

Use port and protocol forwarding with care.  For connections inbound from the Internet to your local network, open only those ports and protocols which are specifically required.  Opening unnecessary ports and protocols weakens your firewall protection.


Network Utilities and Connectivity

Service Port Protocol Comments
Ping (ICMP) N/A 0 Protocol number, not port number
Traceroute (ICMP) N/A 0 Protocol number, not port number
FTP Data 20 TCP
FTP Control 21 TCP
Secure Shell (SSH) 22 TCP
Secure Copy (SCP) 22 TCP
Telnet 23 TCP
DNS 53 UDP
HTTP 80 TCP
NTP 123 UDP
SNMP 161 UDP
SNMP-Trap 162 UDP
Timbuktu 407 TCP Older versions use UDP
HTTPS 443 TCP
IPP 631 TCP
MS Remote Desktop Protocol/Terminal Services 3389 TCP
Remote Admin (radmin) 4899 TCP Can be configured for other ports
SIP 5060 TCP and UDP May use other ports or protocols
pcAnywhere – Data 5631 TCP and UDP Requires both TCP and UDP
pcAnywhere – Control 5632 TCP and UDP Requires both TCP and UDP
VNC Java Client 5800+ TCP Port is 5800 + display number, e.g., 5801
VNC Server 5900+ TCP Port is 5900 + display number, e.g., 5901


Email and News

Service Port Protocol Comments
POP3 110 TCP
POP3 over SSL 995 TCP
IMAP4 143 TCP
IMAP4 over SSL (IMAPS) 993 TCP
SMTP 25 TCP
SMTP over SSL 465 TCP Deprecated, use SMTP-TLS instead
SMTP over TLS for Gmail 597 TCP
NNTP 119 TCP


Instant Messaging

Instant messaging programs may use a variety of ports aside from the defaults shown.
For example, they may be able to use port 80 (HTTP) to connect to the central server if the default port is blocked.

Service Port Protocol Comments
AOL Instant Messenger 5190 TCP Can use other ports as failback
ICQ 5190 TCP Can use other ports as failback
IRC 194 TCP
MSN Messenger 1863 TCP Uses a variety of ports for voice and file transfer.
Skype 54045 TCP Also uses dynamic UDP ports
Yahoo! Messenger 5050 TCP Can fallback to other ports
XMPP/Jabber 5222 and 5269 TCP


Peer-to-Peer and Filesharing

Peer-to-peer programs may use a variety of ports aside from the defaults shown.

Service Port Protocol Comments
Bittorrent 6881 – 6999 TCP
KaZaa 1214 Ports may change
Limewire/GNUtella 6346 and 6347 TCP and UDP Ports may change


Virtual Private Networking

Service Port Protocol Comments
PPTP 1723 TCP Microsoft VPN
GRE N/A 47 Microsoft VPN; protocol number, not port number
ISAKMP 500 UDP Required for IPSEC
IPSEC N/A 50 and 51 Protocol numbers, not port numbers
L2TP 1701 UDP


Feature Settings -> Firewall -> Port Configuration -> Port Forwarding -> Add New/Edit


To set up Port Forwarding:

  1. 1. Type an Application Name to identify this rule in the Application Name field.

  2. 2. Enter the Port Number Range in the Public Port field. The assignable ports are between 1 and
    65535. The public port is the port that users on the Internet will use to connect to the LAN
    device you are creating this forwarding rule to.

  3. 3. Enter the first port of the Port Range in the Private Port field. The assignable ports are
    between 1 and 65535. The private port is the port on the LAN PC that this rule will forward
    traffic to. The size of the private port range must match the size of the public port range,
    and is automatically calculated for you.

  4. 4. Select the appropriate Protocol from the Protocol drop-down menu.

  5. 5. Enter the IP Address of the computer you want the traffic to be forwarded to in the IP
    Address
    field. (Click on the Connected Computers button to help you locate the IP Address
    of the computer you wish to forward traffic to).

  6. 6. Click Apply.



