ARRIS SBG901 Wireless Cable Modem Gateway User Manual Motorola SURFboard

ARRIS Group, Inc. Wireless Cable Modem Gateway Motorola SURFboard

Manual

Motorola SURFboard®
SBG901 Wireless Cable Modem Gateway
User Guide
i Safety and Regulatory Information
SAFETY AND REGULATORY INFORMATION
IMPORTANT SAFETY INSTRUCTIONS
When using your equipment, basic safety precautions should always be followed to reduce the risk of fire,
electric shock, and injury to persons, including the following:
Read all of the instructions listed here and/or in the user manual before you operate this device.
Give particular attention to all safety precautions. Retain the instructions for future reference.
This device must be installed and used in strict accordance with manufacturer’s instructions, as
described in the user documentation that is included with the device.
Comply with all warning and caution statements in the instructions. Observe all warning and
caution symbols that are affixed to this device.
To prevent fire or shock hazard, do not expose this device to rain or moisture. The device must not
be exposed to dripping or splashing. Do not place objects filled with liquids, such as vases, on the
device.
This device was qualified under test conditions that included the use of the supplied cables
between systems components. To ensure regulatory and safety compliance, use only the provided
power and interface cables and install them properly.
Different types of cord sets may be used for connections to the main supply circuit. Use only a
main line cord that complies with all applicable device safety requirements of the country of use.
Installation of this device must be in accordance with national wiring codes and conform to local
regulations.
Operate this device only from the type of power source indicated on the device’s marking label. If
you are not sure of the type of power supplied to your home, consult your dealer or local power
company.
Do not overload outlets or extension cords, as this can result in a risk of fire or electric shock.
Overloaded AC outlets, extension cords, frayed power cords, damaged or cracked wire insulation,
and broken plugs are dangerous. They may result in a shock or fire hazard.
Route power supply cords so that they are not likely to be walked on or pinched by items placed
upon or against them. Pay particular attention to cords where they are attached to plugs and
convenience receptacles, and examine the point where they exit from the device.
Place this device in a location that is close enough to an electrical outlet to accommodate the
length of the power cord.
Place the device to allow for easy access when disconnecting the power cord of the device from
the AC wall outlet.
Do not connect the plug into an extension cord, receptacle, or other outlet unless the plug can be
fully inserted with no part of the blades exposed.
i Safety and Regulatory Information 2
This document is uncontrolled pending incorporation in PDM
Place this device on a stable surface.
It is recommended that the customer install an AC surge protector in the AC outlet to which this
device is connected. This is to avoid damaging the device by local lightning strikes and other
electrical surges.
Postpone installation until there is no risk of thunderstorm or lightning activity in the area.
Do not cover the device or block the airflow to the device with any other objects. Keep the device
away from excessive heat and humidity and keep the device free from vibration and dust.
Wipe the device with a clean, dry cloth. Never use cleaning fluid or similar chemicals. Do not spray
cleaners directly on the device or use forced air to remove dust.
Do not use this product near water: for example, near a bathtub, washbowl, kitchen sink or laundry
tub, in a wet basement, or near a swimming pool.
Upon completion of any service or repairs to this device, ask the service technician to perform
safety checks to determine that the device is in safe operating condition.
Do not open the device. Do not perform any servicing other than that contained in the installation
and troubleshooting instructions. Refer all servicing to qualified service personnel.
This device should not be used in an environment that exceeds 40º C.
SAVE THESE INSTRUCTIONS
Note to CATV System Installer: This reminder is provided to call the CATV system installer's attention to
Section 820-93 of the National Electric Code, which provides guidelines for proper grounding and, in
particular, specifies that the coaxial cable shield shall be connected to the grounding system of the building,
as close to the point of cable entry as practical.
CARING FOR THE ENVIRONMENT BY RECYCLING
When you see this symbol on a Motorola product, do not dispose of the product with
residential or commercial waste.
Recycling your Motorola Equipment
Please do not dispose of this product with your residential or commercial waste. Some
countries or regions, such as the European Union, have set up systems to collect and
recycle electrical and electronic waste items. Contact your local authorities for information
about practices established for your region. If collection systems are not available, call
Motorola Customer Service for assistance. Please visit www.motorola.com/recycle for
instructions on recycling.
FCC STATEMENTS
FCC Interference Statement
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to
part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful
interference in a residential environment. This equipment generates uses and can radiate radio frequency
energy and, if not installed and used in accordance with the instructions, may cause harmful interference to
radio communications. However, there is no guarantee that interference will not occur in a particular
installation. If this equipment does cause harmful interference to radio or television reception, which can be
determined by turning the device off and on, the user is encouraged to try to correct the interference by
one or more of the following measures:
i Safety and Regulatory Information 3
This document is uncontrolled pending incorporation in PDM
Reorient or relocate the receiving antenna.
Increase the separation between the device and receiver.
Connect the equipment into an outlet on a circuit different from that to which the receiver is
connected.
Consult the dealer or an experienced radio/TV technician for help.
This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions: (1)
This device may not cause harmful interference, and (2) This device must accept any interference received,
including interference that may cause undesired operation.
FCC CAUTION: Any changes or modifications not expressly approved by Motorola for compliance could
void the user’s authority to operate the equipment.
FCC RADIATION EXPOSURE STATEMENT
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. To
comply with the FCC RF exposure compliance requirements, the separation distance between the antenna
and any person’s body (including hands, wrists, feet and ankles) must be at least 20 cm (8 inches).
This transmitter must not be co-located or operation in conjunction with any other antenna or transmitter.
The availability of some specific channels and/or operational frequency bands are country dependent and
are firmware programmed at the factory to match the intended destinations. The firmware setting is not
accessible by the end user.
INDUSTRY CANADA (IC) STATEMENT
This device complies with RSS-210 of the Industry Canada Rules. Operation is subject to the following two
conditions:
1. This device may not cause interference, and
2. This device must accept any interference, including interference that may cause undesired operation of
the device.
This device is designed to operate with two internal antennas as part of the printed wiring board. The top
facing antenna has a maximum gain of 2dBi and the front facing antenna has a maximum gain of 4dBi.
To reduce potential radio interference to other users, the antenna types and their gains were so chosen that
the equivalent isotropically radiated power (e.i.r.p) is not more than that permitted for successful
communications.
This Class B digital apparatus complies with Canadian ICES-003.
Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada.
IC RADIATION EXPOSURE STATEMENT
IMPORTANT NOTE: This equipment complies with IC radiation exposure limits set forth for an
uncontrolled environment. This equipment should be installed and operated with a minimum distance of 20
cm between the radiator and your body.
WIRELESS LAN INFORMATION
This device is a wireless network product that uses Direct Sequence Spread Spectrum (DSSS) and
Orthogonal Frequency-Division Multiple Access (OFDMA) radio technologies. The device is designed to be
interoperable with any other wireless DSSS and OFDMA products that comply with:
i Safety and Regulatory Information 4
This document is uncontrolled pending incorporation in PDM
The IEEE 802.11 Standard on Wireless LANs (Revision B and Revision G), as defined and approved
by the Institute of Electrical Electronics Engineers
The Wireless Fidelity (Wi-Fi) certification as defined by the Wireless Ethernet Compatibility Alliance
(WECA).
RESTRICTIONS ON THE USE OF WIRELESS DEVICES
In some situations or environments, the use of wireless devices may be restricted by the proprietor of the
building or responsible representatives of the organization. For example, using wireless equipment in any
environment where the risk of interference to other devices or services is perceived or identified as
harmful.
If you are uncertain of the applicable policy for the use of wireless equipment in a specific organization or
environment, you are encouraged to ask for authorization to use the device prior to turning on the
equipment.
The manufacturer is not responsible for any radio or television interference caused by unauthorized
modification of the devices included with this product, or the substitution or attachment of connecting
cables and equipment other than specified by the manufacturer. Correction of the interference caused by
such unauthorized modification, substitution, or attachment is the responsibility of the user.
The manufacturer and its authorized resellers or distributors are not liable for any damage or violation of
government regulations that may arise from failing to comply with these guidelines.
SECURITY WARNING: This device allows you to create a wireless network. Wireless network connections
may be accessible by unauthorized users. Please read the SBG901 User Guide or visit the Motorola website
to learn how to protect your network.
INTERNATIONAL DECLARATION OF CONFORMITY
We, Motorola, Inc., 101 Tournament Drive, Horsham, PA 19044, U.S.A., declare under our sole
responsibility that the SBG901 to which this declaration relates is in conformity with one or more of the
following standards:
EN55022 EN55024 EN60950-1 EN61000-3-2 EN61000-3-3
CISPR-22 CISPR-24 IEC 60950-1 ETSI EN 300 328 ETSI EN 301 489-1/-17
and the following provisions of the Directive(s) of the Council of the European Union: WEEE Directive
2002/96/EC, R&TTE 1999/5/EC, RoHS Directive 2005/95/EC
i Safety and Regulatory Information 5
This document is uncontrolled pending incorporation in PDM
Models Standards
SBG901, SBG901 Diagnostic FCC Part 15, ICES-003
UL60950-1, CAN/CSA-C22.2 No. 60950-1
EN55022, EN55024, CISPR22, CISPR24, EN61000-3-2,
EN61000-3-3, EN60950-1, IEC60950-1, ETSI EN 300 328,
ETSI EN 301 489-1/-17
© 2008 Motorola, Inc. All rights reserved. No part of this publication may be reproduced in any
form or by any means or used to make any derivative work (such as translation, transformation,
or adaptation) without written permission from Motorola, Inc.
MOTOROLA and the Stylized M logo are registered in the US Patent & Trademark Office.
SURFboard is a registered trademark of General Instrument Corporation, a wholly-owned
subsidiary of Motorola, Inc. Microsoft, Windows, Windows NT, Windows Vista, Internet Explorer,
DirectX, and Xbox LIVE are registered trademarks of Microsoft Corporation; and Windows XP is a
trademark of Microsoft Corporation. Linux® is a registered trademark of Linus Torvalds in the
U.S. and other countries. UNIX is a registered trademark of the Open Group in the United States
and other countries. Macintosh is a registered trademark of Apple Computer, Inc. Adobe, Adobe
Acrobat, and Adobe Acrobat Reader are registered trademarks of Adobe Systems, Inc. All other
product or service names are property of their respective owners .No part of the contents of this
document may be reproduced or transmitted in any form or by any means without the written
permission of the publisher.
Motorola reserves the right to revise this publication and to make changes in content from time
to time without obligation on the part of Motorola to provide notification of such revision or
change. Motorola provides this guide without warranty of any kind, implied or expressed,
including, but not limited to, the implied warranties of merchantability and fitness for a particular
purpose. Motorola may make improvements or changes in the product(s) described in this
manual at any time.
i Safety and Regulatory Information 6
This document is uncontrolled pending incorporation in PDM
Contents
Safety and Regulatory Information
Introduction
SBG901 Features ........................................................................................................................................ 13
Easy Setup .................................................................................................................................................. 14
Network Connection Types......................................................................................................................... 14
Powerful Features in a Single Unit.............................................................................................................. 14
Sample Hybrid LAN .............................................................................................................................. 15
Optional Accessories ............................................................................................................................ 15
Front Panel .................................................................................................................................................. 16
Rear Panel ................................................................................................................................................... 17
Bottom Label on the SBG901 ..................................................................................................................... 18
SBG901 LAN Choices ................................................................................................................................. 18
Wireless LAN........................................................................................................................................ 19
Wired Ethernet LAN ............................................................................................................................. 20
Security ....................................................................................................................................................... 20
Firewall ................................................................................................................................................. 21
DMZ...................................................................................................................................................... 21
Port Triggering ...................................................................................................................................... 21
Wireless Security.................................................................................................................................. 22
Port Forwarding .................................................................................................................................... 22
Getting Started
Before You Begin ........................................................................................................................................ 23
Precautions.................................................................................................................................................. 24
Signing Up for Service................................................................................................................................. 24
Computer System Requirements ............................................................................................................... 25
Connecting the SBG901 to the Cable System............................................................................................ 25
Cabling the LAN .......................................................................................................................................... 26
Obtaining an IP Address for an Ethernet Connection ................................................................................. 27
Configuring TCP/IP ...................................................................................................................................... 27
Configuring TCP/IP in Windows 2000 .................................................................................................. 27
Configuring TCP/IP in Windows XP...................................................................................................... 30
i Safety and Regulatory Information 7
This document is uncontrolled pending incorporation in PDM
Configuring TCP/IP in Windows Vista................................................................................................... 32
Verifying the IP Address in Windows 2000 or Windows XP................................................................ 34
Verifying the IP Address in Windows Vista .......................................................................................... 35
Renewing Your IP Address ......................................................................................................................... 35
Wall Mounting the SBG901 ........................................................................................................................ 36
Wall Mounting Template ...................................................................................................................... 38
Basic Configuration
Starting the SBG901 Configuration Manager (CMGR)................................................................................ 40
SBG901 Menu Options Bar......................................................................................................................... 42
SBG901 Submenu Options .................................................................................................................. 42
Changing the SBG901 Default Password ................................................................................................... 43
Restore Factory Defaults...................................................................................................................... 43
Getting Help ................................................................................................................................................ 44
Gaming Configuration Guidelines ............................................................................................................... 44
Configuring the Firewall for Gaming..................................................................................................... 44
Configuring Port Triggers...................................................................................................................... 45
Configuring a Gaming DMZ Host ......................................................................................................... 45
Exiting the SBG901 Configuration Manager ............................................................................................... 45
Status Pages
Status Software Page ................................................................................................................................. 47
Status Connection Page.............................................................................................................................. 48
Status Security Page ................................................................................................................................... 49
Changing the SBG901 Default Password............................................................................................. 49
Status Diagnostics Page ............................................................................................................................. 49
Ping Utility............................................................................................................................................. 50
Traceroute Utility .................................................................................................................................. 51
Status Event Log Page................................................................................................................................52
Basic Pages
Basic Setup Page ........................................................................................................................................ 53
Basic DHCP Page........................................................................................................................................ 55
Basic DDNS Page........................................................................................................................................ 56
Basic Backup Page...................................................................................................................................... 57
Restoring Your SBG901 Configuration ................................................................................................. 57
i Safety and Regulatory Information 8
This document is uncontrolled pending incorporation in PDM
Backing Up Your SBG901 Configuration .............................................................................................. 58
Advanced Pages
Advanced Options Page.............................................................................................................................. 59
Advanced IP Filtering Page ......................................................................................................................... 61
Advanced MAC Filtering Page .................................................................................................................... 62
Setting a MAC Address Filter ............................................................................................................... 62
Advanced Port Filtering Page ...................................................................................................................... 63
Advanced Port Forwarding Page................................................................................................................. 64
Advanced Port Triggers Page...................................................................................................................... 65
Advanced DMZ Host Page.......................................................................................................................... 66
Setting Up the DMZ Host..................................................................................................................... 66
Advanced Routing Information Protocol Setup Page.................................................................................. 67
Firewall Pages
Firewall Web Content Filter Page ............................................................................................................... 69
Firewall Local Log Page .............................................................................................................................. 71
Firewall Remote Log Page.......................................................................................................................... 72
Parental Control Pages
Parental Control User Setup Page .............................................................................................................. 73
Parental Control Basic Setup Page ............................................................................................................. 75
Parental Control ToD Access Policy Page................................................................................................... 76
Parental Control Event Log Page ................................................................................................................ 77
Wireless Pages
Setting Up Your Wireless LAN.................................................................................................................... 79
Encrypting Wireless LAN Transmissions ............................................................................................. 80
Wireless 802.11b/g Basic Page .................................................................................................................. 81
Wireless 802.11b/g Privacy Page................................................................................................................ 83
Wireless 802.11b/g Access Control Page................................................................................................... 86
Wireless 802.11b/g Advanced Page ........................................................................................................... 87
Wireless Bridging Page............................................................................................................................... 89
Wireless 802.11b/g Wi-Fi Multimedia Page................................................................................................ 90
Wireless 802.11b/g Guest Network Page................................................................................................... 92
Configuring the Wireless Clients ................................................................................................................ 94
Configuring a Wireless Client for WPA ................................................................................................ 94
Configuring a Wireless Client for WEP................................................................................................. 95
i Safety and Regulatory Information 9
This document is uncontrolled pending incorporation in PDM
Configuring a Wireless Client with the Network Name (SSID) ............................................................ 95
Troubleshooting
Solutions...................................................................................................................................................... 97
Front-Panel LEDs and Error Conditions....................................................................................................... 98
Contact Us
Specifications
Glossary
Software License
Tab l e s
SBG901 Front-Panel LED Indicators ........................................................................................................... 16
SBG901 Rear Panel Connectors and Indicators.......................................................................................... 17
Items Included with Your SBG901.............................................................................................................. 23
SBG901 Light Activity during Startup ......................................................................................................... 26
Configuration Manager Menu Option Bar................................................................................................... 42
Field Descriptions for the Status Connection Page .................................................................................... 48
Descriptions for the Status Event Log Page............................................................................................... 52
Field Descriptions for the Basic Setup Page............................................................................................... 54
Field Descriptions for the Basic DHCP Page .............................................................................................. 56
Field Descriptions for Basic DDNS Page .................................................................................................... 57
Field Descriptions for the Basic Backup Page ............................................................................................ 57
Field Descriptions for the Advanced Options Page .................................................................................... 60
Field Descriptions for the Advanced IP Filtering Page................................................................................ 61
Field Descriptions for the Advanced MAC Filtering Page........................................................................... 62
Field Descriptions for the Advanced Port Filtering Page ............................................................................ 63
Field Descriptions for the Advanced Port Triggers Page ............................................................................ 65
Field Descriptions for the Firewall Local Log Page..................................................................................... 71
Field Description for the Firewall Remote Log Page .................................................................................. 72
Field Descriptions for the Parental Control User Setup Page ..................................................................... 74
Enabling Wireless Security on Your LAN .................................................................................................... 79
Encrypting Wireless LAN Transmissions .................................................................................................... 80
Field Descriptions for the Wireless 802.11b/g Basic Page ......................................................................... 81
Field Descriptions for the Wireless 802.11b/g Privacy Page ...................................................................... 84
Field Descriptions for the Wireless 802.11b/g Access Control Page ......................................................... 86
Field Descriptions for the Wireless 802.11b/g Access Control Page ......................................................... 87
i Safety and Regulatory Information 10
This document is uncontrolled pending incorporation in PDM
Field Descriptions for the Wireless Bridging Page ..................................................................................... 89
Field Descriptions for the Wireless 802.11b/g Wi-Fi Multimedia Page ...................................................... 90
Field Descriptions for the Wireless 802.11b/g Guest Network Page ......................................................... 93
Configuring Wireless Clients....................................................................................................................... 94
Troubleshooting Solutions........................................................................................................................... 97
Front-Panel Lights and Error Conditions ..................................................................................................... 98
Specifications ............................................................................................................................................ 101
Glossary..................................................................................................................................................... 105
Figures
Sample Hybrid LAN..................................................................................................................................... 15
SBG901 Front Panel LEDs .......................................................................................................................... 16
SBG901 Rear Panel..................................................................................................................................... 17
MAC Label................................................................................................................................................... 18
Sample Wireless Network Connections ..................................................................................................... 19
Sample Ethernet to Computer Connection................................................................................................. 20
Connecting the SBG901.............................................................................................................................. 26
Local Area Connection Status window ....................................................................................................... 28
Local Area Connection Properties window................................................................................................. 28
Select Network Component Type window................................................................................................. 29
Local Area Connection Properties window................................................................................................. 29
Network and Internet Connections window............................................................................................... 30
Windows XP Classic View Control Panel.................................................................................................... 30
Network Connections window ................................................................................................................... 31
Local Area Connection Properties window................................................................................................. 31
Network and Sharing Center window......................................................................................................... 32
LAN or High-Speed Internet connections window ..................................................................................... 32
Local Area Connection Properties window................................................................................................. 33
Internet Protocol Version 4 (TCP/IPv4) Properties window ........................................................................ 33
IPCONFIG window 1 for Windows 2000 and XP........................................................................................ 34
IPCONFIG window 2 for Windows 2000 and XP........................................................................................ 34
IPCONFIG window for Windows Vista ....................................................................................................... 35
Renew IPCONFIG window1 ....................................................................................................................... 36
Printer Settings for Wall Mounting Template ............................................................................................. 37
Wall Mounting Screw Dimensions ............................................................................................................. 37
i Safety and Regulatory Information 11
This document is uncontrolled pending incorporation in PDM
Wall Mounting Template............................................................................................................................. 39
Status Software Page ................................................................................................................................. 47
Status Connection Page.............................................................................................................................. 48
Change User Information window .............................................................................................................. 49
Ping Utility window ..................................................................................................................................... 50
Traceroute Utility window........................................................................................................................... 51
Status Event Log Page................................................................................................................................52
Basic Setup Page ........................................................................................................................................ 53
Basic DHCP Page........................................................................................................................................ 55
Basic DDNS Page........................................................................................................................................ 56
Basic Backup Page...................................................................................................................................... 57
Advance Options Page................................................................................................................................59
Advanced IP Filtering Page ......................................................................................................................... 61
Advanced MAC Filtering Page .................................................................................................................... 62
Advanced Port Filtering Page ...................................................................................................................... 63
Advanced Port Forwarding Page................................................................................................................. 64
Advanced Port Triggers Page...................................................................................................................... 65
Advanced DMZ Host Page.......................................................................................................................... 66
Advanced RIP Setup Page .......................................................................................................................... 67
Firewall Web Content Filter Page ............................................................................................................... 70
Firewall Local Log Page .............................................................................................................................. 71
Firewall Remote Log Page.......................................................................................................................... 72
Parental Control User Setup Page .............................................................................................................. 74
Parental Control Basic Setup Page ............................................................................................................. 75
Parental Control ToD Access Policy Page................................................................................................... 76
Parental Control Event Log Page ................................................................................................................ 77
Wireless 802.11b/g Basic Page .................................................................................................................. 81
Wireless 802.11b/g Privacy Page................................................................................................................ 83
Wireless 802.11b/g Access Control Page................................................................................................... 86
Wireless 802.11b/g Advanced Page ........................................................................................................... 87
Wireless Bridging Page............................................................................................................................... 89
Wireless 802.11b/g Wi-Fi Multimedia Page................................................................................................ 90
Wireless 802.11b/g Guest Network Page................................................................................................... 92
i Safety and Regulatory Information 12
This document is uncontrolled pending incorporation in PDM
1 Introduction
Congratulations, you have a Motorola SBG901 SURFboard® Wireless Cable Modem Gateway for
your home, home office, or small business/enterprise. Applications where the Motorola SBG901
is especially useful include:
Households with multiple computers requiring a network connection and Internet access
Households with one or more computers capable of wireless connectivity for remote access
to the cable modem
Small businesses or home offices that require fast, affordable, and secure Internet access to
provide an internet connection for wireless gaming systems
Video conferencing
A home network enables you to share information between two or more computers. You can
connect your home network to the Internet through your cable TV system. The SBG901 is the
central connection point between your computers and the Internet. It directs (routes)
information between the computers connected to your home network. A built-in cable modem
transmits information between your home network and the Internet.
SBG901 Features
The SBG901 offers the following standard features:
Combines four separate products — a DOCSIS® 2.0 cable modem, IEEE 802.11g wireless
access point (Wi-Fi© certified), Ethernet 10/100Base-T connection, and firewall — into one
compact unit
Enables you to create a custom network sharing a single broadband connection, files, and
peripherals, with or without wires
Advanced firewall for enhanced network security for wired and wireless users
Provides an easy installation and security setup wizard
For the most recent product documentation, visit the Modems & Gateways page on the
Motorola website: http://broadband.motorola.com/consumers/support/default.asp.
1 Introduction 13
This document is uncontrolled pending incorporation in PDM
Easy Setup
It is much easier to configure a local area network (LAN) using an SBG901 than using traditional
networking equipment:
The Installation Assistant application on the SBG901 Installation CD-ROM enables easy
connection to the cable network and setup for security.
For basic wired or wireless operation, most default settings require no modification.
The SBG901 Configuration Manager (CMGR) provides a graphical user interface (GUI) for
easy configuration of necessary wireless, Ethernet, router, DHCP, and security settings. For
information about using the SBG901 Configuration Manager, see Basic Configuration.
Network Connection Types
The SBG901 provides different network connection types for your computers to exchange data.
The connection between your computers and the SBG901 may be with a wireless or a wired
connection or a combination of the two. Your network can use one or any combination of the
following network connections:
Ethernet local area network (LAN)
Wireless LAN (IEEE 802.11g that also supports IEEE 802.11b wireless clients)
Wi-Fi (Wireless Fidelity) connections to Wi-Fi enabled devices
Powerful Features in a Single Unit
An SBG901 combines high-speed Internet access, networking, and computer security for a home
or small-office LAN. An SBG901 provides:
An integrated high-speed cable modem for continuous broadband access to the Internet and
other online services with much faster data transfer than traditional dial-up or ISDN modems
One broadband connection for up to 245 computers to surf the web; all computers on the LAN
communicate as if they were connected to the same physical network
An IEEE 802.11g wireless access point to enable laptop users to remain connected while
moving around the home or small office or to connect desktop computers without installing
network wiring. Depending on distance, wireless connection speeds can vary.
A secure Wi-Fi broadband connection for Wi-Fi enabled devices on your network, such as
your cellular telephone, laptops, printers, PDAs, and desktops.
One10/100Base-T Ethernet uplink port supporting a half- or full-duplex connection with
auto-MDIX capability
Routing for a wireless LAN (WLAN) or a wired Ethernet LAN; you can connect a single
computer using a hub and/or switch
A built-in DHCP server to easily configure a combined wired and/or wireless Class C private
LAN
1 Introduction 14
This document is uncontrolled pending incorporation in PDM
An advanced firewall supporting stateful-inspection, intrusion detection, DMZ, denial-of-service
attack prevention, and Network Address Translation (NAT)
Port Forwarding to configure ports to run applications having special network requirements
Sample Hybrid LAN
The sample LAN illustrated below contains the following devices, all protected by the SBG901
firewall. Clockwise from top-right, the devices are:
PDA, an Apple Macintosh® computer, a desktop PC, and a laptop PC with a 802.11g wireless
LAN connection
Figure 1 Sample Hybrid LAN
Optional Accessories
All networks are composed of multiple devices. The SBG901 works with any Wi-Fi certified IEEE
802.11g or IEEE 802.11b compliant client product.
The Wi-Fi capability of the SBG901 can also be used to allow other Wi-Fi enabled devices to
connect to the Internet.
The maximum range of Wi-Fi devices is 300 feet and the maximum data transfer speed is 54
Mbps
Note: Wi-Fi (Wireless Fidelity) is used to identify wireless products that have
been certified to conform to the IEEE 802.11b/g wireless networking
specification.
1 Introduction 15
This document is uncontrolled pending incorporation in PDM
Front Panel
The front panel contains indicator lights and a button for client card pairing. The display remains
dark until there is a connection or activity on an interface.
Figure 2 SBG901 Front Panel LEDs
The lights provide status and information about power, communications, and errors:
Table 1 SBG901 Front-Panel LED Indicators
Key Light Flashing On
1 POWER This light does not flash Power is provided to the SBG901
2 RECEIVE Scanning for a receive (downstream)
channel connection
Downstream channel is connected
3 SEND Scanning for a send (upstream) channel
connection
Upstream channel is connected
4 ONLINE Scanning for configuration parameters. Startup process is complete and the
SBG901 is online
5 WIRELESS Green: Wi-Fi enabled with encrypted
wireless data activity. A long/short flash
indicates mobile pairing in progress.
Amber: Wi-Fi enabled with unencrypted
wireless data activity.
Green: Wireless pairing
successfully established between
the SBG901 and another Wi-Fi
enabled device on your network
— printer, PDA, laptop, etc.
1 Introduction 16
This document is uncontrolled pending incorporation in PDM
Rear Panel
Figure 3 SBG901 Rear Panel
The rear panel contains cabling connectors and the power receptacle.
Table 2 SBG901 Rear Panel Connectors and Indicators
Key Item Description
1 ETHERNET Connects to an Ethernet-equipped computer, hub, or switch using an RJ-45 cable
connection
2
CABLE
Connects the SBG901 to a cable wall outlet coaxial cable connection
3 RESET Resets the digital voice modem.
Resetting the modem may take from five to 30 minutes.
4 +12VDC Provides power to the cable modem
1 Introduction 17
This document is uncontrolled pending incorporation in PDM
Bottom Label on the SBG901
The label on the bottom of the SBG901 contains the Media Access Control (MAC) address, a
unique, 48-bit value permanently saved in ROM at the factory to identify each Ethernet network
device. To receive data service, you will need to provide the MAC address marked HFC MAC ID
to your Internet Service provider.
Figure 4 MAC Label
SBG901 LAN Choices
You can connect up to 245 client computers to the SBG901 using a combination of:
Wireless LAN (WLAN) vs. LAN for wired
Each computer needs appropriate network adapter hardware and driver software. The clients on
the Ethernet or wireless interfaces can share:
Internet access with a single Internet Service provider account, subject to Internet Service
provider terms and conditions
Files, printers, storage devices, multi-user software applications, games, and video
conferencing
Wireless and wired network connections use Windows networking to share files and
peripheral devices such as printers, CD-ROM drives, floppy disk drives, and external USB
drives.
1 Introduction 18
This document is uncontrolled pending incorporation in PDM
Wireless LAN
Wireless communication occurs over radio waves rather than a wire. Like a cordless telephone, a
WLAN uses radio signals instead of wires to exchange data. A wireless network eliminates the
need for expensive and intrusive wiring to connect computers throughout the home or office.
Mobile users can remain connected to the network even when carrying their laptop to different
locations in the home or office.
Each computer on a WLAN requires a wireless adapter.
Laptop PCs — Use a wireless notebook adapter in the PCMCIA slot or a wireless USB adapter.
Desktop PCs — Use a wireless PCI adapter, wireless USB adapter, or compatible product in the
PCI slot or USB port, respectively.
Figure 5 Sample Wireless Network Connections
To set up the SBG901 on a computer wired to the SBG901 with an Ethernet connection, perform
the procedures found on the Wireless Pages. Do not attempt to configure the SBG901 over a
wireless connection.
Your maximum wireless operation distance depends on the type of materials through which the
signal must pass and the location of your SBG901 and clients (stations). Motorola cannot
guarantee wireless operation for all supported distances in all environments.
1 Introduction 19
This document is uncontrolled pending incorporation in PDM
Wired Ethernet LAN
You can easily connect any PC with an Ethernet LAN port to the SBG901 Ethernet connection.
Because the SBG901 Ethernet port supports auto-MDIX, you can use straight-through or
cross-over cable to connect a hub, switch, or computer. Use category 5, or better, cabling for all
Ethernet connections.
Figure 6 Sample Ethernet to Computer Connection
The physical wiring arrangement has no connection to the logical network allocation of IP
addresses.
A wired Ethernet LAN with more than one computer requires one or more hubs, switches, or
routers. You can do the following:
Connect a hub or switch to the Ethernet port on the SBG901
Use Ethernet hubs, switches, or routers to connect up to 245 computers to the SBG901
A complete discussion of Ethernet cabling is beyond the scope of this document.
Security
The SBG901 provides the following:
A firewall to protect the SBG901 LAN from undesired attacks over the Internet
For wireless transmissions, data encryption and network access control
Network Address Translation (NAT) provides some security because the IP addresses of SBG901
LAN computers are not visible on the Internet.
1 Introduction 20
This document is uncontrolled pending incorporation in PDM
Firewall
The SBG901 firewall protects the SBG901 LAN from undesired attacks and other intrusions from
the Internet. It provides an advanced, integrated stateful-inspection firewall supporting intrusion
detection, session tracking, and denial-of-service attack prevention. The firewall:
Maintains state data for every TCP/IP session on the OSI network and transport layers
Monitors all incoming and outgoing packets, applies the firewall policy to each one, and
screens for improper packets and intrusion attempts
Provides comprehensive logging for all:
User authentications
Rejected internal and external connection requests
Session creation and termination
Outside attacks (intrusion detection)
You can configure the firewall filters to set rules for port usage. For information about choosing a
predefined firewall policy template, see the Firewall Pages.
DMZ
A de-militarized zone (DMZ) is one or more computers logically located outside the firewall
between an SBG901 LAN and the Internet. A DMZ prevents direct access by outside users to
private data.
For example, you can set up a web server on a DMZ computer to enable outside users to access
your website without exposing confidential data on your network.
A DMZ can also be useful to play interactive games that may have a problem running through a
firewall. You can leave a computer used for gaming only exposed to the Internet while protecting the
rest of your network. For more information, see Gaming Configuration Guidelines.
Port Triggering
When you run an application that accesses the Internet, it typically initiates communications with
a computer on the Internet. For some applications, especially gaming, the computer on the
Internet also initiates communications with your computer. Because NAT does not normally allow
these incoming connections:
If needed, you can configure additional port triggers on the Advanced Port Triggers Page.
1 Introduction 21
This document is uncontrolled pending incorporation in PDM
Wireless Security
Because WLAN data is transmitted using radio signals, it may be possible for an unauthorized
person to access your WLAN unless you prevent them from doing so. To prevent unauthorized
eavesdropping of data transmitted over your LAN, you must enable wireless security. The default
SBG901 settings neither provide security for transmitted data nor protect network data from
unauthorized intrusions.
The SBG901 provides the following wireless security measures, which are described on the
Wireless Pages.
To prevent unauthorized eavesdropping, you must encrypt data transmitted over the wireless
interface using one of the following:
If all of your wireless clients support Wi-Fi Protected Access (WPA or WPA2) encryption,
Motorola recommends using WPA2. Otherwise, configure a Wired Equivalency Privacy
(WEP) key on the SBG901 and each WLAN client.
To protect the wireless LAN from unauthorized intrusions (see Setting Up Your Wireless
LAN), you can do one or both of the following:
Restrict WLAN access to computers having known MAC addresses
Enable closed network operation by disabling SSID broadcasting
Port Forwarding
The SBG901 opens logical data ports when a computer on its LAN sends data, such as e-mail
messages or web data, to the Internet. A logical data port is different from a physical port, such
as an Ethernet port. Data from a protocol must go through certain data ports.
Some applications, such as games and video conferencing, require multiple data ports. If you
enable NAT, this can cause problems because NAT assumes that data sent through one port will
return to the same port. You may need to configure port forwarding to run applications with
special requirements.
To configure port forwarding, you must specify an inbound (source) port or range of ports. The
inbound port opens only when data is sent to the inbound port and closes again after a specified
time elapses with no data sent to it. You can configure up to 32 port forwarding entries using the
Advanced Port Forwarding Page.
1 Introduction 22
This document is uncontrolled pending incorporation in PDM
2 Getting Started
The following topics provide information about installing the SBG901 hardware:
Before You Begin
Precautions
Signing Up for Service
Computer System Requirements
Connecting the SBG901 to the Cable System
Cabling the LAN
Configuring TCP/IP
Wall Mounting Your SBG901
For information about WLAN setup, see Setting Up Your Wireless LAN.
Before You Begin
Before you begin the installation, check that the following items were included with your
Motorola SBG901 Gateway:
Table 3 Items Included with Your SBG901
Item Description
Power cord
Connects the SBG901 to a power adapter that connects
to an AC electrical outlet
Ethernet cable Connects to the Ethernet port
SBG901 Installation
CD-ROM
Contains SBG901 Installation Assistant, and this user
guide
SBG901 Install Sheet
Contains basic information for getting started with the
SBG901
2 Getting Started 23
This document is uncontrolled pending incorporation in PDM
You must have the latest service packs and patches installed on your computer for your operating
system. You will need 75-ohm coaxial cable with F-type connectors to connect the SBG901 to the
nearest cable outlet. If a TV is connected to the cable outlet, you may need a 5 to 900 MHz RF
splitter and two additional coaxial cables to use both the TV and the SBG901.
Determine the connection types you will make to the SBG901. Check that you have the required
cables, adapters, and adapter software. You may need:
Item Description
Wireless LAN Wireless adapter and driver software for each computer having a wireless
connection
Wired Ethernet Ethernet cables and network interface cards (NICs) with accompanying
installation software
LAN To connect more than one computer via an Ethernet connection to the SBG901
Precautions
Postpone SBG901 installation until there is no risk of thunderstorm or lightning activity in the
area.
To avoid potential shock, always unplug the power cord from the wall outlet or other power
source before disconnecting it from the SBG901 rear panel.
To prevent overheating the SBG901, do not block the ventilation holes on the sides of the unit.
Do not open the unit. Refer all service to your Internet Service provider.
Signing Up for Service
You must sign up with an Internet Service provider to access the Internet and other online
services. To activate your service, call your local Internet Service provider.
You need to provide the MAC address marked HFC MAC ID printed on the Bottom Label on the
SBG901. You can record it in the SBG901 Install Sheet.
You should ask your Internet Service provider the following questions:
Do you have any special system requirements?
When can I begin to use my SBG901?
Are there any files I need to download after connecting the SBG901?
Do I need a user name or password to access the Internet or use e-mail?
2 Getting Started 24
This document is uncontrolled pending incorporation in PDM
Computer System Requirements
You can connect Microsoft® Windows®, Macintosh®, UNIX®, or Linux® computers to the SBG901
LAN using one of the following:
Ethernet — 10Base-T or 10/100Base-T Ethernet adapter with proper driver software installed.