Feature Settings -> Firewall -> Port Configuration -> Port Triggering


Port Triggering

Port Triggering allows a NATed PC behind the gateway to access special applications on the Internet.
(e.g. messaging programs). When an application such as messaging software performs an outgoing
request for a port, the port triggering rule will open up the port for the local computer running
the software and allow traffic to flow back and forth for as long as the program is in use. To
add a new port triggering rule, click the add new button. To edit an existing rule, select the
rule from the port triggering rule table, and click edit. Make sure the Enable box is checked
when you wish to enforce a specific port triggering rule.


Feature Settings -> Firewall -> Port Configuration -> Port Triggering -> Add New/Edit


You can follow these steps to configure Port Triggering rules:

  1. 1. Type an Application Name to identify this rule in the Application Name field.

  2. 2. Enter the Trigger Port Range. This is the outgoing port range used by the special application that will trigger this rule.

  3. 3. Enter the Target Port Range. This is the port that the return traffic will be forwarded to on the local client PC.

  4. 4. Select the appropriate Protocol from the Protocol drop-down menu.

  5. 5. Click Apply.


Feature Settings -> Firewall -> Port Configuration -> Port Blocking


Port Blocking

LAN Port Blocking allows you to restrict a computer within your local LAN network from accessing
certain Internet traffic by IP address and by Logical Port. Logical Ports are assigned numbers
to identify Internet traffic that is generated by a software application. The assignable logical
port range is between 1 and 65535. Your gateway supports up to 100 LAN Port Blocking rules.
To add a new port blocking rule, click the add new button. To edit an existing rule, select
the rule from the port blocking rule table, and click edit. Make sure the Enable box is checked
when you wish to enforce a specific port blocking rule.


Feature Settings -> Firewall -> Port Configuration -> Port Blocking -> Add New/Edit


You can follow these steps to configure the LAN Port Blocking feature.

  1. 1. Type an Application Name to identify this rule in the Application Name field.

  2. 2. Enter the Logical Port Range in the Port Range fields.

  3. 3. Select the appropriate Protocol from the Protocol drop-down menu.

  4. 4. Enter the IP address range in the LAN IP Address Range fields.
  5. (Click on the Connected Computers button to view the IP addresses of the computers
    connected to your gateway).

  6. 5. Click Apply.


Feature Settings -> Firewall -> Port Configuration -> True Static IP Port Management


True Static IP Port Management

True Static IP Port Management allows you to restrict inbound traffic to computers within your
local Static IP network by IP address and by Logical Port. Logical Ports are assigned numbers
to identify Internet traffic that is generated by a software application. The assignable logical
port range is between 1 and 65535. Your gateway supports up to 100 True Static IP Port Management
rules. To add a new static IP port management rule, click the add new button. To edit an
existing rule, select the rule from the port blocking rule table, and click edit. Make sure
the Enable box is checked when you wish to enforce a specific static IP port management rule.
Also note the dropdown menu that will allow you to define how the rules function. You can
make your rules work to only allow specific ports to be open, or a list of specific ports
to block.


Feature Settings -> Firewall -> Port Configuration -> True Static IP Port Management -> Add New/Edit


You can follow these steps to configure this feature.

  1. 1. Type an Application Name to identify this rule in the Application Name field.

  2. 2. Enter the Logical Port Range in the Port Range fields.

  3. 3. Select the appropriate Protocol from the Protocol drop-down menu.

  4. 4. Enter the IP address range in the True Static IP Range fields (Click on the Connected
    Computers button to view the IP addresses of the computers connected to your gateway).

  5. 5. Click Apply.

Feature Settings -> Firewall -> Web Site Blocking -> Web Site Blocking

Web Site Blocking

Web Site Blocking allows you to block access to specific Web sites (e.g. http://www.example.com) as well
as block Web sites that contain a ‘Key Word’ in its address name. For example, to block access
to Key Word(s) or Web sites:

  1. 1. Check the Web site Blocking box to enable the feature.

  2. 2. In the New Key Word/URL: field, type in the full Web site address name (www.example.com)
    to block a specific Web site. To block access to Web sites that contain a certain word in
    the Web site address, type in the word in the New Key Word/URL field. If you enter in a key
    word -for instance example, you will block many Web sites that contain the word example in
    the address. These blocked Web sites would include: http://www.example.com, http://www.example.net,
    http://www.example.org. If you enter a Web address (for instance http://www.example.net) you will only
    block this address.