For user with Microsoft Vista™, please note the following information on driver support:
Vista OS support
Vista Home Basic (32 bit and 64 bit)
Vista Home Premium (32 bit and 64 bit)
Vista Business (32 bit and 64 bit)
Vista Ultimate (32 bit and 64 bit)
Please note the following Euro market versions without Windows Media Player:
Vista Home Basic (32 bit and 64 bit)
Vista Home Premium (32 bit and 64 bit)
Vista Business (32 bit and 64 bit)
Vista Ultimate (32 bit and 64 bit)
WirelessAny IEEE 802.11g or IEEE 802.11b device. This includes any Wi-Fi certified
wireless device, such as a cellular telephone equipped with this feature.
In addition, your computer must meet the following requirements:
PC with Pentium© class or better processor
Windows 2000, Windows XP, Windows Vista, Macintosh, Linux, or UNIX operating system
with operating system CD-ROM available
Minimum 256 MB RAM recommended
10 MB available hard disk space
You can use any web browser with the SBG901.
Connecting the SBG901 to the Cable System
Before starting, be sure the computer is turned on and the SBG901 is unplugged.
1. Connect one end of the coaxial cable to the cable outlet or splitter.
2. Connect the other end of the coaxial cable to the cable connector on the SBG901. Hand-
tighten the connectors to avoid damaging them.
3. Plug the power cord into the power connector on the SBG901.
4. Plug the power cord into the electrical outlet. This turns the SBG901 on. You do not need to
unplug it when not in use. The first time you plug in the SBG901, allow it 5 to 30 minutes to
find and lock on the appropriate communications channels.
2 Getting Started 25
This document is uncontrolled pending incorporation in PDM
Figure 7 Connecting the SBG901
Check that the lights on the front panel cycle through this sequence:
Table 4 SBG901 Light Activity During Startup
Light Description
POWER Turns on when AC power is connected to the SBG901.
Indicates that the power is connected properly.
RECEIVE Flashes while scanning for the downstream receive channel.
Changes to solid green when the receive channel is locked.
SEND Flashes while scanning for the upstream send channel.
Changes to solid green when the send channel is locked.
ONLINE Flashes during SBG901 registration and configuration.
Changes to solid green when the SBG901 is registered.
Cabling the LAN
After connecting to the cable system, you can connect your wired Ethernet LAN. Some sample
connections are shown in Wired Ethernet LAN. On each networked computer, you must install
proper drivers for the Ethernet adapter. Detailed information about network cabling is beyond the
scope of this document.
2 Getting Started 26
This document is uncontrolled pending incorporation in PDM
Obtaining an IP Address for an Ethernet Connection
You can use either of the following two options to obtain the IP address for the network interface
on your computer:
Retrieve the statically defined IP address and DNS address
Automatically retrieve the IP address using the Network DHCP server
The Motorola SBG901 gateway provides a DHCP server on its LAN. It is recommended that you
configure your LAN to obtain the IPs for the LAN and DNS server automatically.
Configuring TCP/IP
Make sure all client computers are configured for TCP/IP, which is a protocol for communication
between computers. Perform one of the following for the operating system you are running:
Configuring TCP/IP in Windows 2000
Configuring TCP/IP in Windows XP
Configuring TCP/IP in Windows Vista
For UNIX systems, follow the instructions in the applicable UNIX user documentation.
After configuring TCP/IP on your computer, you must verify the IP address. Perform one of the
following:
Verifying the IP Address in Windows 2000 or Windows XP
Verifying the IP Address in Windows Vista
For UNIX systems, follow the instructions in the applicable UNIX user documentation.
Your cable provider may provide additional instructions to set up your computer.
Configuring TCP/IP in Windows 2000
1. Select Control Panel from either the Windows Start menu or Windows Desktop to display
the Control Panel window.
2. Double-click Network and Dial-up Connections to display the Network and Dial-up
Connections window.
In the steps that follow, a connection number such as 1, 2, or 3 represents PCs with multiple
network interfaces. PCs having only one network interface may be represented as “Local
Area Connection.
3. Double-click Local Area Connection number to display the Local Area Connection number
Status window. The value of number varies from system to system.
2 Getting Started 27
This document is uncontrolled pending incorporation in PDM
Figure 8 Local Area Connection Status window
4. Click Properties to display the Local Area Connection number Properties window.
Information similar to the following is displayed.
Figure 9 Local Area Connection Properties window
5. If Internet Protocol (TCP/IP) is in the list of components, TCP/IP is installed. You can skip to
step 8.
6. If Internet Protocol (TCP/IP) is not in the list of components, click Install. The Select Network
Component Type window is displayed.
2 Getting Started 28
This document is uncontrolled pending incorporation in PDM
Figure 10 Select Network Component Type window
7. Click Protocol and then click Add. The Select Network Protocol window is displayed.
8. Click Internet Protocol (TCP/IP), and then click OK. The Local Area Connection number
Properties window is redisplayed.
Figure 11 Local Area Connection Properties window
9. Click Internet Protocol (TCP/IP), and then click Properties to display the Internet Protocol
(TCP/IP) Properties window.
10. Be sure Obtain an IP address automatically and Obtain DNS server address
automatically are selected.
11. Click OK to save the TCP/IP settings and exit the TCP/IP Properties window.
12. Click OK to exit the Local Area Connection Properties window.
13. Click OK when prompted to restart the computer and click OK again.
14. When you complete the TCP/IP configuration, go to Verifying the IP Address in Windows
2000 or Windows XP.
2 Getting Started 29
This document is uncontrolled pending incorporation in PDM
Configuring TCP/IP in Windows XP
1. On the Windows desktop, click Start to display the Start window.
2. Click Control Panel to display the Control Panel window. The display varies, depending on
the Windows XP view options. If the display is a Category view, as shown below, continue
with step 3. Otherwise, skip to step 5.
3. Click Network and Internet Connections to display the Network and Internet Connections
window.
Figure 12 Network and Internet Connections window
4. Click Network Connections to display the LAN or High-Speed connections. You can skip to
step 7.
5. If a Classic view similar to the screenshot below is displayed, double-click Network
Connections to display LAN or High-Speed Internet connections.
Figure 13 Windows XP Classic View Control Panel
6. Right-click the network connection. If more than one connection is displayed, be sure to
select the one for your network interface.
2 Getting Started 30
This document is uncontrolled pending incorporation in PDM
Figure 14 Network Connections window
7. Select Properties from the drop-down menu to display the Local Area Connection Properties
window. Be sure Internet Protocol (TCP/IP) is checked.
Figure 15 Local Area Connection Properties window
8. Select Internet Protocol (TCP/IP) and click Properties to display the Internet Protocol
(TCP/IP) Properties window.
9. Make sure Obtain an IP address automatically and Obtain DNS server address
automatically are selected.
10. Click OK to save the TCP/IP settings and exit the TCP/IP Properties window.
11. Click OK to exit the Local Area Connection Properties window.
12. When you complete the TCP/IP configuration, go to Verifying the IP Address in Windows
2000 or Windows XP.
2 Getting Started 31
This document is uncontrolled pending incorporation in PDM
Configuring TCP/IP in Windows Vista
1. On the Windows desktop, click Start to display the Start window.
2. Click Control Panel to display the Control Panel window.
3. Double-click Network and Internet and the Network and Internet window is displayed:
4. Double-click Network and Sharing Center and the Network and Sharing Center window is
displayed:
Figure 16 Network and Sharing Center window
5. Click Manage network connections and the LAN or High-Speed Internet connections
window is displayed:
Figure 17 LAN or High-Speed Internet connections window
2 Getting Started 32
This document is uncontrolled pending incorporation in PDM
6. Right-click the network connection and select Properties to display the Local Area
Connection Properties window:
Figure 18 Local Area Connection Properties window
7. If more than one connection is displayed, make sure to select the one for your network
interface.
Vista may prompt you to allow access to the Network Properties Options. If you see the
prompt, User Account Control -- Windows needs your permission to continue, click Continue.
8. Select Internet Protocol Version4 (TCP/IPv4) and click Properties to display the Internet
Protocol Version 4 (TCP/IPv4) Properties window.
Figure 19 Internet Protocol Version 4 (TCP/IPv4) Properties window
9. Make sure Obtain an IP address automatically and Obtain DNS server address
automatically are selected.
10. Click OK to save the TCP/IP settings and close the Internet Protocol Version 4 (TCP/IPv4)
Properties window.
2 Getting Started 33
This document is uncontrolled pending incorporation in PDM
11. Click OK to close the Local Area Connection Properties window.
12. Exit the Network Connections window.
13. Exit the Network and Sharing Center window and the Control Panel.
When you complete the TCP/IP configuration, go to Verifying the IP Address in Windows Vista.
Verifying the IP Address in Windows 2000 or Windows XP
To check the IP address:
1. On the Windows Desktop, click Start.
2. Select Run. The Run window is displayed.
3. Type cmd and click OK
4. Type ipconfig and press ENTER to display your IP configuration. A display, like below,
indicates a normal configuration:
Figure 20 IPCONFIG window 1 for Windows 2000 and XP
If an Autoconfiguration IP Address is displayed as in the window below, there is an incorrect
connection between your PC and the digital voice modem or there are cable network problems.
Figure 21 IPCONFIG window 2 for Windows 2000 and XP
Check the following:
Your cable connections
Whether you can see cable-TV channels on your television
After successfully verifying your cable connections and proper cable-TV operation, you can renew
your IP address.
2 Getting Started 34
This document is uncontrolled pending incorporation in PDM
Verifying the IP Address in Windows Vista
Do the following to verify the IP address:
1. On the Windows Vista desktop, click Start.
2. Click All Programs.
3. Click Accessories.
4. Click Run to display the Run window.
5. Type cmd and click OK to open a command prompt window.
6. Type ipconfig and press Enter to display the IP Configuration.
A display similar to the following indicates a normal configuration.
Figure 22 IPCONFIG window for Windows Vista
If an Autoconfiguration IP Address is displayed, there is an incorrect connection between the PC
and the SBG901, or there are broadband network problems.
Renewing Your IP Address
To renew your IP address in Windows 2000, Windows XP, or Windows Vista:
1. On the Windows Desktop, click Start.
2. Select Run. The Run window is displayed.
3. Type cmd and click OK.
4. Type ipconfig /renew and press ENTER. If a valid IP address is displayed as shown,
Internet access should be available.
2 Getting Started 35
This document is uncontrolled pending incorporation in PDM
Figure 23 Renew IPCONFIG window1
5. Type exit and press ENTER to return to Windows.
If after performing this procedure your computer cannot access the Internet, call your cable
provider for help.
Wall Mounting the SBG901
If you mount your SBG901 on the wall, you must:
Locate the unit as specified by the local or national codes governing residential or business
cable TV and communications services.
Follow all local standards for installing a network interface unit/network interface device
(NIU/NID).
If possible, mount the unit to concrete, masonry, a wooden stud, or some other very solid wall
material. Use anchors if necessary (for example, if you must mount the unit on drywall).
CAUTION: Before drilling holes, check the structure for potential damage to
water, gas, or electric lines.
Make sure the AC power plug is disconnected from the wall outlet and all cables are removed
from the back of the SBG901 before starting the installation.
You can mount the SBG901 horizontally or vertically. Do the following to mount your SBG901 on
the wall:
1. See Wall Mounting Template to print a copy of the template.
2. Click the Print icon or choose Print from the File menu to display the Print dialog box.
The sample Print dialogue window shown below may vary slightly on your computer,
depending upon your operating system.
2 Getting Started 36
This document is uncontrolled pending incorporation in PDM
Figure 24 Printer Settings for Wall Mounting Template
To print the template only, select Current page as the Print Range. Be sure you print the
template at 100% scale. Be sure No Scaling is selected for Scale to paper size.
3. Click OK to print the template.
4. Measure the printed template with a ruler to ensure that it is the correct size.
5. Use a center punch to mark the center of the holes.
6. On the wall, locate the marks for the mounting holes.
7. Drill the holes to a depth of at least 1 1/2 inches (3.8 cm). Use M3.5 x 38 mm (#6 x 11/2 inch)
screws with a flat underside and maximum screw head diameter of 9.0 mm to mount the
SBG901.
8. Using a screwdriver, turn each screw until part of it protrudes from the wall, as shown in the
following illustration.
6.0 mm (.24 inches) maximum
9.0 mm (.35 inches) maximum
2.5 mm (.10 inches).
Figure 25 Wall Mounting Screw Dimensions
There must be .10 inches (2.5 mm) between the wall and the underside of the screw head.
9. Place the SBG901 so the keyholes on the back of the unit are aligned above the mounting
screws.
2 Getting Started 37
This document is uncontrolled pending incorporation in PDM
10. Slide the SBG901 down until it stops against the top of the keyhole opening.
After mounting, reconnect the coaxial cable input and Ethernet connection. Plug the power cord
into the +12VDC connector on the cable modem and the electrical outlet. Route the cables so
that they are not a safety problem.
Wall Mounting Template
You can print the following page to use as a wall mounting template.
Be sure you print it at 100% scale. In the Print dialogue window, be sure that Scale to paper size
is set to No scaling in the Print dialog box.
Measure the printed template with a ruler to ensure that it is the correct size.
2 Getting Started 38
This document is uncontrolled pending incorporation in PDM
Figure 26 Wall Mounting Template
2 Getting Started 39
This document is uncontrolled pending incorporation in PDM
3 Basic Configuration
The following topics provide information about basic SBG901 configuration:
Starting the SBG901 Configuration Manager (CMGR)
SBG901 Menu Options Bar
Changing the SBG901 Default Password
Getting Help
Gaming Configuration Guidelines
Exiting the SBG901 Configuration Manager
For more advanced configuration information, see Configuring TCP/IP and Setting Up Your
Wireless LAN.
For normal operation, you do not need to change most default settings. The following caution
statements summarize the issues you must be aware of:
CAUTION: To prevent unauthorized configuration, change the default password
immediately when you first configure the SBG901. See Changing the SBG901
Default Password.
Firewalls are not foolproof. Choose the most secure firewall policy you can. See
the Firewall Pages.
If you are using a wired LAN only and have no wireless clients, be sure you
disable the wireless interface. See Wireless 802.11b/g Basic Page to disable.
Starting the SBG901 Configuration Manager (CMGR)
The SBG901 Configuration Manager (CMGR) allows you to change and view the settings on your
SBG901.
1. Open the web browser on a computer connected to the SBG901 over an Ethernet
connection.
Note: Do not attempt to configure the SBG901 over a wireless connection.
2. In the Address or Location field of your browser, type http://192.168.0.1 and press
ENTER.
3 Basic Configuration 40
This document is uncontrolled pending incorporation in PDM
3. Type admin in the Username field (this field is case-sensitive).
4. Type motorola in the Password field (this field is case-sensitive).
5. Click Login to display the SBG901 Status Connection page.
The Status Connection page provides the following status information on the network connection
of the SBG901:
RF Downstream Channel, which uses lower cable frequencies to transmit data
RF Upstream Channel, which uses higher cable frequencies to receive data
Click the Refresh button in your web browser any time you want to refresh the information on
this page.
If you have any problems starting the SBG901 Configuration Manager (CMGR), see
Troubleshooting for information.
3 Basic Configuration 41
This document is uncontrolled pending incorporation in PDM
SBG901 Menu Options Bar
The SBG901 Menu Options bar is displayed along the top of the SBG901 Configuration Manager
window. When a menu option is selected, a top-level page for that option is displayed.
Table 5 Configuration Manager Menu Option Bar
Menu Option Pages Function
Status Provides information about the SBG901 hardware and software, MAC
address, cable modem IP address, serial number, and related information.
You can also monitor your cable system connection. Additional pages
provide diagnostic tools and allow you to change your SBG901 user name
and password.
Basic Views and configures SBG901 IP-related configuration data, including
Network Configuration, WAN Connection Type, DHCP, and DDNS. The
Backup option allows you to save your SBG901 configuration on your PC.
Advanced Configures and monitors how the SBG901 routes IP traffic
Firewall Configures and monitors the SBG901 firewall
Parental Control Configures and monitors the SBG901 parental control feature
Wireless Configures and monitors SBG901 wireless networking features
Logout Exits the SBG901 Configuration Manager
CAUTION: To prevent unauthorized configuration, immediately change the
default password when you first configure your Motorola SBG901.
SBG901 Submenu Options
Additional features for each menu option are displayed by clicking a Submenu Option in the left
panel of each page. When selected, the submenu option will be highlighted in yellow.
3 Basic Configuration 42
This document is uncontrolled pending incorporation in PDM
Changing the SBG901 Default Password
Do the following to change the default password:
1. On the SBG901 Status page, click the Security submenu option.
2. In the Password Change Username field, type your new User Name.
3. In the New Password field, type your new password (this field is case sensitive).
4. In the Re-Enter New Password field, type your new password again (this field is case
sensitive).
5. In the Current Username Password field, type your old password.
6. Click Apply to save your changes.
Restore Factory Defaults
To reset the user name and password back to the original factory settings:
1. Select Ye s , and then click Apply.
2. You must login with the default user name, admin, and password, motorola, after applying
this change. All entries are case-sensitive.
3 Basic Configuration 43
This document is uncontrolled pending incorporation in PDM
Getting Help
To retrieve help information for any menu option, click help on that page. As an example, the
Firewall help page is shown below:
You can use the Windows scroll bar to view additional items on the help screens.
Gaming Configuration Guidelines
The following provides information about configuring the SBG901 firewall and DMZ for gaming.
Configuring the Firewall for Gaming
By default, the SBG901 firewall is enabled. If, as recommended, you keep the firewall enabled,
refer to the game’s documentation to ensure that the necessary ports are open for use by that
game.
The pre-defined SBG901 firewall policies affect Xbox LIVE® as follows:
On the Firewall Web Content Filter Page, you may need to disable Firewall Protection and IP
Flood Detection.
3 Basic Configuration 44
This document is uncontrolled pending incorporation in PDM
Configuring Port Triggers
Because the SBG901 has pre-defined port triggers for games using any of the following
applications, no user action is required to enable them:
ALG for MSN
MSN Games by Zone.com
You may need to create custom port triggers to enable other games to operate properly. To
create custom port triggers, see the Advanced Port Triggers Page.
Configuring a Gaming DMZ Host
CAUTION: The gaming DMZ host is not protected by the firewall. It is open to
communication or hacking from any computer on the Internet. Consider carefully
before configuring a device to be in the DMZ.
Some games and game devices require one of:
The use of random ports
The forwarding of unsolicited traffic
For example, to connect a PlayStation®2 for PS2® online gaming, designate it as the gaming DMZ
host because the ports required vary from game to game. For these games, Motorola
recommends configuring the gaming computer or device as a gaming DMZ device.
To configure a gaming DMZ device, on the Basic DHCP Page:
1. Reserve a private IP address for the computer or game device MAC address.
2. Designate the device as a DMZ device.
You can reserve IP addresses for multiple devices, but only one can be designated as the gaming
DMZ at once.
Exiting the SBG901 Configuration Manager
To logoff and close the SBG901 Configuration Manager:
Click Logout on the SBG901 Menu Options bar
3 Basic Configuration 45
This document is uncontrolled pending incorporation in PDM
3 Basic Configuration 46
This document is uncontrolled pending incorporation in PDM
4 Status Pages
The SBG901 Status pages provide information about the SBG901 hardware and software, MAC
address, cable modem IP address, serial number, and related information. You can also monitor
your cable system connection. Additional pages provide diagnostic tools and allow you to change
your SBG901 user name and password.