  3. 3. Click Add. The Key Word or Web site address will now appear in the Blocked Key Words/URLs list.

  4. 4. You can either delete individual entries from the list by clicking the Remove button or clear
    the entire list by clicking the Clear List button.

Trusted computers allow you to exempt any connected computers from the website blocking rules.
Either select a computer from the Connected Computers table, or enter the MAC Address of the
computer you wish to exclude in the Computer IP field. Click Add to include the computer in
the Trusted Computer List. Then click Apply.

If you’d like to remove any of the computers from the Trusted Computer List, select its MAC
from the list, and click Remove. Then click Apply.


Feature Settings -> Firewall -> Web Site Blocking -> Website Blocking Schedule


Website Blocking Schedule

Web Site Blocking Schedule blocks connected computer(s) from accessing the web sites listed on
Web Site Blocking on selected days and times. To set up access time limits:

  1. 1. In the Days of the Week section, check the box next to the day or days you wish to limit.

  2. 2. In the Time of Day section, choose a Start time (i.e. 2:00 PM) and an End time (i.e. 6:00 PM).

  3. 3. Click Apply.


Feature Settings -> Firewall -> DMZ


DMZ

DMZ stands for Demilitarized Zone and is an area that is partially secured by the firewall.
This feature automatically forwards all Internet Traffic to the Computer you specify in
the section. This feature is commonly used for gaming and videoconferencing. To
add a LAN Client PC to a DMZ:

  1. 1. Check Enable DMZ Host.

  2. 2. Either select the computer from the Connected Computers table, or enter the IP address of
    the LAN client PC that you wish to place in the DMZ and click on the Apply button.


Feature Settings ->Firewall -> 1-to-1 NAT



One-to-one NAT allows you to map multiple individual IPs on the LAN to multiple, specific individual IPs on the public subnet.  This is useful for certain applications which have difficulty traversing conventional NAT.  To configure 1-to-1 NAT:

  1. 1. Click on Feature Settings →Firewall → 1-to-1 NAT
  2. 2. For each LAN host that you need to configure a 1-to-1 NAT, enter the public IP address that Internet hosts will use to access the LAN host, and also enter the host’s private IP address on the LAN.
  3. 3. Click enable next to each rule to activate it, or clear the check box to deactivate it.
  4. 4. Click Apply when you are finished.


Feature Settings -> Wireless Settings -> Wireless Setup


Wireless Setup

The Wireless Settings Setup section will allow you to change the wireless network name, configure
the level of security or block wireless computers from connecting to your gateway.

      1. i. Improved encryption through the use of a key that automatically
        changes after a specific time interval.

      2. ii. Stricter credential validation through use of an available
        RADIUS server.
    1. a.WEP (Wired Equivalent Privacy) Encryption Strength is a method of encrypting data
      that is transmitted over your wireless network. This security measure is an IEEE standard.
      How it works: The wireless data is encrypted at the computer sending the data and is then
      decoded by the receiving computer. The WEP Key generated and duplicated on the wireless
      computers allows the computers and your gateway to communicate with one another. This
      encryption method allows users to have the same amount of security over their wireless
      network as they would over a wired network.

    2. b.WPA (Wi-Fi Protected Access) is a standard that offers additional security
      features over WEP. WPA is a next generation standard that is backward compatible with
      devices using WEP. WPA features 2 technology improvements over WEP:

    1. a. The WEP Passphrase feature can be used to automatically generate a WEP Key,
      which will be used to secure your wireless network. Choose a unique passphrase, enter it
      in the WEP Passphrase field, and press the Generate button. A passphrase is a personal
      password or phrase up to 31 alphanumeric characters (no spaces). This word or phrase
      will generate a 10 or 26 digit WEP Key, depending on the WEP Encryption Strength. The
      same passphrase must then be entered in each of the wireless computers to generate the
      exact same key. This will allow wireless communication to the gateway.