You can click any Status submenu option to view or change the status information for that option.
Status Software Page
This page displays information about the hardware version, software version, MAC address, cable
modem IP address, serial number, system "up" time, and network registration status.
Figure 27 Status Software Page
4 Status Pages 47
This document is uncontrolled pending incorporation in PDM
Status Connection Page
This page provides the HFC and IP network connectivity status of the SBG901 cable modem.
You can click the Refresh button in your web browser to refresh the information on this page at
any time.
Figure 28 Status Connection Page
Table 6 Field Descriptions for the Status Connection Page
Field Description
Startup Procedure Startup status information about the cable modem.
Downstream Channel Status information about the RF downstream channels, including
downstream channel frequency and downstream signal power
and modulation.
Upstream Channel Status information about the RF upstream channels, including
upstream channel ID and upstream signal power and
modulation.
4 Status Pages 48
This document is uncontrolled pending incorporation in PDM
Status Security Page
This page allows you to define administrator access privileges by changing your SBG901 user
name and password. It also allows you to reset your user name and password to the default
setting.
Figure 29 Change User Information window
Changing the SBG901 Default Password
1. In the Password Change Username field, type your new User Name.
2. In the New Password field, type your new password (this field is case sensitive).
3. In the Re-Enter New Password field, type your new password again (this field is case
sensitive).
4. In the Current Username Password field, type your old password.
5. Select Ye s if you want to reset the user name and password to the original factory settings.
6. Click Apply to update the user name password.
Note: You must login with the default user name, admin, and password,
motorola, after applying the restore factory settings change.
Status Diagnostics Page
This page provides the following diagnostic tools for troubleshooting your IP connectivity
problems:
Ping (LAN)
Traceroute (WAN)
4 Status Pages 49
This document is uncontrolled pending incorporation in PDM
Ping Utility
Ping (Packet InterNet Groper) allows you to check connectivity between the SBG901 and other
devices on the SBG901 LAN. This utility sends a small packet of data and then waits for a reply.
When you Ping a computer IP address and receive a reply, it confirms that the computer is
connected to the SBG901.
Figure 30 Ping Utility window
Testing Network Connectivity with the SBG901
Perform the following steps to check connectivity between the SBG901 and other devices on the
SBG901 LAN:
1. Select Ping from the Select Utility drop-down list.
2. Enter the IP address of the computer you want to Ping in the Target field.
3. Enter the data packet size in bytes in the Ping Size field.
4. Enter the number of ping attempts in the No. of Pings field.
5. Enter the time between Ping send operations in milliseconds in the Ping Interval field.
6. Click Start Test to begin the Ping operation. The Ping results will display in the Results pane.
7. You can click Abort Test at any time during the test to stop the Ping operation.
8. Repeat steps 2 through 6 for each device you want to ping.
When done, click Clear Results to delete the Ping results in the Results pane.
4 Status Pages 50
This document is uncontrolled pending incorporation in PDM
Traceroute Utility
Traceroute allows you to map the network path from the SBG901 Configuration Manager to a
public host. Selecting Traceroute from the Select Utility drop-down list will present alternate
controls for the Traceroute utility.
Figure 31 Traceroute Utility window
1. Enter the IP address or Host Name of the computer you want to target for the Traceroute
operation in the Target field.
2. Enter the maximum number of hops that the Traceroute operation performs before stopping
in the Max Hops field.
3. Enter the data packet size in bytes in the Data Size field.
4. Set the base UDP port number used by Traceroute in the Base Port field. The default is
33434. If a UDP port is not available, this field can be used to specify an unused port range.
5. In the Resolve Host field, select On to list the names of hosts found during the Traceroute
operation, or select Off to list only the hosts IP addresses.
6. After entering the Traceroute parameters, click Start Test to begin the Traceroute operation.
The Traceroute results will display in the Results pane.
When done, click Clear Results to delete the Traceroute results in the Results pane.
4 Status Pages 51
This document is uncontrolled pending incorporation in PDM
Status Event Log Page
This page lists the critical system events in chronological order. A sample Event log is shown
below:
Figure 32 Status Event Log Page
Table 7 Descriptions for the Status Event Log Page
Field Description
Time Indicates the date and time the error occurred
Priority Indicates the level of importance of the error
Description A brief definition of the error
4 Status Pages 52
This document is uncontrolled pending incorporation in PDM
5 Basic Pages
The SBG901 Basic Pages allow you to view and configure SBG901 IP-related configuration data,
including Network Configuration, WAN Connection Type, DHCP, and DDNS. The Backup option
allows you to save a copy of your SBG901 configuration on your PC.
You can click any Basic submenu option to view or change the configuration information for that
option.
Basic Setup Page
This page allows you to configure the basic features of your SBG901 gateway related to your ISP
connection.
Figure 33 Basic Setup Page
5 Basic Pages 53
This document is uncontrolled pending incorporation in PDM
Table 8 Field Descriptions for the Basic Setup Page
Field Description
NAPT mode NAPT is a special case of NAT, where many IP numbers are hidden behind
a number of addresses. In contrast to the original NAT, however, this does
not mean there can be only that number of connections at a time.
In NAPT mode, an almost arbitrary number of connections are multiplexed
using TCP port information. The number of simultaneous connections is
limited by the number of addresses multiplied by the number of available
TCP ports.
LAN
IP Address Enter the IP address of the SBG901 on your private LAN.
MAC Address Media Access Control address — a set of 12 hexadecimal digits assigned
during manufacturing that uniquely identifies the hardware address of the
SBG901 Access Point.
WAN
IP Address The public WAN IP address of your SBG901 device, which is either
dynamically or statically assigned by your ISP.
MAC Address Media Access Control address — a set of 12 hexadecimal digits assigned
during manufacturing that uniquely identifies the hardware address of the
SBG901 Access Point.
Duration Describes how long before your Internet connection expires. The WAN
lease will automatically renew itself when it expires.
Expires Displays the exact time and date the WAN lease expires.
Release WAN Lease Click to release WAN lease.
Renew WAN Lease Click to renew WAN lease.
WAN Connection Type DHCP or Static IP
If your ISP uses DHCP, select DHCP and enter a Host Name and Domain
name, if required.
If your ISP uses static IP addressing, select Static IP and enter the
information provided by your ISP for Static IP Address, Static IP Mask,
Default Gateway, Primary DNS, and Secondary DNS.
5 Basic Pages 54
This document is uncontrolled pending incorporation in PDM
5 Basic Pages 55
This document is uncontrolled pending incorporation in PDM
Field Description
Host Name If the WAN Connection Type is DHCP, enter a Host Name if required by
your ISP.
Domain Name If the WAN Connection Type is DHCP, enter a Domain Name if required
by your ISP.
MTU Size Maximum Transmission Unit (MTU) is the largest size packet or frame that
can be sent. The default value is suitable for most users.
Spoofed MAC Address If the WAN Connection Type is Static IP, enter the information provided by
your ISP for Static IP Address, Static IP Mask, Default Gateway, Primary
DNS, and Secondary DNS.
When done, click Apply to save your changes.
Basic DHCP Page
This page allows you to configure and view the status of the optional internal SBG901 DHCP
(Dynamic Host Configuration Protocol) server for the LAN.
Figure 34 Basic DHCP Page
CAUTION: Do not modify these settings unless you are an experienced network
administrator with strong knowledge of IP addressing, subnetting, and DHCP.
Table 9 Field Descriptions for the Basic DHCP Page
Field Description
DHCP Server Select Yes to enable the SBG901 DHCP Server.
Select No to disable the SBG901 DHCP Server.
Starting Local Address Enter the starting IP address to be assigned by the SBG901 DHCP
server to clients in dotted-decimal format. The default is 192.168.0.2.
Number of CPEs Sets the number of clients for the SBG901 DHCP server to assign a
private IP address. There are 245 possible client addresses. The
default is 245.
Lease Time Sets the time in seconds that the SBG901 DHCP server leases an IP
address to a client. The default is 3600 seconds (60 minutes).
DHCP Clients Lists DHCP client device information.
When done, click Apply to save your changes.
To renew a DHCP client IP address, choose Select and then click Force Available.
Basic DDNS Page
This page allows you to set up the Dynamic Domain Name System (DDNS) service. The DDNS
service allows you to assign a static Internet domain name to a dynamic IP address, which allows
your SBG901 to be more easily accessed from various locations on the Internet.
Figure 35 Basic DDNS Page
5 Basic Pages 56
This document is uncontrolled pending incorporation in PDM
Table 10 Field Descriptions for Basic DDNS Page
Field Description
DDNS Service Select Disable or wwwDynDNS.org to enable the DDNS Service.
User Name Enter your DynDNS user name.
Password Enter your DynDNS Password.
Host Name Enter your DDNS Host Name.
IP Address Lists IP information.
Status Displays the DDNS service status: enabled or disabled
When done, click Apply to save your changes.
Basic Backup Page
This page allows you to save your current SBG901 configuration settings locally on your computer
or restore previously saved configurations.
Figure 36 Basic Backup Page
Table 11 Field Descriptions for the Basic Backup Page
Field Description
Restore Lets you restore a previously saved configuration.
Backup Lets you create a backup copy of the current configuration.
Restoring Your SBG901 Configuration
1. Type the path with the file name where the backup file is located on your computer, or click
Browse to locate the file.
2. Click Restore to recreate your previously saved SBG901 settings.
5 Basic Pages 57
This document is uncontrolled pending incorporation in PDM
Backing Up Your SBG901 Configuration
1. Type the path with the file name where you want to store your backup file on your computer,
or click Browse to locate the file.
2. Click Backup to create a backup of your SBG901 settings.
5 Basic Pages 58
This document is uncontrolled pending incorporation in PDM
6 Advanced Pages
The SBG901 Advanced Pages allow you to configure the advanced features of the SBG901,
including IP Filtering, MAC Filtering, Port Filtering, Port Forwarding, Port Triggers, DMZ Host, and
Routing Information Protocol Setup.
You can click any Advanced submenu option to view or change the advanced configuration
information for that option.
Advanced Options Page
This page allows you to set the operating modes for adjusting how the SBG901 device routes IP
traffic.
Figure 37 Advance Options Page
6 Advanced Pages 59
This document is uncontrolled pending incorporation in PDM
Table 12 Field Descriptions for the Advanced Options Page
Field Description
WAN Blocking Prevents the SBG901 Configuration Manager or the PCs behind it
from being visible to other computers on the SBG901 WAN.
Checkmark Enable to turn on this option or uncheck to disable it.
IPsec Pass-Through Enables the IPsec Pass-Through protocol to be used through the
SBG901 Configuration Manager so that a VPN device (or software)
may communicate properly with the WAN.
Checkmark Enable to turn on this option or uncheck to disable it.
PPTP Pass-Through Enables the Point-to-Point Tunneling Protocol (PPTP) Pass-Through
protocol to be used through the SBG901 Configuration Manager so
that a VPN device (or software) may communicate properly with
the WAN.
Checkmark Enable to turn on this option or uncheck to disable it.
Remote Configuration
Management
Allows remote access to the SBG901 Configuration Manager. This
enables you to configure the SBG901 WAN by accessing the WAN
IP address at Port 8080 of the configuration manager from
anywhere on the Internet. For example, in the browser URL
window, type http://WanIPAddress:8080/ to access the SBG901
Configuration Manager remotely.
Checkmark Enable to turn on this option or uncheck to disable it.
Multicast Enable Allows multicast-specific traffic (denoted by a multicast specific
address) to be passed to and from the PCs on the private network
behind the configuration manager.
Checkmark Enable to turn on this option or uncheck to disable it.
UPnP Enable Turns on the Universal Plug and Play protocol (UPnP) agent in the
configuration manager. If you are running a CPE (client) application
that requires UPnP, select this box.
Checkmark Enable to turn on this option or uncheck to disable it.
When done, click Apply to save your changes.
6 Advanced Pages 60
This document is uncontrolled pending incorporation in PDM
Advanced IP Filtering Page
This page allows you to define which local PCs will be denied access to the SBG901 WAN. You
can configure IP address filters to block Internet traffic to specific network devices on the LAN by
entering starting and ending IP address ranges. Note that you only need to enter the LSB (Least-
significant byte) of the IP address; the upper bytes of the IP address are set automatically from
the SBG901 Configuration Managers IP address.
The Enabled option allows you to store filter settings commonly used but not have them active.
Figure 38 Advanced IP Filtering Page
Table 13 Field Descriptions for the Advanced IP Filtering Page
Field Description
Start Address Enter the starting IP address range of the computers for which you want
to deny access to the SBG901 WAN. Be sure to only enter the least
significant byte of the IP address.
End Address Enter the ending IP address range of the computers you want to deny
access to the SBG901 WAN. Be sure to only enter the least significant
byte of the IP address.
Enabled Activates the IP address filter, when selected.
Checkmark Enabled for each range of IP addresses you want to deny
access to the SBG901 WAN.
When done, click Apply to activate and save your settings.
6 Advanced Pages 61
This document is uncontrolled pending incorporation in PDM
Advanced MAC Filtering Page
This page allows you to define Media Access Control (MAC) address filters to prevent PCs from
sending outgoing TCP/UDP traffic to the WAN via their MAC addresses. This is useful because
the MAC address of a specific NIC card never changes, unlike its IP address, which can be
assigned via the DHCP server or hard-coded to various addresses over time.
Figure 39 Advanced MAC Filtering Page
Table 14 Field Descriptions for the Advanced MAC Filtering Page
Field Description
MAC xx Media Access Control address — a unique set of 12 hexadecimal digits
assigned to a PC during manufacturing
Setting a MAC Address Filter
1. Enter the MAC address in the MAC xx field for each PC you want to block.
2. When done, click Apply.
6 Advanced Pages 62
This document is uncontrolled pending incorporation in PDM
Advanced Port Filtering Page
This page allows you to define port filters to prevent all devices from sending outgoing TCP/UDP
traffic to the WAN on specific IP port numbers. By specifying a starting and ending port range,
you can determine what TCP/UDP traffic is allowed out to the WAN on a per-port basis.
Note: The specified port ranges are blocked for ALL PCs, and this setting is not
IP address or MAC address specific. For example, if you wanted to block all PCs
on the private LAN from accessing HTTP sites (or "web surfing"), you would set
the "Start Port" to 80, "End Port" to 80, "Protocol" to TCP, checkmark Enabled,
and then click Apply.
Figure 40 Advanced Port Filtering Page
Table 15 Field Descriptions for the Advanced Port Filtering Page
Field Description
Start Port Enter the starting port number.
End Port Enter the ending port number.
Protocol Select TCP, UDP, or Both
Enabled Checkmark for each port that you want to activate the IP port filters.
6 Advanced Pages 63
This document is uncontrolled pending incorporation in PDM
Advanced Port Forwarding Page
This page allows you to run a publicly accessible server on the LAN by specifying the mapping of
TCP/UDP ports to a local PC. This enables incoming requests on specific port numbers to reach
web servers, FTP servers, mail servers, etc. so that they can be accessible from the public
Internet.
Figure 41 Advanced Port Forwarding Page
A table of commonly used Port numbers is also displayed on the page for your convenience.
To map a port, you must enter the range of port numbers that should be forwarded locally and
the IP address to which traffic to those ports should be sent. If only a single port specification is
desired, enter the same port number in the "start" and "end" locations for that IP address.
The ports used by some common applications are:
FTP: 20, 21
HTTP: 80
NTP: 123
Secure Shell: 22
SMTP e-mail: 25
Telnet: 23
6 Advanced Pages 64
This document is uncontrolled pending incorporation in PDM
Advanced Port Triggers Page
This page allows you to configure dynamic triggers to specific devices on the LAN. This allows for
special applications that require specific port numbers with bi-directional traffic to function
properly. Applications such as video conferencing, voice, gaming, and some messaging program
features may require these special settings.
The Advanced Port Triggers are similar to Port Forwarding except that they are not static ports
held open all the time. When the Configuration Manager detects outgoing data on a specific IP
port number set in the "Trigger Range," the resulting ports set in the "Target Range" are opened
for incoming (sometimes referred to as bi-directional ports) data. If no outgoing traffic is detected
on the "Trigger Range" ports for 10 minutes, the "Target Range" ports will close. This is a safer
method for opening specific ports for special applications (e.g. video conferencing programs,
interactive gaming, file transfer in chat programs, etc.) because they are dynamically triggered
and not held open constantly or erroneously left open via the router administrator and exposed
for potential hackers to discover.
Figure 42 Advanced Port Triggers Page
Table 16 Field Descriptions for the Advanced Port Triggers Page
Field Description
Trigger Range
Start Port The starting port number of the Port Trigger range.
End Port The ending port number of the Port Trigger range.
6 Advanced Pages 65
This document is uncontrolled pending incorporation in PDM
6 Advanced Pages 66
This document is uncontrolled pending incorporation in PDM
Field Description
Target Range
Start Port The starting port number of the Port Trigger range.
End Port The ending port number of the Port Trigger range.
Protocol Choice, TCP, UDP, or Both
Enable Select checkbox to activate the IP port triggers.
Advanced DMZ Host Page
This page allows you to specify the "default" recipient of WAN traffic that NAT is unable to
translate to a known local PC. The DMZ (De-militarized Zone) hosting (also commonly referred to
as "Exposed Host") can also be described as a computer or small sub-network that sits between
the trusted internal private LAN and the untrusted public Internet.
Figure 43 Advanced DMZ Host Page
You may configure one PC to be the DMZ host. This setting is generally used for PCs using
"problem" applications that use random port numbers and do not function correctly with specific
port triggers or the port forwarding setups mentioned earlier. If a specific PC is set as a DMZ
Host, remember to set this back to "0" when you are finished with the needed application, since
this PC will be effectively exposed to the public Internet, though still protected from Denial of
Service (DoS) attacks via the Firewall.
Setting Up the DMZ Host
1. Enter the computer’s IP address.
2. Click Apply to activate the selected computer as the DMZ host.
Advanced Routing Information Protocol Setup Page
This page allows you to configure Routing Information Protocol (RIP) parameters related to
authentication, destination IP address/subnet mask, and reporting intervals. RIP automatically
identifies and uses the best known and quickest route to any given destination address. To help
reduce network congestion and delays, the Advanced RIP setup is used in WAN networks to
identify and use the best known and quickest route to given destination addresses.
RIP is a protocol that requires negotiation from both sides of the network (i.e., CMRG and
CMTS). The ISP would normally set this up to match their CMTS settings with the configuration
in the CMRG.
Note: RIP messaging will only be sent upstream when running in Static IP
Addressing mode on the Basic Setup page. You must enable Static IP
Addressing and then set the WAN IP network information! RIP is normally a
function that is tightly controlled via the ISP. RIP Authentication Keys and IDs are
normally held as secret information from the end user to prevent unauthorized
RIP settings.
Figure 44 Advanced RIP Setup Page
6 Advanced Pages 67
This document is uncontrolled pending incorporation in PDM
Table 17 Field Descriptions for the Advanced RIP Setup Page
Field Description
RIP Enable Enables or disables the RIP protocol.
This protocol helps the router dynamically adapt to the changes in
the network. RIP is now considered obsolete since newer routing
protocols, such as OSPF and ISIS, have been introduced.
RIP Authentication If this field is enabled, a plain text password or a shared key
authentication is added to the RIP packet in order for the CPE and
the wireless router to authenticate each other.
RIP Authentication Key Used to encrypt the plain text password that is enclosed in each
RIP packet.
If you are using the shared key authentication in RIP, you will need
to provide a key.
RIP Authentication Key ID An unsigned 8-bit field in the RIP packet. This field identifies the
key used to create the authentication data for the RIP packet, and it
also indicates the authentication algorithm.
RIP Reporting Interval Determines how long before a RIP packet is sent out to the CPE.
RIP Destination IP Address Location where the RIP packet is sent to update the routing table in
your CPE.
RIP Destination IP Subnet Mask Specifies which CPE you want to receive the RIP packet.
6 Advanced Pages 68
This document is uncontrolled pending incorporation in PDM
7 Firewall Pages
The SBG901 Firewall Pages allow you to configure the SBG901 firewall filters and firewall alert
notifications.
You can click any Firewall submenu option to view or change the firewall configuration
information for that option.
For information about how the firewall can affect gaming, see Gaming Configuration Guidelines.
The predefined policies provide outbound Internet access for computers on the SBG901 LAN.
The SBG901 firewall uses stateful-inspection to allow inbound responses when there already is
an outbound session running that corresponds to the data flow. For example, if you use a web
browser, outbound HTTP connections are permitted on port 80. Inbound responses from the
Internet are allowed because an outbound session is established.
When required, you can configure the SBG901 firewall to allow inbound packets without first
establishing an outbound session. You also need to configure a port forwarding entry on the
Advanced Port Forwarding Page or a DMZ client on the Advanced DMZ Host Page.
Firewall Web Content Filter Page
This page allows you to configure the firewall by enabling or disabling various Web filters related
to blocking or exclusively allowing different types of data through the Configuration Manager
from the WAN to the LAN.
Java Applets, Cookies, ActiveX controls, popup windows, and Proxies can be blocked from this
page. Firewall Protection turns on the Stateful Packet Inspection (SPI) firewall features. Block
Fragmented IP packets prevent all fragmented IP packets from passing through the firewall. Port
Scan Detection detects and blocks port scan activity originating on both the LAN and WAN. IP
Flood Detection detects and blocks packet floods originating on both the LAN and WAN.
7 Firewall Pages 69
This document is uncontrolled pending incorporation in PDM
Figure 45 Firewall Web Content Filter Page
Checkmark Enable for each Web filter you want to set for the firewall, and then click Apply. The
Web filters will activate without having to reboot the SBG901 Configuration Manager.
Note: At least one Web filter or feature must be enabled for the firewall to be
active. Make sure the firewall is not disabled.
7 Firewall Pages 70
This document is uncontrolled pending incorporation in PDM
Firewall Local Log Page
This page allows you to set up how to send notification of the firewall event log in either of the
following formats:
Individual e-mail alerts sent out automatically each time the firewall is under attack
Local log is stored within the modem and displayed in table form on the Local Log page
Figure 46 Firewall Local Log Page
Table 18 Field Descriptions for the Firewall Local Log Page
Field Description
Contact Email Address Your email address
SMTP Server Name Name of the e-mail (Simple Mail Transfer Protocol) server.
The firewall page needs your email server name to send a
firewall log to your email address. You can obtain the SMTP
server name from your Internet service provider.
E-mail Alerts Enable or disable e-mailing firewall alerts.
7 Firewall Pages 71
This document is uncontrolled pending incorporation in PDM
Firewall Remote Log Page
This page allows you to send firewall attack reports out to a standard SysLog server so many
instances can be logged over a long period of time. You can select individual attack or
configuration items to send to the SysLog server so that only the items of interest will be
monitored. You can log permitted connections, blocked connections, known Internet attack types,
and CMRG configuration events. The SysLog server must be on the same network as the Private
LAN behind the Configuration Manager (typically 192.168.0.x). To activate the SysLog monitoring
feature, check all desired event types to monitor and enter the last byte of the IP address of the
SysLog server. Normally, the IP address of this SysLog server would be hard-coded so that the
address does not change and always agrees with the entry on this page.
Figure 47 Firewall Remote Log Page
Table 19 Field Description for the Firewall Remote Log Page
Field Description
Permitted Connections Check for the server to e-mail you logs of who is connecting to
your network.
Blocked Connections Check for the server to e-mail you logs of who is blocked from
connecting to your network.
Known Internet Attacks Check for the server to e-mail you logs of known Internet attacks
against your network.
Product Configuration Events Check for the server to e-mail you logs of the basic product
configuration events logs.
To SysLog server at 192.168.0. Enter the last digits from 10 to 254 of your SysLog server’s IP
address.
When done, click Apply.
7 Firewall Pages 72
This document is uncontrolled pending incorporation in PDM
8 Parental Control Pages
The SBG901 Parental Control Pages allow you to configure access restrictions to a specific
device connected to the SBG901 LAN.
You can click any Parental Control submenu option to view or change the configuration
information for that option.
Parental Control User Setup Page
This page is the master page. Each user is linked to a specified time access rule, content filtering
rule, and login password to get to the filtered content. You may also specify a user as a "trusted
user," which means that person will have access to all Internet content regardless of the filters
that you define. You can use the Trusted User checkbox as a simple override to grant a user full
access, while storing all of the filtering settings for easy availability.
You can also enable Internet session duration timers, which set a limited amount of time for
Internet access from the rules you select. The user must enter their password only the first time
to access the Internet. It is not necessary to enter the password each time a new web page is
accessed. In addition, there is a password inactivity timer. If there is no Internet access for the
specified time in minutes, the user must login again. These timed logins ensure that a specific
user uses the Internet gateway appropriately.
8 Parental Control Pages 73
This document is uncontrolled pending incorporation in PDM
Figure 48 Parental Control User Setup Page
Table 20 Field Descriptions for the Parental Control User Setup Page
Field Description
Add User Adds a user to set the parental controls for a specific user.
User Settings Select the user for whom you want to modify access restrictions.
Checkmark Enable to select the user.
Click Remove User to delete the user from Parental Controls.
Password Enter a user password to log onto the Internet.
Re-Enter Password Enter the password again for confirmation.
Trusted User The selected user will have full access to Internet content, thus
overriding any set filters.
Checkmark Enable to override set filters without having to turn off
filter settings.
Content Rule Used to specify which websites a selected user is allowed to access.
Check White List Access Only and choose a user from the drop-
down list.
Time Access Rule You can choose a rule that restricts when a selected user can use the
Internet.
8 Parental Control Pages 74
This document is uncontrolled pending incorporation in PDM
8 Parental Control Pages 75
This document is uncontrolled pending incorporation in PDM
Field Description
Session Duration You can set the amount of time a selected user can use the Internet.
Inactivity time You can set the amount of inactivity time before the Internet
automatically closes for a selected user.
Trusted Computers You can enter a selected user’s CPE MAC address so that CPE can
access the Internet without being censored by the Parental Control.
When done entering the MAC address, click Add.
When done, click Apply to activate and save any changes you made.
Parental Control Basic Setup Page
This page allows you to set rules to block certain kinds of Internet content and certain Web sites.
Figure 49 Parental Control Basic Setup Page
After you have changed your Parental Control settings, click the appropriate Apply, Add, or
Remove button.
Click Refresh in your web browser window to view your current settings.
Parental Control ToD Access Policy Page
This page allows you to block all Internet traffic to and from specified devices on your SBG901
network based on the day and time settings you specify. You can set policies to block Internet
traffic for the entire day or just certain time periods within each day for specific users. You can
add up to 30 eight-character categories (filter names) with different day and time settings. You
enter a name for each time filter in the Add New Policy field. Any time filter for Internet access
can be enabled or disabled at any time.
The time filters for limited Internet access are applied for each user in the Time Access Rule field
on the Parental Control User Setup Page.
Figure 50 Parental Control ToD Access Policy Page
Once each category change has been made, the user must click Apply at the bottom of the page
to store and activate the settings. These same category names for blocking profiles show up in
the Parental Control section on the User Setup page in the "Time Access Rules" section. On that
page, each user can be assigned up to four of these categories simultaneously.
8 Parental Control Pages 76
This document is uncontrolled pending incorporation in PDM
Parental Control Event Log Page
This page displays the Parental Control event log report. The event log is a running list of the last
30 Parental Control access violations, which include the following items on Internet traffic:
If the user's Internet access is blocked (time filter)
If a blocked keyword is detected in the URL
If a blocked domain is detected in the URL
If the online lookup service detects that the URL falls under a blocked category
Figure 51 Parental Control Event Log Page
8 Parental Control Pages 77
This document is uncontrolled pending incorporation in PDM
8 Parental Control Pages 78
This document is uncontrolled pending incorporation in PDM
9 Wireless Pages
The SBG901 Wireless Pages allow you to configure your wireless LAN (WLAN). You can click any
Wireless submenu option to view or change the configuration information for that option. WPA or
WPA2 encryption provides higher security than WEP encryption, but older wireless client cards
may not support the newer WPA or WPA2 encryption methods.
Setting Up Your Wireless LAN
You can use the SBG901 as an access point for a wireless LAN (WLAN) without changing its
default settings.
CAUTION: To prevent unauthorized eavesdropping or access to WLAN data, you
must enable wireless security. The default SBG901 settings provide no wireless
security. After your WLAN is operational, be sure to enable wireless security
To enable security for your WLAN, you can do the following on the SBG901:
Table 21 Enabling Wireless Security on Your LAN
To Perform Use in SBG901 Configuration Mgr
Encrypt wireless transmissions
and restrict WLAN access
Encrypting Wireless LAN
Transmissions
Wireless 802.11b/g Privacy Page
Further prevent unauthorized
WLAN intrusions
Restricting Wireless LAN
Access
Wireless 802.11b/g Access Control
Page
CAUTION: Never provide your SSID, WPA or WEP passphrase, or WEP key to
anyone who is not authorized to use your WLAN.
Connect at least one computer to the SBG901 Ethernet port to perform configuration. Do not
attempt to configure the SBG901 over a wireless connection.
You need to configure each wireless client (station) to access the SBG901 LAN as described in
Configuring the Wireless Clients.
Another step to improve wireless security is to place wireless components away from windows.
This decreases the signal strength outside the intended area.
9 Wireless Pages 79
This document is uncontrolled pending incorporation in PDM
Encrypting Wireless LAN Transmissions
To prevent unauthorized viewing of data transmitted over your WLAN, you must encrypt your
wireless transmissions.
Use the Wireless 802.11b/g Privacy Page to encrypt your transmitted data. Choose one of:
Table 22 Encrypting Wireless LAN Transmissions
Configure on the SBG901 Required on Each Wireless Client
If all of your wireless clients support
Wi-Fi Protected Access (WPA),
Motorola recommends configuring
WPA on the SBG901
If you use a local pre-shared key (WPA-PSK) passphrase, you
must configure the identical passphrase to the SBG901 on
each wireless client. Home and small-office settings typically
use a local passphrase.
Otherwise, configure WEP on
the SBG901
You must configure the identical WEP key to the SBG901 on
each wireless client.
If all of your wireless clients support WPA encryption, Motorola recommends using WPA instead
of WEP because WPA:
Provides much stronger encryption and is more secure
Provides authentication to ensure that only authorized users can log in to your WLAN
Is much easier to configure
Uses a standard algorithm on all compliant products to generate a key from a textual
passphrase
Will be incorporated into the new IEEE 802.11i wireless networking standard
For new wireless LANs, Motorola recommends purchasing client adapters that support WPA
encryption.
9 Wireless Pages 80
This document is uncontrolled pending incorporation in PDM
Wireless 802.11b/g Basic Page
This page allows you to configure the Access Point parameters, including the SSID and channel
number.
Creating a SecureEasySetup™ (SES) network ensures strong security for preventing
unauthorized wireless network access. However, traditional wireless network installation can be
a complicated and time-consuming task, requiring the user to possess the technical know-how to
manually enter several settings (such as network name and encryption key or WPA pass phrase)
on each Wi-Fi device. Motorola SecureEasySetup technology dramatically simplifies installation
by automating the configuring new wireless networks processes and adding devices to existing
networks. SecureEasySetup establishes a private connection between the devices and
automatically configures the network's Service Set Identifier (SSID) and WPA-Personal security
settings. It configures a new network only on each new device that is authorized to join the
network.
Figure 52 Wireless 802.11b/g Basic Page
Table 23 Field Descriptions for the Wireless 802.11b/g Basic Page
Field Description
Wireless MAC Address Shows the MAC address of the installed wireless card. It is not
configurable.
Network Name (SSID) Sets the Network Name (also known as SSID) of the wireless
network. This is a 1-32 ASCII character string.
9 Wireless Pages 81
This document is uncontrolled pending incorporation in PDM
9 Wireless Pages 82
This document is uncontrolled pending incorporation in PDM
Field Description
Network Type Selecting Closed prevents the network name from appearing in a
wireless client’s "Available Wireless Networks" list. Only clients who
already know the network name will be able to connect. Closed
disables the SSID broadcast in beacon packets.
Selecting Open allows broadcasting to the SSID in beacon packets.
Country Restricts the channel set based on the country's regulatory
requirements. This is a display-only field.
Channel Selects the channel for access point (AP) operation. The list of
available channels depends on the designated country. For this field,
the channel selected on the wireless clients on your WLAN must be
the same as the one selected on the SBG901.
Interface Allows the access point to be Enabled or Disabled.
Create SES
Network
This action button generates a new SecureEasySetup network,
applies the configuration to the wireless interface, and stores the
settings to non-volatile memory. It enables WPA-PSK authentication
and generates a unique Network Name (SSID) and random,
16-character Pre-Shared Key (PSK). The pop-up window shown
informs the user a SecureEasySetup network has been successfully
created.
Open SES Window This action button opens a 2-minute security window that allows a
SecureEasySetup client to connect. Only 1 SecureEasySetup client
may connect during an Open Window period. If you have more than 1
client to connect to your SecureEasySetup, you must open the
window multiple times. When the SecureEasySetup window is open,
the pop-up window below indicates the CMRG is waiting for a
SecureEasySetup client.
Wireless 802.11b/g Privacy Page
This page allows you to configure the WEP keys and/or passphrase.
Figure 53 Wireless 802.11b/g Privacy Page
9 Wireless Pages 83
This document is uncontrolled pending incorporation in PDM
Table 24 Field Descriptions for the Wireless 802.11b/g Privacy Page
Field Description
WPA
WPA2
Enables or disables Wi-Fi Protected Access (WPA) encryption.
WPA-PSK
WPA2-PSK
Enables or disables a local pre-shared key (WPA-PSK) passphrase.
WPA/WPA2 Encryption When using WPA or WPA-PSK authentication, these WPA
encryption modes can be set: TKIP, AES, or TKIP + AES.
AES (Advanced Encryption Standard) provides the strongest
encryption, while TKIP (Temporal Key Integrity Protocol) provides
strong encryption with improved compatibility. The TKIP + AES
mode allows both TKIP and AES-capable clients to connect.
WPA Pre-Shared Key Sets the WPA Pre-Shared Key (PSK). This is either an 8-63 ASCII
character string or a 64-digit hex number. Enabled when the
Network Authentication method is WPA-PSK.
RADIUS Server Sets the RADIUS server IP address to use for client authentication
using the dotted-decimal format (xxx.xxx.xxx.xxx).
RADIUS Port Sets the UDP port number of the RADIUS server. The default is
1812.
RADIUS Key Sets the shared secret for the RADIUS connection. The key is a 0 to
255 character ASCII string.
Group Key Rotation Interval Sets the WPA Group Rekey Interval in seconds. Set to zero to
disable periodic rekeying.
WPA/WPA2 Re-auth Interval WPA and WPA2 are two security features in Wi-Fi technology. This
field, re-authentication interval, is the amount of time the wireless
router can wait before re-establishing authentication with the CPE.
WEP Encryption Enables or disables Wired Equivalent Privacy encryption.
9 Wireless Pages 84
This document is uncontrolled pending incorporation in PDM
9 Wireless Pages 85
This document is uncontrolled pending incorporation in PDM
Field Description
Shared Key Authentication The WEP protocol uses Shared Key Authentication, which is an
Authentication protocol where the CPE sends an authentication
request to the access point. Then the access point sends a
challenge text to the CPE.
The CPE uses either the 64-bit or 128-bit key to encrypt the
challenge text and sends the encrypted text to the access point. The
access point will decrypt the encrypted text and then compare the
decrypted message with the original challenge text. If they are the
same, the access point will let the CPE connect; if it doesn’t match,
then the access point does not let the CPE connect.
802.1x Authentication This is another type of authentication and is used on top of WEP.
802.1x Authentication is a much stronger type of authentication than
WEP.
Network Key 1-4 Sets the static WEP keys when WEP encryption is enabled.
Enter 5 ASCII characters or 10 hexadecimal digits for a 64-bit key.
Enter 13 ASCII characters or 26 hexadecimal digits for a 128-bit key.
When both WPA encryption and WEP encryption are enabled, only
keys 2 and 3 are available for WEP encryption.
Current Network Key Selects the encryption (transmit) key when WEP encryption is
enabled.
PassPhrase Sets the text to use for WEP key generation.
WPS Config Allows the Wi-Fi Protected Setup to be enabled or disabled.
Button Mode Allows the type of setup for the Wireless Security:
SES — Secure Easy Setup
WPS — Wi-Fi Protected Setup
Device Name Name of the WPS device
STA PIN The station PIN method, entered as the "representative" of the
Network that follows the WPS protocol architecture.
WPS Method There are two types of methods used for the Wi-Fi Protected Setup:
PIN and Push Button
WPS Status Shows the status of the Wi-Fi Protected Setup.
Wireless 802.11b/g Access Control Page
This page allows you to configure the Access Control to the AP as well as status on the
connected clients.
Figure 54 Wireless 802.11b/g Access Control Page
Table 25 Field Descriptions for the Wireless 802.11b/g Access Control Page
Field Description
MAC Restrict Mode Selects whether wireless clients with the specified MAC address are
allowed or denied wireless access.
Select Disabled to allow all clients.
MAC Address A list of wireless client MAC addresses to allow or deny based on
the Restrict Mode setting. Valid input MAC address formats are
XX:XX:XX:XX:XX:XX and XX-XX-XX-XX-XX-XX.
Connected Clients A list of connected wireless clients. When a client connects
(associates) to the network, it is added to the list; when a client
leaves (disassociates) from the network, it is removed from the list.
For each client, the age (in seconds), estimated average receive
signal strength (in dBm), IP address, and host name are presented.
The age is the amount of time elapsed since data was transmitted to
or received from the client.
9 Wireless Pages 86
This document is uncontrolled pending incorporation in PDM
Wireless 802.11b/g Advanced Page
This page allows you to configure data rates and Wi-Fi thresholds.
Figure 55 Wireless 802.11b/g Advanced Page
Table 26 Field Descriptions for the Wireless 802.11b/g Access Control Page
Field Description
54g™ Mode Sets these network modes:
54g Auto
54g Performance
54g LRS
802.11b only
54g Auto accepts 54g, 802.11g, and 802.11b clients, but optimizes
performance based on the type of connected clients. 54g
Performance accepts only 54g clients and provides the highest
performance throughout; nearby 802.11b networks may have
degraded performance. 54g LRS interoperates with the widest
variety of 54g, 802.11g, and 802.11b clients. 80211b. accepts only
802.11b clients.
Basic Rate Set Determines which rates are advertised as "basic" rates. Default uses
the driver defaults. All sets all available rates as basic rates.
9 Wireless Pages 87
This document is uncontrolled pending incorporation in PDM
9 Wireless Pages 88
This document is uncontrolled pending incorporation in PDM
Field Description
54g™ Protection In Auto mode, the AP will use RTS/CTS protection to improve
802.11g performance in mixed 802.11g + 802.11b networks. Turn
protection off to maximize 802.11g throughput under most
conditions.
XPress™ Technology This is a performance-enhancing Wi-Fi technology designed for
increasing throughput and efficiency. It is used when there are
mixed wireless networks in the surrounding area from 802.11a/b/g
networks.
Afterburner™ Technology This is also a performance-enhancing Wi-Fi technology that
enhances the existing 802.11g standard by increasing throughput
by 40 percent.
Rate Forces the transmission rate for the AP to a particular speed.
Auto will provide the best performance in nearly all situations.
Output Power Sets the output power as a percentage of the hardware's maximum
capability.
Beacon Interval Sets the beacon interval for the AP. The default is 100, which is fine
for nearly all applications.
DTIM Interval Sets the wakeup interval for clients in power save mode. When a
client is running in power save mode, lower SBG901N-2.1.1.0-LAB-
00-SH.bin values provide higher performance but result in
decreased client battery life, while higher values provide lower
performance but result in increased client battery life.
Fragmentation Threshold Sets the fragmentation threshold. Packets exceeding this threshold
will be fragmented into packets no larger than the threshold before
packet transmission.
RTS Threshold Sets the RTS threshold. Packets exceeding this threshold will cause
the AP to perform an RTS/CTS exchange to reserve the wireless
medium before packet transmission.
Wireless Bridging Page
This page allows you to configure the WDS features.
Figure 56 Wireless Bridging Page
Table 27 Field Descriptions for the Wireless Bridging Page
Field Description
Wireless Bridging Enables or disables wireless bridging.
Remote Bridges Table of remote bridge MAC addresses authorized to establish a
wireless bridge. Up to four remote bridges may be connected.
Typically, you will also have to enter your AP's MAC address on the
remote bridge.
9 Wireless Pages 89
This document is uncontrolled pending incorporation in PDM
Wireless 802.11b/g Wi-Fi Multimedia Page
This page allows you to configure the Wi-Fi Multimedia Quality of Service (QoS).
Figure 57 Wireless 802.11b/g Wi-Fi Multimedia Page
Table 28 Field Descriptions for the Wireless 802.11b/g Wi-Fi Multimedia Page
Field Description
WMM Support Sets WMM support to Auto, On, or Off.
If enabled (Auto or On), the WME Information Element is included
in beacon frame.
No-Acknowledgement Sets No-Acknowledgement support to On or Off.
When enabled, acknowledgments for data are not transmitted.
Power Save Support Sets Power Save support to On or Off.
When Power Save is enabled, the AP queues packets for STAs
that are in power-save mode. Queued packets are transmitted
when the STA notifies AP that it has left power-save mode.
9 Wireless Pages 90
This document is uncontrolled pending incorporation in PDM
9 Wireless Pages 91
This document is uncontrolled pending incorporation in PDM
Field Description
EDCA AP Parameters Specifies the transmit parameters for traffic transmitted from the
AP to the STA in four Access Categories:
Best Effort (AC_BE)
Background (AC_BK)
Video (AC_VI)
Voice (AC_VO)
Transmit parameters include Contention Window (CWmin and
CWmax), Arbitration Inter Frame Spacing Number (AIFSN), and
Transmit Opportunity Limit (TXOP Limit).
There are also two AP-specific settings: Admission Control and
Discard Oldest First. Admission control specifies if admission
control is enforced for the Access Categories. Discard Oldest First
specifies the discard policy for the queues. On discards the oldest
first; Off discards the newest first.
EDCA STA Parameters Specifies the transmit parameters for traffic transmitted from the
STA to the AP in four Access Categories:
Best Effort (AC_BE)
Background (AC_BK)
Video (AC_VI)
Voice (AC_VO)
Transmit parameters include Contention Window (CWmin and
CWmax), Arbitration Inter Frame Spacing Number (AIFSN), and
Transmit Opportunity Limit (TXOP Limit).
Wireless 802.11b/g Guest Network Page
This page allows you to configure a secondary guest network on the wireless interface. This
network is isolated from the LAN. Any clients that associate with the guest network SSID will be
isolated from the private LAN and can only communicate with WAN hosts.
Figure 58 Wireless 802.11b/g Guest Network Page
9 Wireless Pages 92
This document is uncontrolled pending incorporation in PDM
Table 29 Field Descriptions for the Wireless 802.11b/g Guest Network Page
Field Description
Guest Network You may have several different wireless Guest Networks running
with different options. This field lets you select which wireless
Guest Network you want to modify.
Current Guest Network When set to Enabled, beacon frames are transmitted with the
Guest SSID
Guest Network Name (SSID) Assigns a unique network name (SSID) for the guest network,
which appears in the beacon frames.
Closed Network With a closed network, users type the SSID into the client
application instead of selecting the SSID from a list.
This feature makes it slightly more difficult for the user to gain
access.
DHCP Server Enables the DHCP server to give out leases to guest network
clients from the specified lease pool. If the DHCP server is
disabled, guest network STAs need to be assigned static IP
addresses.
IP Address Specifies the gateway IP relayed to guest clients in DHCP lease
offers.
Subnet Mask Specifies the subnet mask for the guest network.
Lease Pool Start Specifies the starting IP address for the guest network lease pool.
Lease Pool End Specifies the ending IP address for the guest network lease pool.
Lease Time Specifies the lease time for the guest network lease pool once the
Configuration Manager completes the WAN provisioning.
9 Wireless Pages 93
This document is uncontrolled pending incorporation in PDM
Configuring the Wireless Clients
For each wireless client computer (station), install the wireless adapter by following the
instructions supplied with the adapter. Be sure to:
1. Insert the CD-ROM for the adapter in the CD-ROM drive on the client.
2. Install the device software from the CD.
3. Insert the adapter in the PCMCIA or PCI slot or connect it to the USB port.
4. Configure the adapter to obtain an IP address automatically.
On a PC with Wireless Client Manager installed, the icon is displayed on the Windows task
bar. Double-click the icon to launch the utility. You may need to do the following to use a wireless
client computer to access the Internet:
Table 30 Configuring Wireless Clients
If You Performed: On Each Client, You Need to Perform:
Configuring WPA on the SBG901 Configuring a Wireless Client for WPA or WPA2
Configuring WEP on the SBG901 Configuring a Wireless Client for WEP
Configuring the Wireless Network Name
on the SBG901
Configuring a Wireless Client with the Network Name
(SSID)
Configuring a MAC Access Control List
on the SBG901
No configuration on client required
Configuring a Wireless Client for WPA
If you enabled WPA and set a PSK Passphrase by configuring WPA on the SBG901, you must
configure the same passphrase (key) on each wireless client. The SBG901 cannot authenticate a
client if:
WPA is enabled on the SBG901 but not on the client
The client passphrase does not match the SBG901 PSK Passphrase
CAUTION: Never provide the PSK Passphrase to anyone who is not authorized
to use your WLAN.
9 Wireless Pages 94
This document is uncontrolled pending incorporation in PDM
Configuring a Wireless Client for WEP
If you enabled WEP and set a key by configuring WEP on the SBG901, you must configure the
same WEP key on each wireless client. The SBG901 cannot authenticate a client if:
Shared Key Authentication is enabled on the SBG901 but not on the client
The client WEP key does not match the SBG901 WEP key
For all wireless adapters, you must enter the 64-bit or 128-bit WEP key generated by the SBG901.
CAUTION: Never provide the WEP key to anyone who is not authorized to use
your WLAN.
Configuring a Wireless Client with the Network Name (SSID)
After you specify the network name on the Wireless Basic Page, many wireless cards or adapters
automatically scan for an access point, such as the SBG901 and the proper channel and data rate.
If your card requires you to manually start scanning for an access point, do so following the
instructions in the documentation supplied with the card. You must enter the same SSID in the
wireless configuration setup for the device to communicate with the SBG901.
9 Wireless Pages 95
This document is uncontrolled pending incorporation in PDM
9 Wireless Pages 96
This document is uncontrolled pending incorporation in PDM
10 Troubleshooting
If the solutions listed here do not solve your problem, contact your service provider. Before
calling your service provider, try pressing the Reset button on the rear panel of the SBG901.
Resetting the SBG901 may take five to 30 minutes. Your service provider may ask for the status
of the lights as described in Front-Panel Lights and Error Conditions.
Solutions
Table 31 Troubleshooting Solutions
Problem Possible Solution
Power light is off Check that the SBG901 is properly plugged into the electrical outlet.
Check that the electrical outlet is working.
Press the Reset button.
Cannot send or
receive data
On the front panel, note the status of the LEDs and refer to Front-Panel
Lights and Error Conditions to identify the error. If you have cable TV, check
that the TV is working and the picture is clear. If you cannot receive regular
TV channels, the data service will not function.
Check the coaxial cable at the SBG901 and wall outlet. Hand-tighten if
necessary.
Check the IP address. Follow the steps for verifying the IP address for your
system described in Configuring TCP/IP. Call your service provider if you
need an IP address.
Check that the Ethernet cable is properly connected to the SBG901 and the
computer.
A wireless client(s)
cannot send or receive
data
Perform the first four checks in “Cannot send or receive data.”
Check the Security Mode setting on the Wireless Security Page:
• If you enabled WPA and configured a passphrase on the SBG901, be sure
each affected wireless client has the identical passphrase. If this does not
solve the problem, check whether the wireless client supports WPA.
• If you enabled WEP and configured a key on the SBG901, be sure each
affected wireless client has the identical WEP key. If this does not solve
the problem, check whether the client’s wireless adapter supports the type
of WEP key configured on the SBG901.
• To temporarily eliminate the Security Mode as a potential issue, disable
security.
10 Troubleshooting 97
This document is uncontrolled pending incorporation in PDM
10 Troubleshooting 98
This document is uncontrolled pending incorporation in PDM
Problem Possible Solution
After resolving your problem, be sure to re-enable wireless security.
On the Wireless Basic Page:
• Check whether you turned on Disable SSID Broadcast. If it is on, be sure
the network name (SSID) on each affected wireless client is identical to the
SSID on the SBG901.
• On the Wireless Access Control Page, be sure the MAC address for each
affected wireless client is correctly listed.
Slow wireless
transmission speed with
WPA enabled
On the Wireless Security Page, check whether the WPA Encryption type is
TKIP. If all of your wireless clients support AES, change the WPA
Encryption to AES.
Front-Panel LEDs and Error Conditions
The SBG901 front panel LEDs provide status information for the following error conditions:
Table 32 Front-Panel LEDs and Error Conditions
LED Status If, During Startup: If, During Normal Operation:
POWER OFF The SBG901 is not properly plugged
into the power outlet
The SBG901 is unplugged
RECEIVE FLASHING The downstream receive channel
cannot be acquired
The downstream channel is lost
SEND FLASHING The upstream send channel cannot be
acquired
The upstream channel is lost
ONLINE FLASHING IP registration is unsuccessful The IP registration is lost
11 Contact Us
If you need assistance while working with the SBG901, contact your Internet Service provider.
For information about customer service, technical support, or warranty claims, see the Motorola
SBG901 Regulatory, Safety, Software License, and Warranty Information card provided with the
SBG901 wireless gateway.
For answers to typical questions, see Frequently Asked Questions.
11 Contact Us 99
This document is uncontrolled pending incorporation in PDM
11 Contact Us 100
This document is uncontrolled pending incorporation in PDM
A Specifications
Table 33 Product Specifications
GENERAL
Standards
Cable Interface
Network Interface
Wireless Interface
Dimensions
Interoperates with DOCSIS and Euro-DOCSIS 2.0/1.1
F-connector, female, 75 Ω
One 10/100 Ethernet port
802.11b/g Wi-Fi
26.7 cm L x 18.41 cm W x 5.72 cm H
(10.50 in x 7.25 in x 2.25 in)
INPUT POWER
North America
Outside North America
105 to 125 VAC, 60 Hz
90 to 264 VAC, 45 to 65 Hz
ENVIRONMENT
Operating Temperature
Storage Temperature
Operating Humidity
0° C to 40° C (32° F to 104° F)
–30° C to 70° C (–22° F to 158° F)
0 to 95% R.H. (non-condensing)
DOWNSTREAM
Modulation
Maximum Data Rate*
Bandwidth
Symbol Rates
Operating Level Range
Frequency Range
Input Impedance
64 or 256 QAM
38 Mbps (256 QAM at 5.361 Msym/s)
6 MHz
64 QAM at 5.069 Msym/s, 256 QAM at 5.361 Msym/s
–15 to 15 dBmV
88 to 860 MHz
75 Ω (nominal)
A Specifications 101
This document is uncontrolled pending incorporation in PDM
A Specifications 102
This document is uncontrolled pending incorporation in PDM
*When comparing download speeds with a traditional 28.8k analog modem. Actual speeds will vary and
are often less than the maximum possible. Several factors affect upload and download speeds, including,
but not limited to, network traffic and services offered by your cable operator or broadband service
provider, computer equipment, type of service, number of connections to server, and availability of
Internet route(s).
UPSTREAM
Modulation
Maximum Channel Rate
Bandwidth
Symbol Rates
Operating Level Range
A-TDMA
S-CDMA
Output Impedance
Frequency Range
8***, 16, 32***, 64***,128*** QAM or QPSK
30 Mbps**
200 kHz, 400 kHz, 800 kHz, 1.6 MHz, 3.2 MHz, 6.4 MHz***
160, 320, 640, 1280, 2560, 5120*** ksym/s
8 to 54 dBmV (32, 64 QAM),
8 to 55 dBmV (8, 16 QAM) ,
8 to 58 dBmV (QPSK)
8 to 53 dBmV (all modulations)
75 Ω (nominal)
5 to 42 MHz (edge to edge)
5-65 for Euro-DOCSIS
**Actual data throughput will be less due to physical layer overhead (error correction coding, burst
preamble, and guard interval).
***With A-TDMA or S-CDMA enabled Cable Modem Termination System (CMTS).
NETWORK
Gateway
Wireless LAN
Power Management
802.11 i Security
Mobile Pairing
Regulatory Domains
Transmit Power Output
DHCP, NAT; static routing and dynamic IP routing (RIPv1, RIPv2); SPI
firewall with DoS protection and intrusion prevention; port, packet, and
URL keyword filtering; full suite of ALGs; UPnP IGD 1.0
802.11b/g Wi-Fi, two internal antennas, WDS bridging, 802.11e WMM
admission control, QoS
802.11e WMM power save/U-APSD (Unscheduled-Automatic Power
Save Delivery)
WEP-64/128, WPA-PSK, WPA, WPA2, TKIP, AES, 802.1x, 802.11i
(pre-authentication)
User-friendly Wi-Fi–protected setup (WPS) for secure mobile pairing
with compatible dual-mode handset
To include US, Canada, ETSI, World
19 dBm +1/–1.5 dB at all rates in all channels
A Specifications 103
This document is uncontrolled pending incorporation in PDM
IEEE 802.11b
IEEE 802.11g
Receiver Sensitivity
16 dBm +1/–1 dB at 54 Mbps in all channels
> –90 dBm at 11 Mbps;
> –74 dBm at 54 Mbps
All features, functionality, and other product specifications are subject to change without notice
or obligation.
Certain features may not be activated by your service provider and/or their network settings may
limit the feature’s functionality. Additionally, certain features may require a subscription. Contact
your service provider for details. All features, functionality, and other product specifications are
subject to change without notice or obligation. Battery back-up times may vary based on many
factors, including the battery age, charging state, storing conditions, and operating temperature,
as well as by factors such as data activity.
A Specifications 104
This document is uncontrolled pending incorporation in PDM
B Glossary
This glossary defines terms and lists acronyms used with the SBG901.
Table 34 Glossary
TERM DEFINITION
A
access point A device that provides WLAN connectivity to wireless clients (stations).
The SBG901 acts as a wireless access point.
adapter A device or card that connects a computer, printer, or other peripheral
device to the network or to some other device. A wireless adapter
connects a computer to the WLAN.
address See NAT translation.
ALG Some file transfer (for example, FTP), game, and video conferencing
applications require application-level gateway triggers to open one or
more ports to enable the application to operate properly.
American Wire Gauge (AWG) A standard system used to designate the size of electrical conductors;
gauge numbers are inverse to Gauge (AWG) size.
ANX Automotive Network Exchange
ARP Address Resolution Protocol broadcasts a datagram to obtain a
response containing a MAC address corresponding to the host IP
address. When it is first connected to the network, a client sends an
ARP message. The SBG901 responds with a message containing its
MAC address. Subsequently, data sent by the computer uses the
SBG901 MAC address as its destination.
ASCII The American Standard Code for Information Interchange refers to
alphanumeric data for processing and communication compatibility
among various devices; normally used for asynchronous transmission.
attenuation The difference between transmitted and received power resulting from
loss through equipment, transmission lines, or other devices; usually
expressed in decibels.
B Glossary 105
This document is uncontrolled pending incorporation in PDM
B Glossary 106
This document is uncontrolled pending incorporation in PDM
TERM DEFINITION
Authentication A process where the CMTS verifies that access is authorized, using a
password, trusted IP address, or serial number.
Authorization Part of the process between a CMTS and the cable modem or gateway
to enable Baseline Privacy.
auto-MDIX Automatic medium-dependent interface crossover detects and corrects
cabling errors by automatically reversing the send and receive pins on
any port. It enables the use of straight-through wiring between the
SBG901 Ethernet port and any computer, printer, or hub
B
bandwidth The transmission capacity of a medium in terms of a range of
frequencies. Greater bandwidth indicates the ability to transmit more
data over a given period of time.
Baseline Privacy An optional feature that encrypts data between the CMTS and the
cable modem or gateway. Protection of service is provided by ensuring
that a cable modem or gateway, uniquely identified by its MAC
address, can only obtain keys for services it is authorized to access.
Baud The analog signaling rate. For complex modulation modes, the digital
bit rate is encoded in multiple bits per baud. For example, 64 QAM
encodes 6 bits per baud, and 16 QAM encodes 4 bits per baud.
BER The bit error rate is the ratio of the number of erroneous bits or
characters received from some fixed number of bits transmitted.
binary A numbering system that uses two digits, 0 and 1.
bit rate The number of bits (digital 0s and 1s) transmitted per second in a
communications channel. It is usually measured in bits per second bps.
BPKM Baseline Protocol Key Management encrypts data flows between a
cable modem or gateway and the CMTS. The encryption occurs after
the cable modem or gateway registers to ensure data privacy across
the RF network.
bps Bits per second
B Glossary 107
This document is uncontrolled pending incorporation in PDM
TERM DEFINITION
bridge An OSI layer 2 networking device that connects two LANs using similar
protocols. It filters frames based on the MAC address to reduce the
amount of traffic. A bridge can be placed between two groups of hosts
that communicate a lot together, but not so much with the hosts in the
other group. The bridge examines the destination of each packet to
determine whether to transmit it to the other side. See also switch.
broadband High bandwidth network technology that multiplexes multiple,
independent carriers to carry voice, video, data, and other interactive
services over a single cable. A communications medium that can
transmit a relatively large amount of data in a given time period. A
frequently used synonym for cable TV that can describe any technology
capable of delivering multiple channels and services.
broadcast Simultaneous transmission to multiple network devices; a protocol
mechanism supporting group and universal addressing. See also
multicast and unicast.
C
CableHome A project of CableLabs and technology suppliers to develop interface
specifications for extending high-quality, cable-based services to home
network devices. It addresses issues such as device interoperability,
QoS, and network management. CableHome will enable cable service
providers to offer more services over HFC. It will improve consumer
convenience by providing cable-delivered services throughout the
home.
CableLabs A research consortium that defines the interface requirements for
cable modems and acknowledges that tested equipment complies with
DOCSIS.
cable modem A device installed at a subscriber location to provide data
communications over an HFC network. Unless otherwise specified, all
references to “cable modem” in this documentation refer to DOCSIS
or Euro-DOCSIS cable modems only.
cable modem
configuration file
File containing operational parameters that a cable modem or gateway
downloads from the Internet Service provider TFTP server during
registration.
Class C network An IP network containing up to 253 hosts. Class C IP addresses are in
the form “network.network. network. host.”
client In a client/server architecture, a client is a computer that requests files
or services, such as file transfer, remote login, or printing from the
B Glossary 108
This document is uncontrolled pending incorporation in PDM
TERM DEFINITION
server. Also called a CPE.
On a WLAN, a client is any host that can communicate with the access
point. A wireless client is also called a “station.”
CMTS A cable modem termination system is a device in the cable system
headend that interfaces the HFC network to local or remote IP
networks to connecting IP hosts, cable modems or gateways, and
subscribers. It manages all cable modem bandwidth. It is sometimes
called an edge router.
CNR carrier to noise ratio
coaxial cable A type of cable consisting of a center wire surrounded by insulation and
a grounded shield of braided (coax) wire. The shield minimizes
electrical and radio frequency interference. Coaxial cable has high
bandwidth and can support transmission over long distances.
CoS Class of service traffic management or scheduling functions are
performed when transferring data upstream or downstream on HFC.
CPE Customer premise equipment, typically computers, printers, etc., are
connected to the cable modem or gateway at the subscriber’s location.
CPE can be provided by the subscriber or the Internet Service provider.
Also called a client.
crosstalk An undesired signal interfering with the desired signal.
D
default route The route by which packets are forwarded when other routes in the
routing table do not apply.
dB Decibel
dBc Signal level expressed in dB relative to the unmodulated carrier level
desired.
DBm A unit of measurement referenced to one milliwatt across specified
impedance. 0dBm = 1 milliwatt across 75 ohms.
dBmV Signal level expressed in dB as the ratio of the signal power in a 75-
ohm system to a reference power when 1 mV is across 75 ohms.
B Glossary 109
This document is uncontrolled pending incorporation in PDM
TERM DEFINITION
demodulation An operation to restore a previously modulated wave and separate the
multiple signals that were combined and modulated on a sub carrier.
DHCP A Dynamic Host Configuration Protocol server dynamically assigns IP
addresses to client hosts on an IP network. DHCP eliminates the need
to manually assign static IP addresses by “leasing” an IP address and
subnet mask to each client. It enables the automatic reuse of unused
IP addresses.
The SBG901 is simultaneously a DHCP client and a DHCP server.
A DHCP server at the cable system headend assigns a public IP
address to the SBG901 and optionally to clients on the SBG901 LAN.
The SBG901 contains a built-in DHCP server that assigns private IP
addresses to clients.
Distortion An undesired change in signal waveform within a transmission
medium. A nonlinear reproduction of the input waveform.
DMZ A “de-militarized zone” is one or more hosts logically located between
a private LAN and the Internet. A DMZ prevents direct access by
outside users to private data. (The term comes from the geographic
buffers located between some conflicting countries, such as North and
South Korea.) In a typical small DMZ configuration, the DMZ host
receives requests from private LAN users to access external web sites
and initiates sessions for these requests. The DMZ host cannot initiate
a session back to the private LAN. Internet users outside the private
LAN can access only the DMZ host. You can use a DMZ to set up a
web server or for gaming without exposing confidential data.
DNS The Domain Name System is the Internet system for converting
domain names to IP addresses. A DNS server contains a table
matching domain names, such as Internetname.com, to IP addresses,
such as 192.169.9.1. When you access the world-wide web, a DNS
server translates the URL displayed on the browser to the destination
website IP address. The DNS lookup table is a distributed Internet
database; no one DNS server lists all domain names to IP address
matches.
DOCSIS The CableLabs Data-Over-Cable Service Interface Specification defines
interface standards for cable modems, gateways, and supporting
equipment to deliver data between an HFC network and computer
systems or television sets. To emphasize its use as a cable modem
standard, DOCSIS is now called CableLabs Certified Cable Modems.
Euro-DOCSIS is DOCSIS adapted for use in Europe.
B Glossary 110
This document is uncontrolled pending incorporation in PDM
TERM DEFINITION
domain name A unique name, such as motorola.com, that maps to an IP address.
Domain names are typically much easier to remember than are IP
addresses.
dotted-decimal format A method of representing an IP address or subnet mask using four
decimal numbers called octets. Each octet represents eight bits.
In a class C IP address, the octets are
“network.network.network.host.” The first three octets together
represent the network address and the final octet is the host address.
In the SBG901 LAN default configuration, 192.168.100 represents the
network address. In the final octet, the host address can range from 2
to 254.
download To copy a file from one computer to another. You can use the Internet
to download files from a server to a computer. A DOCSIS or Euro-
DOCSIS cable modem or gateway downloads its configuration file from
a TFTP server during start-up.
downstream In a cable data network, the direction of data received by the computer
from the Internet.
driver Software that enables a computer to interact with a network or other
device. For example, there are drivers for printers, monitors, graphics
adapters, modems, Ethernet, USB, HPNA, and many others.
DSSS Direct Sequence Spread Spectrum is an IEEE 802.11b RF modulation
protocol.
dynamic IP address An IP address that is temporarily leased to a host by a DHCP server.
The opposite of static IP address.
E
encapsulate To introduce data into some other data unit to hide the format of the
data.
encode To alter an electronic signal so that only an authorized user can
unscramble it to view the information.
encrypt To encode data.
Ethernet The most widely used LAN type, also known as IEEE 802.3. The most
common Ethernet networks are 10Base-T, which provide transmission
speeds up to 10 Mbps, usually over unshielded, twisted-pair wire
terminated with RJ-45 connectors. Fast Ethernet (100Base-T) provides
B Glossary 111
This document is uncontrolled pending incorporation in PDM
TERM DEFINITION
speeds up to 100 Mbps. “Base” means “baseband technology” and
“T” means “twisted pair cable.”
Each Ethernet port has a physical address called the MAC address.
Euro-DOCSIS A ComLabs standard that is DOCSIS adapted for use in Europe.
event A message generated by a device to inform an operator or the network
management system that something has occurred.
expansion slot A connection point in a computer where a circuit board can be inserted
to add new capabilities.
F
F-type connector A type of connector used to connect coaxial cable to equipment such
as the SBG901.
firewall A security software system on the SBG901 that enforces an access
control policy between the Internet and the SBG901 LAN.
flow A data path moving in one direction.
FEC Forward error correction is a technique to correct transmission errors
without requiring the transmitter to resend any data.
FMDA Frequency Division Multiple Access is a method to allow multiple users
to share a specific radio spectrum. Each active user is assigned an
individual RF channel (or carrier), with the carrier frequency of each
channel offset from its adjacent channels by an amount equal to the
channel spacing, which allows the required bandwidth per channel.
Frame A unit of data transmitted between network nodes that contain
addressing and protocol control data. Some control frames contain no
data.
frequency Number of times an electromagnetic signal repeats an identical cycle in
a unit of time, usually one second, measured in Hz, kHz, MHz, or GHz.
FTP File Transfer Protocol is a standard Internet protocol for exchanging
files between computers. FTP is commonly used to download
programs and other files to a computer from web pages on Internet
servers.
full-duplex The ability to simultaneously transmit and receive data. See also half-
B Glossary 112
This document is uncontrolled pending incorporation in PDM
TERM DEFINITION
duplex.
G
gain The extent to which a signal is boosted. A high-gain antenna increases
the wireless signal level to increase the distance the signal can travel
and remain usable.
gateway A device that enables communication between networks using
different protocols. See also router. The SBG901 enables up to 245
computers supporting IEEE 802.11b, or Ethernet to share a single
broadband Internet connection.
gateway IP address The address of the default gateway router on the Internet. Also known
as the “giaddr.”
GHz Gigahertz — one billion cycles per second
GUI graphical user interface
H
half-duplex Network where only one device at a time can transmit data. See also
full-duplex.
headend A location that receives TV programming, radio programming, and data
that it modulates onto the HFC network. It also sends return data.
Headend equipment includes transmitters, preamplifiers, frequency
terminals, demodulators, modulators, and other devices that amplify,
filter, and convert incoming broadcast TV signals to wireless and cable
channels.
header The data at the beginning of a packet that identifies what is in the
packet.
hexadecimal A base-sixteen numbering system that uses sixteen sequential
numbers (0 to 9 and the letters A to F) as base units before adding a
new position. On computers, hexadecimal is a convenient way to
express binary numbers.
HFC A hybrid fiber/coaxial cable network uses fiber-optic cable as the trunk
and coaxial cable to the subscriber’s premises.
hop The interval between two routers on an IP network. The number of
B Glossary 113
This document is uncontrolled pending incorporation in PDM
TERM DEFINITION
hops a packet traverses toward its destination (called the hop count) is
saved in the packet header. For example, a hop count of six means the
packet has traversed six routers. The packet hop count increases as
the time-to-live (TTL) value decreases.
host In IP, a host is any computer supporting end-user applications or
services with full two-way network access. Each host has a unique
host number that, when combined with the network number, forms its
IP address.
Host also can mean:
A computer running a web server that serves pages for one or
more web sites belonging to organization(s) or individuals
A company that provides this service
In IBM environments, a mainframe computer
hub On a LAN, a hub is a device that connects multiple hosts to the LAN. A
hub performs no data filtering. See also bridge and router. An IP hub is
typically a unit on a rack or desktop.
On an HFC network, a hub is a scaled-down headend that performs
some or all headend functions for part of the system.
Hz Hertz — one cycle per second. The unit to measure the frequency that
an alternating electromagnetic signal cycles through its highest and
lowest states. Used to define the bands of the electromagnetic
spectrum used in voice and data communications, or to define the
bandwidth of a transmission medium.
I
IANA The Internet Numbering Address Authority (IANA) is an organization
under the Internet Architecture Board (IAB) of the Internet Society that
oversees IP address allocation. It is under a contract from the U.S.
government.
ICMP Internet Control Message Protocol is a protocol used for error,
problem, and informational messages sent between IP hosts and
gateways. ICMP messages are processed by the IP software and are
not usually apparent to the end-user.
IEEE The Institute of Electrical and Electronics Engineers, Inc.
(http://www.ieee.org) is an organization that produces standards,
technical papers, and symposiums for the electrical and electronic
industries and is accredited by ANSI.
B Glossary 114
This document is uncontrolled pending incorporation in PDM
TERM DEFINITION
IEEE 802.11b
IEEE 802.11g
IEEE wireless network standards
IEEE 802.3 See Ethernet.
IGMP Internet Group Membership Protocol is the Internet multicasting
standard. IGMP establishes and maintains a database of group
multicast addresses and interfaces to which a multicast router
forwards multicast packets. IGMP runs between multicast hosts and
their immediately-neighboring multicast routers.
IGMP spoofing A process where a router acts as an IGMP querier for multicast hosts
and an IGMP host to a multicast router.
impedance The total opposition to AC electron current flow within a device.
Impedance is typically 75 ohms for coax cable and other CATV
components.
impulse noise A noise of very short duration, typically along the order of 10
microseconds. It is caused by electrical transients such as voltage
spikes, electric motors turning on, and lightning or switching
equipment that bleed over to the cable.
ingress noise Noise typically caused by discrete frequencies picked up by the cable
plant from radio broadcasts or an improperly grounded or shielded
home appliance such as a hair dryer. Ingress is the major source of
cable system noise.
Internet A worldwide collection of interconnected networks using TCP/IP.
Internetwork A collection of interconnected networks allowing communication
between all devices connected to any network in the collection.
IP Internet Protocol is a set of standards that enable different types of
computers to communicate with one another and exchange data
through the Internet. IP provides the appearance of a single, seamless
communication system and makes the Internet a virtual network.
IP address A unique 32-bit value that identifies each host on a TCP/IP network.
TCP/IP networks route messages based on the destination IP address.
An IP address has two parts:
A network address assigned by IANA
SBG901 network administrator assigns a host address to each host
connected to the SBG901, automatically using its DHCP server as a
B Glossary 115
This document is uncontrolled pending incorporation in PDM
TERM DEFINITION
static IP address.
For a Class C network, the first 24 bits are the network address and the
final 8 bits are the host address; in dotted-decimal format, the IP
address appears as “network.network.network.host.”
If you enable the SBG901 DHCP client on the Basic DHCP Page, the
Internet Service provider automatically assigns the network address,
subnet mask, domain name, and DNS server to provide a continuous
Internet connection.
IPSec The Internet Protocol Security protocols are IETF authentication and
encryption standards for secure packet exchange over the Internet.
IPSec works at OSI layer 3 and secures everything on the network.
IKE Internet Key Exchange
ISAKMP Internet Security Association and Key Management Protocol
ISP Internet Service Provider
K
kHz kilohertz — one thousand cycles per second
L
L2F Layer 2 Forwarding is an OSI layer 2 protocol that establishes a secure
tunnel across the Internet to create a virtual PPP connection between
the user and the enterprise network. L2F is the most established and
stable layer 2 tunneling protocol.
LAC An L2TP access concentrator is a device to which the client directly
connects. PPP frames are tunneled through the LAC to the LNS. The
LAC need only implement the media over which L2TP operates to
transmit traffic to one or more LNSs. The LAC may tunnel any protocol
carried within PPP. The LAC initiates incoming calls and receives
outgoing calls. A LAC is analogous to an L2F NAS.
LAN A local area network provides a full-time, high-bandwidth connection
over a limited area, such as a building or campus. Ethernet is the most
widely used LAN standard.
layer In networks, layers are software protocol levels. Each layer performs
functions for the layers above it. OSI is a reference model having seven
functional layers.
B Glossary 116
This document is uncontrolled pending incorporation in PDM
TERM DEFINITION
LCP Link Control Protocol establishes, configures, and tests data link
connections used by PPP.
Latency The time required for a signal to pass through a device. It is often
expressed in a quantity of symbols.
LED light-emitting diode
LNS An L2TP network server is a termination point for L2TP tunnels where
PPP frames are processed and passed to higher layer protocols. LNS
can operate on any platform that terminates PPP. The LNS handles the
server side of the L2TP protocol. L2TP relies only on the single media
over which L2TP tunnels arrive. The LNS can have a single LAN or
WAN interface, but can terminate calls arriving at any of the LAC’s full
range of PPP interfaces (asynchronous, synchronous, ISDN, V.120,
etc.). The LNS initiates outgoing calls and receives incoming calls. LNS
is analogous to a home gateway in L2F technology.
loopback A test that loops the transmit signal to the receive signal. Usually, the
loopback test is initiated on a network device. The test is used to verify
a path or to measure the quality of a signal on that path.
M
MAC address The Media Access Control address is a unique, 48-bit value
permanently saved in ROM at the factory to identify each Ethernet
network device. It is expressed as a sequence of 12 hexadecimal digits
printed on a Label on the Bottom of the SBG901. You need to provide
the HFC MAC address to the Internet Service provider. Also called an
Ethernet address, physical address, hardware address, or NIC address.
MB One megabyte; equals 1,024 x 1,024 bytes, 1,024 kilobytes, or about 8
million bits.
Mbps Million bits per second (megabits per second). A rate of data transfer.
media The various physical environments through which signals pass; for
example, coaxial, unshielded twisted-pair (UTP), or fiber-optic cable.
MIB A management information base is a unique hierarchical structure of
software objects used by the SNMP manager and agent to configure,
monitor, or test a device.
MHz Megahertz — one million cycles per second. A measure of radio
frequency.
B Glossary 117
This document is uncontrolled pending incorporation in PDM
TERM DEFINITION
MPDU MAC protocol data unit (PDU)
MSDU MAC service data unit
MSO Multiple System Operator. A company that owns and operates more
than one cable system. Also called a group operator.
MTU The Maximum Transmission Unit is the largest amount of data that can
be transmitted in one discrete message on a given physical network.
The MTU places an upper limit on the size of a message that can be
transferred by the network in a single frame. Messages exceeding the
MTU must be fragmented before transmission and reassembled at the
destination.
Multicast A data transmission sent from one sender to multiple receivers. See
also broadcast and unicast.
mW Milliwatts; a measure of electrical power
N
NAS Network access server
NAT Network Address Translation is an Internet standard for a LAN to use
one set of IP addresses for internal traffic and a second set of IP
addresses for external traffic.
NAPT Network Address Port Translation is the most common form of
address translation between public and private IP addresses. NAPT
maps one public IP address to many private IP addresses. If NAPT is
enabled on the Basic Setup Page, one public IP address is mapped to
an individual private IP address for up to 245 LAN clients.
NEC National Electrical Code (United States) — The regulations for
construction and installation of electrical wiring and apparatus, suitable
for mandatory application by a wide range of state and local authorities.
network Two or more computers connected to communicate with each other.
Networks have traditionally been connected using some kind of wiring.
network driver Software packaged with a NIC that enables the computer to
communicate with the NIC.
network layer Layer 3 in the OSI architecture that provides services to establish a
B Glossary 118
This document is uncontrolled pending incorporation in PDM
TERM DEFINITION
path between open systems. The network layer knows the address of
the neighboring nodes, packages output with the correct network
address data, selects routes, and recognizes and forwards to the
transport layer incoming messages for local host domains.
NIC A network interface card converts computer data to serial data in a
packet format that it sends over the LAN. A NIC is installed in an
expansion slot or can be built-in. Every Ethernet NIC has a MAC
address permanently saved in its ROM.
node On a LAN, a generic term for any network device.
On an HFC network, the interface between the fiber-optic trunk and
coaxial cable feeders to subscriber locations. A node is typically located
in the subscriber’s neighborhood.
noise Random spurts of electrical energy or interface. May produce a salt-
and-pepper pattern on a television picture.
O
ohm A unit of electrical resistance.
OSI The Open Systems Interconnection reference model is an illustrative
model describing how data moves through a network from an
application on the source host to an application on the destination host.
It is a conceptual framework developed by ISO that is now the primary
model for intercomputer communications. OSI is a model only; it does
not define a specific networking interface.
P
packet
The unit of data that is routed between the sender and destination on
the Internet or other packet-switched network. When data, such as an
e-mail message, is sent over the Internet, the sender’s IP divides the
data into uniquely-numbered packets. The packet header contains the
source and destination IP addresses. The individual packets may travel
different routes. When all packets arrive at the destination, IP at that
end reassembles the packets.
packet-switched
A scheme to handle transmissions on a connectionless network such
as the Internet. An alternative is circuit-switched.
PacketCable A CableLabs-led project to define a common platform to deliver
advanced, real-time multimedia services over two-way HFC cable plant.
Built on DOCSIS 1.1, PacketCable networks use IP technology as the
B Glossary 119
This document is uncontrolled pending incorporation in PDM
TERM DEFINITION
basis for a highly-capable multimedia architecture.
pass-through A pass-through client on the SBG901 LAN obtains its public IP address
from the Internet Service provider’s DHCP server.
PAT Port Address Translation
PCI Peripheral Component Interconnect
PCMCIA The Personal Computer Memory Card International Association sets
international standards for connecting peripherals to portable
computers. Laptop computers typically have a PCMCIA slot that can
hold one or two PC Cards to provide features such as Ethernet
connectivity.
PDA personal digital assistant
PDU A protocol data unit is a message containing operational instructions
used for SNMP. The basic SNMP V2 PDU types are get-request, get-
next-request, get-bulk-request, response, set-request, inform-request,
and trap.
periodic ranging Ranging that is performed on an on-going basis after initial ranging has
taken place.
physical layer Layer 1 in the OSI architecture. It provides services to transmit bits or
groups of bits over a transmission link between open systems. It
entails the electrical, mechanical, and handshaking procedures.
piggybacking A process that occurs when a cable modem simultaneously transmits
data and requests additional bandwidth.
PING A network utility that tests host reachability by sending a small packet
to the host and waiting for a reply. If you PING a computer IP address
and receive a reply, you know the computer is reachable over the
network. It also stands for Packet InterNet Groper.
PMD The physical media-dependent sublayer of the physical layer which
transmits bits or groups of bits over particular types of transmission
links between open systems. It entails the electrical, mechanical, and
handshaking procedures.
point-to-point Physical connection made from one point to another.
B Glossary 120
This document is uncontrolled pending incorporation in PDM
TERM DEFINITION
port On a computer or other electronic device, a port is a socket or plug
used to physically connect it to the network or to other devices. In
TCP/IP, a port is a number from 0 to 65536 used logically by a client
program to specify a server program. Ports 0 to 1024 are reserved
port mirroring A feature that enables one port (source) on the SBG901 to be copied to
another port (destination) to be studied. The destination mirrors the
transmitted (from) or received (to) data on the source port to enable the
person managing the network to monitor activity.
port triggering A mechanism that allows incoming communication with specified
applications. Primarily used for gaming applications.
PPP Point-to-Point Protocol is used to transport other protocols, typically for
simple links over serial lines. It is most commonly used to access the
Internet with a dial-up modem.
private IP An IP address assigned to a computer on the SBG901 LAN by the
DHCP server on the SBG901 for an address-specified lease time.
Private IP addresses are used by the SBG901 LAN only; they are
invisible to devices on the Internet. See also public IP address.
protocol A formal set of rules and conventions for exchanging data. Different
computer types (for example PC, UNIX, or mainframe) can
communicate if they support common protocols.
provisioning The process of auto discovery or manually configuring a cable modem
on the CMTS.
public IP address The IP address assigned to the SBG901 by the Internet Service
provider. A public IP address is visible to devices on the Internet. See
also private IP address.
Q
QAM Quadrature Amplitude Modulation uses amplitude and phase
modulation to encode multiple bits of data in one signaling element.
QAM achieves faster data transfer than amplitude or phase modulation
alone, but the signal is more prone to errors caused by noise. QAM
requires a transmission circuit with a higher CNR than alternate
modulation formats such as QPSK. Two types of QAM are:
16 QAM, which encodes four bits per symbol as one of 16 possible
amplitude and phase combinations.
64 QAM, which encodes six bits per symbol as one of 64 possible
amplitude and phase combinations.
B Glossary 121
This document is uncontrolled pending incorporation in PDM
TERM DEFINITION
QPSK Quadrature Phase Shift Keying is a phase modulation algorithm. Phase
modulation is a version of frequency modulation where the phase of
the carrier wave is modulated to encode bits of digital information in
each phase change.
QoS Quality of service describes the priority, delay, throughput, and
bandwidth of a connection.
R
RAS Remote Access Server
registration How a cable modem makes itself known to the CMTS. The cable
modem configuration file and authorization are verified and the CoS is
negotiated.
return loss A measurement of the quality of the match of the device to the cable
system. Return loss is the ratio of the amount of power reflected by
the device. A return loss of 20 dB or greater is preferred.
RF Radio Frequency — signals used by the CMTS transmitter and receiver
to send data over HFC. The carrier is modulated to encode the digital
data stream for transmission across the cable network.
RJ-11 The most common type of connector for household or office phones.
RJ-45 An 8-pin modular connector; the most common connector type for
10Base-T or 100Base-T Ethernet networks.
ROM read-only memory
router On IP networks, a device connecting at least two networks, which may
or may not be similar. A router is typically located at a gateway
between networks. A router operates on OSI network layer 3. It filters
packets based on the IP address, examining the source and destination
IP addresses to determine the best route on which to forward them.
A router is often included as part of a network switch. A router can also
be implemented as software on a computer.
routing table A table listing available routes that is used by a router to determine the
best route for a packet.
B Glossary 122
This document is uncontrolled pending incorporation in PDM
TERM DEFINITION
S
scope The set of IP addresses that a DHCP server can lease to clients.
server In a client/server architecture, a dedicated computer that supplies files
or services such as file transfer, remote login, or printing to clients.
service provider A company providing data services to subscribers.
SDU service data unit
SID A service ID is a unique 14-bit identifier the CMTS assigns to a cable
modem or gateway that identifies the traffic type it carries (for
example, data). The SID provides the basis for the CMTS to allocate
bandwidth to the cable modem and implement CoS.
SME small and medium enterprise
SMTP Simple Mail Transfer Protocol is a standard Internet protocol for
transferring e-mail.
SNMP Simple Network Management Protocol is a standard to monitor and
manage networks and network devices. Data is exchanged using PDU
messages.
SOHO small office home office
spectrum A specified range of frequencies used for transmission of
electromagnetic signals.
spectrum allocation An allocation of portions of the available electromagnetic spectrum for
specific services, such as AM, FM, or personal communications.
splitter A device that divides the signal from an input cable between two or
more cables.
SSID The Service Set Identifier or network name is a unique identifier that
wireless clients use to associate with an access point to distinguish
between multiple WLANs in the same area. All clients on a WLAN
must have the same SSID as the access point.
B Glossary 123
This document is uncontrolled pending incorporation in PDM
TERM DEFINITION
stateful-inspection A type of firewall that tracks each connection, traversing all firewall
interfaces to ensure validity. In addition to examining the source and
destination in the packet header based on static rules, a stateful
inspection firewall:
Examines packet headers via the context established by previous
packets that traversed the firewall
Monitors the connection state and saves it in a table
Closes ports until a connection to a specific port is requested
May examine the packet contents up through the application layer
to determine more than just the source and destination
A stateful inspection firewall is more advanced than a static filter
firewall.
static filter A type of firewall that examines the source and destination in the
packet header based on administrator-defined rules only.
static IP address An IP address that is permanently assigned to a host. Normally, a static
IP address must be assigned manually. The opposite of dynamic IP
address.
static route A manually-defined route.
station IEEE 802.11b term for wireless client.
subscriber A home or office user who accesses television, data, or other services
from an Internet Service provider.
subnet mask A bit mask that is logically ANDed with the destination IP address of a
packet to determine the network address. A router routes packets
using the network address.
subnetwork A part of a network; commonly abbreviated “subnet.” When
subnetting is used, the host portion of the IP address is divided into a
subnet and host number. Hosts and routers use the subnet mask to
identify the bits used for the network and subnet number.
switch On an Ethernet network, a switch filters frames based on the MAC
address, in a manner similar to a bridge. A switch is more advanced
because it can connect more than two segments.
B Glossary 124
This document is uncontrolled pending incorporation in PDM
TERM DEFINITION
synchronous The SBG901 uses synchronous timing for upstream data
transmissions. The CMTS broadcasts timing messages that bandwidth
is available. The SBG901 reserves data bytes requiring x number of
mini-slots. The CMTS replies that it can receive data at a specified time
(synchronized). At the specified time, the SBG901 transmits the x-
number of data bytes.
symbol rate Also known as baud rate. This is a measure of the number of times per
second a signal in a communications channel varies or makes a
transition between states (states being frequencies, voltage levels or
phase angles). Usually measured in symbols per second (sps).
SYSLOG A de-facto UNIX standard for logging system events.
T
TCP Transmission Control Protocol on OSI transport layer four provides
reliable transport over the network for data transmitted using IP
(network layer three). It is an end-to-end protocol defining rules and
procedures for data exchange between hosts on top of connectionless
IP. TCP uses a timer to track outstanding packets, checks error in
incoming packets, and retransmits packets if requested.
TCP/IP Transmission Control Protocol/Internet Protocol suite. It provides
standards and rules for data communication between networks on the
Internet. It is the worldwide Internetworking standard and basic
communications protocol of the Internet.
TFTP Trivial File Transfer Protocol is a very simple protocol used to transfer
files.
TKIP Temporal Key Integrity Protocol
Transparent bridging A method to enable all hosts on the wired Ethernet LAN, WLAN, and
USB connection to communicate as if they were all connected to the
same physical network.
transport layer Layer of the OSI concerned with protocols for error recognition and
recovery. This layer also regulates information flow.
trunk Electronic path over which data is transmitted.
two-way A cable system that can transmit signals in both directions to and from
the headend and the subscriber.
B Glossary 125
This document is uncontrolled pending incorporation in PDM
TERM DEFINITION
U-Z
UDP User Datagram Protocol
unicast A point-to-point data transmission sent from one sender to one
receiver. This is the normal way you access websites. See also
broadcast and multicast.
upstream In a cable data network, upstream describes the direction of data sent
from the subscriber’s computer through the cable modem to the CMTS
and the Internet.
USB Universal Serial Bus is a computer interface for add-on devices such as
printers, scanners, mice, modems, or keyboards. USB supports data
transfer rates of 480 bps and plug-and-play installation. You can
connect up to 127 devices to a single USB port.
VLAN
A virtual local area network is group of devices on different LAN
segments that are logically configured to communicate as if they are
connected to the same wire.
WAN A wide-area network provides a connection over a large geographic
area, such as a country or the whole world. The bandwidth depends on
need and cost, but is usually much lower than for a LAN.
WAP Wireless access point or Wireless Access Protocol. See also access
point
WECA The Wireless Ethernet Compatibility Alliance is a trade organization that
works to ensure that all wireless devices (computer cards, laptops, air
routers, PDAs, etc) can communicate with each other.
WEP Wired Equivalent Privacy encryption protects the privacy of data
transmitted over a WLAN. WEP uses keys to encrypt and decrypt
transmitted data. The access point must authenticate a client before it
can transfer data to another client. WEP is part of IEEE 802.11b.
Because WEP can be difficult to use and does not provide very strong
encryption, Motorola recommends using WPA if possible.
Wi-Fi Wireless fidelity (pronounced y-phi) brand name applied to products
supporting IEEE 802.11b.
Wireless Cable Modem
Gateway
The Motorola SURFboard Wireless Cable Modem Gateway is a single
device that combines a cable modem, router, Ethernet switch, wireless
access point, and DHCP server for SOHO or SME use.
B Glossary 126
This document is uncontrolled pending incorporation in PDM
TERM DEFINITION
WLAN wireless LAN
world wide web An interface to the Internet that you use to navigate and hyperlink to
information.
WPA Wi-Fi Protected Access (WPA) encryption, as described on the Wi-Fi
Alliance web page: http://www.wifialliance.org. It is a far more robust
form of encryption than WEP. Motorola recommends using WPA if all
of your client hardware supports WPA.
C Software License
SURFboard SBG901 Wireless Cable Modem Gateway
Motorola, Inc., ("Motorola")
101 Tournament Drive
Horsham, PA 19044
IMPORTANT: PLEASE READ THIS SOFTWARE LICENSE (“LICENSE”) CAREFULLY BEFORE YOU INSTALL, DOWNLOAD OR USE
ANY APPLICATION SOFTWARE, USB DRIVER SOFTWARE, FIRMWARE AND RELATED DOCUMENTATION (“SOFTWARE”)
PROVIDED WITH MOTOROLA’S CABLE DATA PRODUCT (THE “CABLE DATA PRODUCT”). BY USING THE CABLE DATA PRODUCT
AND/OR INSTALLING, DOWNLOADING OR USING ANY OF THE SOFTWARE, YOU INDICATE YOUR ACCEPTANCE OF EACH OF
THE TERMS OF THIS LICENSE. UPON ACCEPTANCE, THIS LICENSE WILL BE A LEGALLY BINDING AGREEMENT BETWEEN YOU
AND MOTOROLA. THE TERMS OF THIS LICENSE APPLY TO YOU AND TO ANY SUBSEQUENT USER OF THIS SOFTWARE.
IF YOU DO NOT AGREE TO ALL OF THE TERMS OF THIS LICENSE (I) DO NOT INSTALL OR USE THE SOFTWARE AND (II) RETURN
THE CABLE DATA PRODUCT AND THE SOFTWARE (COLLECTIVELY, “PRODUCT”), INCLUDING ALL COMPONENTS,
DOCUMENTATION AND ANY OTHER MATERIALS PROVIDED WITH THE PRODUCT, TO YOUR POINT OF PURCHASE OR SERVICE
PROVIDER, AS THE CASE MAY BE, FOR A FULL REFUND. BY INSTALLING OR USING THE SOFTWARE, YOU AGREE TO BE BOUND
BY THE PROVISIONS OF THIS LICENSE AGREEMENT.
The Software includes associated media, any printed materials, and any “on-line” or electronic documentation. Software
provided by third parties may be subject to separate end-user license agreements from the manufacturers of such Software.
The Software is never sold. Motorola licenses the Software to the original customer and to any subsequent licensee for personal
use only on the terms of this License. Motorola and its 3rd party licensors retain the ownership of the Software.
You may:
USE the Software only in connection with the operation of the Product.
TRANSFER the Software (including all component parts and printed materials) permanently to another person, but only if the
person agrees to accept all of the terms of this License. If you transfer the Software, you must at the same time transfer the
Product and all copies of the Software (if applicable) to the same person or destroy any copies not transferred.
TERMINATE this License by destroying the original and all copies of the Software (if applicable) in whatever form.
You may not:
(1) Loan, distribute, rent, lease, give, sublicense or otherwise transfer the Software, in whole or in part, to any other person,
except as permitted under the TRANSFER paragraph above. (2) Copy or translate the User Guide included with the Software,
other than for personal use. (3) Copy, alter, translate, decompile, disassemble or reverse engineer the Software, including but not
limited to, modifying the Software to make it operate on non-compatible hardware. (4) Remove, alter or cause not to be
displayed, any copyright notices or startup message contained in the Software programs or documentation. (5) Export the
Software or the Product components in violation of any United States export laws.
C Software License 127
This document is uncontrolled pending incorporation in PDM
The Product is not designed or intended for use in on-line control of aircraft, air traffic, aircraft navigation or aircraft
communications; or in design, construction, operation or maintenance of any nuclear facility. MOTOROLA AND ITS 3RD PARTY
LICENSORS DISCLAIM ANY EXPRESS OR IMPLIED WARRANTY OF FITNESS FOR SUCH USES. YOU REPRESENT AND WARRANT
THAT YOU SHALL NOT USE THE PRODUCT FOR SUCH PURPOSES.
Title to this Software, including the ownership of all copyrights, mask work rights, patents, trademarks and all other intellectual
property rights subsisting in the foregoing, and all adaptations to and modifications of the foregoing shall at all times remain
with Motorola and its 3rd party licensors. Motorola retains all rights not expressly licensed under this License. The Software,
including any images, graphics, photographs, animation, video, audio, music and text incorporated therein is owned by Motorola
or its 3rd party licensors and is protected by United States copyright laws and international treaty provisions. Except as
otherwise expressly provided in this License, the copying, reproduction, distribution or preparation of derivative works of the
Software, any portion of the Product or the documentation is strictly prohibited by such laws and treaty provisions. Nothing in
this License constitutes a waiver of Motorola’s rights under United States copyright law.
This License and your rights regarding any matter it addresses are governed by the laws of the Commonwealth of Pennsylvania,
without reference to conflict of laws principles. THIS LICENSE SHALL TERMINATE AUTOMATICALLY if you fail to comply with
the terms of this License.
Motorola is not responsible for any third party software provided as a bundled application, or otherwise, with the Software.
U.S. GOVERNMENT RESTRICTED RIGHTS
The Product and documentation is provided with RESTRICTED RIGHTS. The use, duplication or disclosure by the Government is
subject to restrictions as set forth in subdivision (c)(1)(ii) of The Rights in Technical Data and Computer Software clause at
52.227-7013. The contractor/manufacturer is Motorola, Inc., 101 Tournament Drive, Horsham, PA 19044.
C Software License 128
This document is uncontrolled pending incorporation in PDM
C Software License 129
This document is uncontrolled pending incorporation in PDM
FOR PRODUCTION USE ONLY DO NOT TYPE OR DELETE PAST THIS SYMBOL: 0
Motorola, Inc.
101 Tournament Drive
Horsham, PA 19044 U.S.A.
http://www.motorola.com
MOTOROLA and the Stylized M logo are registered in the US Patent and Trademark Office. All other product or
service names are the property of their respective owners. ©2008 Motorola, Inc. All rights reserved.
558660-001-a
11/2008

Navigation menu