    2. b. An alphanumeric 10 or 26 digit WEP Key will automatically populate
      when a WEP Passphrase is generated. If 128-bit WEP Encryption Strength is chosen,
      a 26-character key will populate in Key 1. If 64-bit WEP Encryption Strength is chosen,
      a 10-character key will populate in Keys 1-4.
      1. i. For WPA pre-shared key, type the shared key string
      2. ii. For WPA over RADIUS, enter the RADIUS Server IP Address
        and Port Number. Next, enter the key shared between the Comcast Workplace gateway and
        the RADIUS server.

      1. i.TKIP (Temporal Key Integrity Protocol) – TKIP scrambles the
        keys with a hashing algorithm, and with an integrity-checking feature, ensures that
        the keys haven’t been tampered with between the gateway and the wirelessly connected
        computer.
      2. ii. AES (Advanced Encryption Standard) – AES is a stronger
        encryption technique than TKIP. However, AES may not work properly with some older
        wireless hardware.
    1. a. Select whether you would like to utilize WPA with a pre-shared key or
      whether you would like to utilize WPA over RADIUS server under WPA Key Management.
    2. b. Select which WPA Algorithm you would like to use:
    3. c. Specify the WPA Key Renewal Timeout value. This defines how often the
      gateway should automatically change the encryption keys.
  1. 1.Check Enable Wireless Access Point to enable the Wireless functionality.

  2. 2.In the Wireless Network Name (SSID): field, enter a unique name for your wireless network.
    It is case sensitive and must not exceed 32 alphanumeric characters. This name will need to be
    duplicated on all wireless devices that will connect to this gateway. The default Wireless
    Network Name (SSID) for your gateway is ‘Customer ID’. Check whether you would like your
    SSID broadcast or not. Not broadcasting your SSID can help secure your wireless network
    further, however may require additional configuration of your wireless PC connecting to
    the gateway.

  3. 3.The Transmit Channel field allows you to select the channel (frequency) for the wireless
    network. Channels between 1 and 11 are available in the drop-down menu. All computers in
    the wireless network must use the same channel in order to connect to the gateway. Transmit
    Channel can be left on the default channel of 01. If you are experiencing interference with
    other devices operating in the same frequency range (for example, cordless phones and microwave
    ovens) or have poor signal strength and link quality within the specified ranges, select a
    different channel.

  4. 4.Wireless Security allows you to select whether you would like to have wireless security
    active or not, and the type of wireless security to be used. You can choose any of the two
    types of security offered:
  5. 5.For WEP configurations:
  6. 6.For WPA configurations:
  7. 7.Click Apply to complete the wireless setup.



Feature Settings -> Wireless Settings -> Wireless Access Filter


Wireless Access Filter

Access Filtering allows you to create a list of computers that have the ability to connect to
the gateway wirelessly. Any wireless computer not designated on the list will not be
able to connect to your gateway. To set up Access Filters:

  1. 1. Check the box next to Enable Wireless Access Filter.

  2. 2. Click on the Connected Wireless Devices button.

  3. 3. Check the Add button for the wireless computer you wish to allow.

  4. 4. Click Apply.

  5. 5. This wireless computer will now have access to your gateway and the MAC address will
    display in the pull-down menu.

  6. 6. To remove a MAC address from the access filter, click the Remove link next to
    the appropriate MAC Address.


Feature Settings -> Gateway Summary -> Gateway Status


Gateway Status:The gateway Status section provides information on the hardware and software provided within the gateway.

Vendor Name: The name of this gateway’s manufacturer.

Hardware Version: The Hardware Version identifies the version of the hardware design of the gateway.

Serial Number: The Serial Number identifies a unique identifying number and bar code format assigned to every gateway manufactured, and is assigned by the gateway manufacturer.

Firmware Version: The Firmware Version identifies the number assigned to the programming code that is inserted, much like software, into your gateway on a semi-permanent basis. Occasionally, manufacturers update their firmware with new and improved features and distinguish updated firmware with a new version number. It can be distributed like other software and, using a special user interface, installed in the programmable read-only memory by the user.

Operating Mode: The gateway has several modes of operation that will be helpful to support personnel should you encounter any issues. The Operating Mode field will detail what mode your gateway is currently running in.

System Up Time: The System Up Time displays the period of time the gateway has been functioning properly.

Date: Today’s date.

Time: The current time.


Feature Settings -> Gateway Summary -> Network


Internet Settings

The information displayed in the Network Internet Settings section is the Internet information provided by Comcast.

Cable MAC Address: The gateway MAC (Media Access Control) Address is a unique number assigned by the manufacturer to any networking device,
which allows the network to identify it at the hardware level. This is the unique address for the
Cable Modem interface of the gateway.

WAN MAC Address: Similar to the way that a Cable MAC Address works, this is the unique
address for the WAN interface of the gateway.

WAN DHCP IP Address: WAN IP leased from Comcast via DHCP.

WAN DHCP Subnet Mask: Subnet mask of the WAN IP leased from Comcast DHCP.

WAN DHCP Default Gateway: The Default Gateway is the IP address that the gateway uses to forward all traffic that is not addressed to a client within Comcast’s network.
This is the default gateway of the WAN IP leased from Comcast DHCP.

WAN Internet IP Address: The IP Address the gateway is using to route traffic to the Internet. This value will be the same as the WAN DHCP IP Address for all non-Static IP customers.
If this gateway is being used for Comcast Static IP, then this will display the IP of the static IP assigned to the gateway.

DNS: The DNS (Domain Name System) is an Internet service that translates domain names into
IP addresses. Because domain names are alphabetic, they are easier to remember. The Internet
however, is really based on IP addresses. Every time you use a domain name, therefore,
a DNS service must translate the name into the corresponding IP address. For example, the
domain name http://www.example.com might translate to 198.105.232.4. Multiple DNS IP settings
are common.

DHCP Remaining Time: The DHCP Remaining Time identifies in days, hours, minutes and seconds,
the amount of time a network user has until the allowed use or “lease” of the current dynamic
IP address will expire on the gateway’s WAN port.

Date: Current date as reported by the Time of Day server on the Comcast network

Static IP Block: If the gateway is configured to utilize the RIP protocol, this field displays
the RIP IP block assigned to the gateway. If the gateway is configured to receive its IP
Address dynamically, this field will have no values.

Local Settings

The information detailed in the Local Settings section is the IP information distributed by the
gateway to your local network (computers connected to your gateway).

Gateway IP Address: The gateway IP Address is the IP assigned to the gateway. This is the
gateway’s IP address as seen by users on the local network. This address is also used to
determine the DHCP range for DHCP addresses for your local network.

Subnet Mask: LAN Subnet Mask allows further division of the host part of the LAN IP address
into additional subnets.

DHCP Server: The DHCP (Dynamic Host Configuration Protocol) Server in the gateway
automatically assigns IP addresses to each computer on your local network.

IP Range: The range of IP addresses the gateway can assign to computers on your local network.

Connected Computers button: Displays the Computer Name, IP Address, MAC Address and Interface
(method the computer is connected to the gateway; wireless or Ethernet) of all computers
connected to your gateway. Only computers turned on will display in the Connected Computers list.


Feature Settings -> Gateway Summary -> Wireless Security


Wireless Security

Wireless Security provides you with your wireless connection settings. You will need to refer to these settings
when connecting additional computers to your gateway wirelessly.

Wireless Network Name (SSID): This is the unique name you have chosen for your wireless network.
This name will need to be used when setting up any wireless computers. Changes must be made
in the Wireless section within the Feature Setup section.

Transmit Channel: The channel or frequency your wireless network is currently transmitting on.
Changes must be made in the Wireless Settings section within the Feature Setup section.

Security Type: Which type of security policy is being enforced (WPA, WEP, etc.)


Feature Settings -> Gateway Summary -> Cable Modem


Cable Modem

The Cable Modem status page shows the users the initialization process this gateway has been
through, and also includes the information about the downstream channel and the upstream
channel the modem is connected on.


HELP


It will lead the users to this HELP page.

DIFFICULTIES CONNECTING

SMCD3G-CCR

1. Check power connection.

2. Verify power light status.

3. Check the connections for the modem and networking interface(s).

4. If you are unable to access the gateway’s user interface, please check
your computer’s network settings – – verify that your TCP/IP settings
are correct – check User Guide for more details.

NETWORK: Ethernet

1. Check all connections to the gateway.

2. Check all connections to each attached device on the network.

3. Ensure that all devices’ TCP/IP settings are correct (either assigned
automatically via DHCP or manually configured).

4. Ensure that you have an Ethernet interface for each
networked computer.

5. Each computer must have either Microsoft Windows 95 (or higher) or
Mac OS 8.5 (or higher).

NETWORK: USB

1. Check
the USB cable to the gateway and make sure it is securely attached at
both ends.

2. Make sure you have installed the driver included with the installation CD. Please
refer to the user manual.

3. Ensure that all devices’ TCP/IP settings are correct (either assigned
automatically via DHCP or manually configured).

4. Each computer must have Microsoft Windows 98 Second Edition (or higher).
A USB driver for MAC OS is not available.

NETWORK: Wireless

1. Check the wireless
card of the gateway to confirm it is firmly sitting in the SMCD3G-CCR.
2. Check your wireless client device of your PC to make sure it is
functioning properly. Please refer to its user manual for help.

3. Make sure all wireless related settings on both sides(SMCD3G-CCR and the client device) are the
same, for example, the same SSID, channel, WEP status, WEP key.

4. Make sure the wireless client is not blocked by the wireless access control feature. Please refer
to the access control help page of the wireless function.

5. Each computer must have either Microsoft Windows 95 (or higher) or
Mac OS 8.5 (or higher)

GLOSSARY OF TERMS

DHCP
Dynamic Host Configuration Protocol. This protocol automatically
configures the TCP/IP settings of every computer on your home network.

DNS Server Address

DNS stands for Domain Name System, which allows
Internet host computers to have a domain name (such as SMC.com) and
one or more IP addresses (such as 192.34.45.8). A DNS server keeps a database
of host computers and their respective domain names and IP addresses,
so that when a domain name is requested (as in typing “SMC.com”
into your Internet browser), the user is sent to the proper IP address.
The DNS server address used by the computers on your home network is the
location of the DNS server your ISP has assigned.

Ethernet

A standard for computer networks. Ethernet networks are
connected by special cables and hubs, and move data around at up to 10
million bits per second (Mbps).

IP Address

IP stands for Internet Protocol. An IP address consists
of a series of four numbers separated by periods, that identifies an single,
unique Internet computer host. Example: 192.34.45.8.

ISP Gateway Address
(see ISP for definition). The ISP Gateway
Address is an IP address for the Internet router located at the ISP’s
office. This address is required only when using a cable or DSL modem.

ISP
Internet Service Provider. An ISP is a business that provides
connectivity to the Internet for individuals and other businesses or organizations.

LAN
Local Area Network. A LAN is a group of computers and devices
connected together in a relatively small area (such as a house or an office).
Your home network is considered a LAN.

MAC Address

MAC stands for Media Access Control. A MAC address
is the hardware address of a device connected to a network.

NAT
Network Address Translation. This process allows all of the
computers on your home network to use one IP address. Using the NAT capability
of the SMCD3G-CCR, you can access the Internet from
any computer on your home network.

SPI
Stateful Packet Inspection. SPI is the type of corporate-grade
Internet security provided by the SMCD3G-CCR wireless cable modem gateway. Using
SPI, the gateway acts as a “firewall,” protecting your network
from computer hackers.
SPI

Stateful Packet Inspection. SPI is the type of corporate-grade
Internet security provided by the SMCD3G-CCR cable modem gateway. Using
SPI, the gateway acts as a “firewall,” protecting your network
from computer hackers.

Subnet Mask
A subnet mask, which may be a part of the TCP/IP information
provided by your Service Provider, is a set of four numbers configured like an IP address.
It is used to create IP address numbers used only within a particular
network (as opposed to valid IP address numbers recognized by the Internet,
which must assigned by InterNIC).

TCP/IP
Transmission Control Protocol/Internet Protocol. This is
the standard protocol for data transmission over the Internet.

WAN
Wide Area Network. A network that connects computers located
in geographically separated areas, (i.e., different buildings, cities,
countries). The Internet is a wide area network.

str = ‘Close

‘;
document.write(str);

Comments are closed.

%d bloggers like this: