Askey Computer PKE1334 WiFi EMTA User Manual UM PKE1334D US RoHS TCG220 V14 David 20150820

Askey Computer Corp WiFi EMTA UM PKE1334D US RoHS TCG220 V14 David 20150820

User Manual.pdf

Download: Askey Computer PKE1334 WiFi EMTA User Manual UM PKE1334D US RoHS  TCG220 V14 David 20150820
Mirror Download [FCC.gov]Askey Computer PKE1334 WiFi EMTA User Manual UM PKE1334D US RoHS  TCG220 V14 David 20150820
Document ID2773481
Application IDRPKxVumVTXcCjavGvuHZ0w==
Document DescriptionUser Manual.pdf
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize210.78kB (2634742 bits)
Date Submitted2015-10-06 00:00:00
Date Available2015-10-06 00:00:00
Creation Date2015-09-14 16:42:44
Producing SoftwareAcrobat Distiller 7.0 (Windows)
Document Lastmod2015-09-14 16:42:44
Document TitleUM_PKE1334D(US-RoHS)_TCG220_V14_David_20150820.pdf
Document CreatorPScript5.dll Version 5.2.2
Document Author: CARRIE

TCG220
USER MANUAL
Table of Contents
Chapter 1: Introduction ........................................................................................... 1
EMTA Features ..................................................................................................... 1
Computer Requirements ...................................................................................... 2
Chapter 2: Overview ................................................................................................ 3
Front Panel .......................................................................................................... 3
LED Behavior........................................................................................................ 4
Rear Panel ........................................................................................................... 5
Top Side Panel for WPS ......................................................................................... 6
Important Information ......................................................................................... 7
Chapter 3: Connections and setup ........................................................................... 8
Connecting the EMTA to Computer ...................................................................... 8
Attaching the Cable TV Wire to EMTA ............................................................. 8
Connection to Computer and Telephone ........................................................ 9
Activating the EMTA ........................................................................................... 10
Accessing the Internet ....................................................................................... 11
Status Web Page Group ...................................................................................... 12
Connection .................................................................................................. 12
Software ...................................................................................................... 13
Security ....................................................................................................... 14
Diagnostics ................................................................................................. 15
Provisioning Mode ....................................................................................... 16
Basic Web Page Group ........................................................................................ 17
Setup .......................................................................................................... 17
DHCP .......................................................................................................... 18
DDNS .......................................................................................................... 19
Backup ........................................................................................................ 20
Advance Web Page Group ................................................................................... 21
Option......................................................................................................... 21
IP Filtering ................................................................................................... 23
MAC Filtering .............................................................................................. 24
Port Filtering ............................................................................................... 25
Forwarding .................................................................................................. 26
Port Triggers ............................................................................................... 27
DMZ Host .................................................................................................... 28
RIP (Routing Information Protocol Setup) ...................................................... 29
Firewall Web Page Group .................................................................................... 30
Basic ........................................................................................................... 30
Filtering ...................................................................................................... 31
Local Log..................................................................................................... 32
Remote Log ................................................................................................. 33
Wireless Web Page Group ................................................................................... 34
Radio .......................................................................................................... 34
Primary Network .......................................................................................... 36
802.11 Advanced ........................................................................................ 40
802.11 Access Control................................................................................. 42
WMM ........................................................................................................... 43
Bridging ............................................................................ 拗婌! ⯂㛒⭂佑㚠䰌ˤ
ii
Illustrations contained in this document are for representation only.
Table of Contents
Media .......................................................................................................... 46
MTA Web Page Group ........................................................................................ 47
Status .......................................................................................................... 47
Event Log .................................................................................................... 47
Logout Web Page Group ..................................................................................... 48
Chapter 4: Additional Information .......................................................................... 49
General Troubleshooting.................................................................................... 49
Service Information ............................................................................................ 51
Glossary ............................................................................................................ 52
CAUTION for UL(Check caution label on gift box) ............................................... 54
Federal Communication Commission Interference Statement ................................... 55
iii
Illustrations contained in this document are for representation only.
Chapter 1: Introduction
Chapter 1: Introduction
EMTA Features
z Full Band Capture Front End.
z Increases performance with 50% increase in CPU speed.
z Adds Applications CPU to run Linux applications.
z Supports DBDC (Dual Band Dual Concurrent).
z Lowers Power with Advanced Power Management.
z Advanced Processor architecture.
z High-Speed Memory architecture.
z DOCSIS 1.0/1.1/2.0/3.0 Standard Compliant.
z PacketCable 1.0/1.5 NCS Standard Compliant
z Support Multiple Provisioning Mode.
z 4 ports Standard RJ-45 connector for 10/100/1000BaseT Ethernet with auto-negotiation and MDIX
functions; Support maximum Ethernet cable(Category 5e) length up to 100m.
z 2 ports RJ-11 Foreign Exchange Station (FXS) port for IP telephony; Support a maximum line length
between themselves and an end-receiver (handset, etc.) of up to 500 feet.
z Support simultaneous voice and data communications.
z Echo Cancellation.
z Voice Active Detection (VAD).
z DTMF detection and generation.
Comfort Noise Generation (CNG).
Support V.90 fax and modem services.
56 bits DES and 128 bits AES data encryption security.
SNMP network management support.
802.11a/b/g/n supported, 20/40MHz bandwidth, supports 2 × 2 antennas for data rates up to
600Mbps.
Fully IEEE 802.11a/b/g/n legacy compatibility with enhanced performance.
Support Web pages and private DHCP server for status monitoring.
The NTP (Network Termination Point) should be able to operate with an Loading of at least 5 REN.
WƌŽƉĂŶĞΡƚĞĐŚŶŽůŽŐLJƐƵƉƉŽƌƚĞĚ͕ĞŶĂďůŝŶŐƚŚĞĐŽŶŶĞĐƚŝŽŶŽĨŵŽƌĞ/ŶƚĞƌŶĞƚƵƐĞƌƐǁŝƚŚŽƵƚĂĚĚŝƚŝŽŶĂů
network bandwidth.
Illustrations contained in this document are for representation only.
Chapter 1: Introduction
Computer Requirements
Personal computer attached to the WiFi Voice Gateway must meet the minimum system requirements
as below.
Note: The minimum requirements may vary by the cable company.
IBM PC COMPATIBLE
MACINTOSH**
CPU
Pentium preferred
PowerPC or higher
System RAM
512MB (1024MB preferred)
512MB (1024MB preferred)
Operating System
Windows* NT/2000/Me/XP/7/Vista, Mac OS** 7.6.1 or higher
Linux
Sound Card
Required for audio on CD-ROM
N/A
Video
VGA or better (SVGA preferred)
VGA or better (SVGA built-in preferred)
CD-ROM Drive
Required
Required
Ethernet
10BaseT or 100BaseT
10BaseT or 100BaseT
An Ethernet card and driver MUST be installed in your computer properly. A
standard Ethernet cable is also required for connecting the Ethernet card to
the EMTA.
Software
TCP/IP network protocol installed for each machine
Microsoft Internet Explorer 4.0 or later or Netscape Navigator 4.0 or later.
(5.0 and 4.7 or later, respectively, are strongly recommended.)
*Windows is a trademark of Microsoft Corporation.
**Macintosh and the Mac OS are trademarks of Apple Computer, Inc.
Illustrations contained in this document are for representation only.
Chapter 2: Overview
Chapter 2: Overview
Front Panel
The following illustration shows the front panel of the EMTA:
Power - Indicates the Power status.
DS - Indicates the status of Data reception by the cable modem from the Network (Downstream Traffic).
US - Indicates the status of Data transmission by the cable modem to the Network (Upstream Traffic).
Online - Displays the status of your cable connection. The light is off when no cable connection is
detected and fully lit when the modem has established a connection with the network and data
can be transferred.
Ethernet - Indicates the state of Ethernet ports.
WIFI - Indicates the traffic on the wireless network.
Phone1 - Indicates the status of the telephone Phone 1.
Phone2 - Indicates the status of the telephone Phone 2.
WPS - Indicates the status of the WPS functionality.
Illustrations contained in this document are for representation only.
Chapter 2: Overview
LED Behavior
There will be 12 LEDs on TCG220. Looking at LED from TOP to Bottom: Power, DS, US, Online, LAN1,
LAN2, LAN3, LAN4, WiFi, PHONE1, PHONE2, WPS. "ON" = the LED is light, "OFF" = the LED is gray,
"FLASH" = the LED is blinking.
Internet
BCM93383WVG
Power
ON
LAN
DS
US
Online
ON
ON
ON
On
0.25 second
ON
FLASH FLASH FLASH
Wi-Fi Phone1 Phone2 WPS
ON
ON
ON
ON
ON
ON
Power on 0.25 sec
From power ON to system
initialization complete
Boot-up Operation
ON
ON
ON
ON
1 second
DOCSIS Start-up
Operation
DS scanning
FLASH
OFF
OFF
During DS scanning and acquiring
SYNC
ON
ON
FLASH
OFF
From SYNC completed, receiving
UCD to ranging completed
ON
ON
ON
FLASH
During DHCP, configuration file
download, registration, and
Baseline Privacy initialization
ON
ON
ON
ON
Operational (NACO=ON)
OFF
Operational (NACO=OFF)
FLASH FLASH
ON
ON
ON
ON
FLASH
OFF
MTA DHCP
ON
ON
ON
ON
OFF
FLASH
MTA SNMP/TFTP
ON
ON
ON
ON
FLASH FLASH
RSIP for NCS/Register for SIP
OFF
OFF
OFF
OFF
ON
ON
ON
ON
ON
No Ethernet Link
FLASH FLASH FLASH FLASH
CPE Operation
ON
Wireless is disable
ON
FLASH
ON
FLASH FLASH
ON
Ethernet Link
TX/RX Ethernet Traffic
OFF
SW Download
Operation
Following system initialization
complete to (before)
ON
ON
MTA initialization
Description
Wireless initiate success or enable
TX/RX Wireless Traffic
A software download and while
updating the FLASH memory
(long press, > 5 seconds)
WPS WiFi association during client
Flash and AP linking process, WPS LED
Green color light Blinking.
WPS Operation
ON

ON
After link established WPS LED
Green color light ON
Flash Timeout to link.
Illustrations contained in this document are for representation only.
Chapter 2: Overview
Rear Panel
The following illustration shows the rear panel of the EMTA:
Slot
Description
CABLE
F-Connector
RESET
Reset/Reboot this Cable modem
ETHERNET 1 2 3 4
Ethernet 10/100/1000 BaseT RJ-45 connector
TEL 1 2
Telephony RJ-11 connector
12VDC
12V DC-IN Power connector
DC Power switch
Power ON/ OFF switch
Illustrations contained in this document are for representation only.
Chapter 2: Overview
Top Side Panel for WPS
WPS ʹ Indicates the status of the WPS (Wi-Fi Protected SetupTM) functionality.
There is one WPS button on the Top Side Panel of TCG220 and is designed to have multiple function.
This button can be used to:
Securely and Simply Get WiFi Client Connected: WPS button can be used to paring WiFi client
which also supports WPS function. A long press (press more than 2 seconds) on the WPS button
will enable TCG220 scan for any available WPS device. Note: You must ensure that the WiFi client
device supports WPS function in order to use this WPS function on TCG220.
WiFi On/Off Switch: a short press on the button can switch the WiFi Interface ON or OFF
Illustrations contained in this document are for representation only.
Chapter 2: Overview
Important Information
The cable service to your home supports DOCSIS compliant two-way modem access.
Your internet account has been set up.
A cable outlet near your PC and it is ready for cable modem service.
Note: It is important to supply power to the modem at all times. Keeping your modem plugged in will
keep it connected to the Internet. This means that it will always be ready when you are. Your cable
company should always be consulted before installing a new cable outlet. Do not attempt any rewiring
without contacting your cable company first.
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
Chapter 3: Connections and setup
Connecting the EMTA to Computer
This section explains the way to attach Cable TV wire to EMTA and to connect your EMTA to the
Ethernet port on your personal computer and install the necessary software.
Attaching the Cable TV Wire to EMTA
You may find the Cable TV wire one of the following ways:
Connected directly to a TV, a Cable TV converter box, or VCR. The line will be connected to the jack
with which should be labeled either IN, CABLE IN, CATV, CATV IN, etc.
Connected to a wall-mounted cable outlet.
Connect one end of the coaxial cable to the cable connection in the wall, and the other end to the CABLE
jack on the EMTA.
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
Connection to Computer and Telephone
Make the connections to modem in the following sequence:
Connect the plug from the AC power supply into the POWER AC ADAPTER jack on the EMTA, and
plug the power supply into an AC outlet in the wall.
Connect one end of the Ethernet cable to the Ethernet port on the back of your computer, and the
other end to the ETHERNET port on the EMTA.
Note: Use only the power
supply that accompanied this
unit. Using other adapters
may damage the unit.
Fig. 1: How to Setup Your Device
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
Activating the EMTA
After you install the EMTA and turn it on for the first time (and each time the modem is reconnected to
the power), it goes through several steps before it can be used. Each of these steps is represented by a
different pattern of flashing lights on the front of the modem.
Note: All indicators flash once prior to the initialization sequence.
If all of the lights are flashing sequentially, it means the EMTA is automatically updating its system
software. Please wait for the lights to stop flashing. You cannot use your modem during this time. Do
not remove the power supply or reset the EMTA during this process.
To make sure that you can access the Internet successfully, please check the following first.
1.
Make sure the connection (through Ethernet) between the EMTA and your computer is OK.
2.
3.
Make sure the TCP/IP protocol is set properly.
Subscribe to a Cable Company.
10
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
Accessing the Internet
If enabled by your service provider; please proceed as follows:
1.
Once your host PC is properly configured.
2.
Start your web browser and type the CM IP address on the URL field.
After connecting to the URL, you can see the login page. Please enter the username, password and then
press Login button. The default username is "admin" and password is "password".
Fig. 2: Login Page
Note: If forget your username and password, you may Press "Reset" button on the rear panel more
than 6seconds to restore the username and password to default.
11
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
Status Web Page Group
Connection
This page reports current connection status containing startup procedures, downstream and upstream
status, CM online information, and so on. The iŶĨŽƌŵĂƚŝŽŶĐĂŶďĞƵƐĞĨƵůƚŽLJŽƵƌĐĂďůĞĐŽŵƉĂŶLJ͛Ɛ
ƐƵƉƉŽƌƚƚĞĐŚŶŝĐŝĂŶŝĨLJŽƵ͛ƌĞŚĂǀŝŶŐƉƌŽďůĞŵƐ͘
Fig. 3: Connection Status
12
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
Software
The information section shows the hardware and software information about your gateway.
The status section of this page shows how long your gateway has operated since last time being
powered up, and some key information the Cable Modem received during the initialization process with
LJŽƵƌĐĂďůĞĐŽŵƉĂŶLJ͘/ĨEĞƚǁŽƌŬĐĐĞƐƐƐŚŽǁƐ͞ůůŽǁĞĚ͕͟ƚŚĞŶLJŽƵƌĐĂďůĞ company has configured your
gateway to have Internet connectivity. If not, you may not have Internet access, and should contact your
cable company to resolve this.
Fig. 4: Software Status
13
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
Security
LJĚĞĨĂƵůƚ͕ƚŚĞƵƐĞƌŶĂŵĞŝƐ͞admin͟ĂŶĚƚŚĞƉĂƐƐǁŽƌĚŝƐ͞password͘͟
This is set by different actions (non exhaustive list):
at the manufactory level,
following a reset factory on the modem,
following a reset from the operator,
following a change by the user who wants to come back to
the default setting after using its own settings
When the current password is the default one, the user is strongly encouraged to change the default
web password.
At your first connection or while the password is the default one, a warning message is displayed on the
top banner of each Web configuration page. We want to encourage you to change the password in order
to enforce the security of your modem.
The password can be a maximum of 8 characters and is case sensitive. In addition, this page can be used
to restore the gateway to its original factory settings. Use this with caution, as all the settings you have
made will be lost. To perform this reset, set Restore Factory Defaults to Yes and click Apply. This has
the same effect as a factory reset using the rear panel reset switch, where you hold on the switch for 5
seconds, then release it.
Note: We are always suggesting you to modify the password. This is a basic protection against wrongful
access to the Gateway Web pages.
Fig. 5: Security Settings.
14
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
Diagnostics
This page offers basic diagnostic tools for you to use when connectivity problems occur. When you ping
an Internet device, you send a packet to its TCP/IP stack, and it sends one back to yours. To use the ping
Test, enter the information needed and press Start Test; the Result will be displayed in the lower part of
the window. Press Abort Test to stop, and Clear Results to clear the result contents. Note: Firewalls may
cause pings to fail but still provide you TCP/IP access to selected devices behind them. Keep this in mind
when ping a device that may be behind a firewall. Ping is most useful to verify connectivity with PCs
which do not have firewalls, such as the PCs on your LAN side.
Fig. 6: Diagnostics Settings
15
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
Provisioning Mode
This page allows set the eRouter IP provisioning mode. Default Provisioning mode is "RG". You can also
configure this as "Bridge" mode. Configure TCG220 to Bridge mode will lost most of the Router function.
Fig. 7: Provisioning mode settings.
16
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
Basic Web Page Group
Setup
This page allows configuration of the basic features of the broadband gateway related to your ISP's
connection.
LAN: Configure the LAN IP Address for TCG220.
Interface/Prefix: IPv6 related information.
WAN: TCG220 WAN interface information. Do NOT change the configuration setting which may cause
severe performance impact, or Client PC may not be able to get internet connected.
Fig. 8: Basic Setup Settings
17
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
DHCP
This page allows configuration and status of the optional internal DHCP server for the LAN.
You can activate the DHCP server function for the LAN on this page, with this function activated,
ͻ
ͻ
LJŽƵƌĐĂďůĞĐŽŵƉĂŶLJ͛Ɛ,WƐĞƌǀĞƌƉƌŽvides one IP address for your gateway,
ĂŶĚLJŽƵƌŐĂƚĞǁĂLJ͛Ɛ,WƐĞƌǀĞƌƉƌŽǀŝĚĞƐ/WĂĚĚƌĞƐƐĞƐ to your PCs. A DHCP server leases an IP
address with an expiration time that can be configured.
DHCP Server: Select "Yes" or "No" to enable or disable a simple DHCP server for LAN.
Number of CPEs: Configure the how many client device can be connected to the Gateway.
Lease Time: Configure the IP address lease time with "Lease time" for DHCP server. Default value is
3600 seconds.
DHCP Clients: Displays the PC(clients) connected and the related DHCP lease information.
Force Available: You can force the DHCP server to release one of the specific IP address as available and
a new client is possible to get that IP address, assigned by DHCP server. You need to select and then
press "Force Available".
Fig. 9: DHCP Settings
18
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
DDNS
This page allows setup of Dynamic DNS service.
DDNS Service- Choose Enabled ( www.DynDNS.org ) to enable the basic setting. Choose
Disabled to close the basic setting.
Username- The username that you registered with your DDNS provider.
Password- The password that you registered with your DDNS provider
Host Name- The domain name or host name that is registered with your DDNS provider
Status- It shows the DDNS service status whether it is enabled or disabled.
Click Apply to save the changes.
Fig. 10: DDNS Settings
19
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
Backup
This page allows you to save your current settings locally on your PC, or restore settings previously
saved. Customer may backup their settings on TCG220. And restore the configuration if necessary.
Fig. 11: Backup Settings
20
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
Advance Web Page Group
Option
This page allows configuration of advanced features of the broadband gateway.
Fig. 12: Options Configuration
WAN Blocking prevents others on the WAN side from being able to ping your gateway. With WAN
Blocking enabled, your gateway will not respond to pings it receives, effectively "hiding" your gateway.
21
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
IPsec PassThrough enables IPsec type packets to pass between WAN and LAN. IPsec (IP Security) is a
security mechanism used in Virtual Private Networks (VPNs).
PPTP PassThrough enables PPTP type packets to pass between WAN and LAN. PPTP (Point to Point
Tunneling Protocol) is another mechanism sometimes used in VPNs.
Remote Config Management makes the configuration web pages in your gateway accessible from the
WAN side. Note that page access is limited to only those who know the gateway access password. When
accessing your gateway from a remote location, your must use HTTP port 8080 and the WAN IP address
of the gateway. e.g., if the WAN IP address is 157.254.5.7, you would navigate to
http://157.254.5.7:8080 to reach your gateway.
Multicast Enable enables multicast traffic to pass through WAN and LAN. You may need to enable this
to see some types of broadcast streaming and content on the Internet.
UPnP Universal Plug and Play (UPnP) helps devices, such as Internet appliances and computers, access
the network and connect to other devices as needed. UPnP devices can automatically discover the
services from other registered UPnP devices on the network.
NAT ALG enable NAT ALG (application layer gateways) allows customized NAT traversal filters to be
plugged into the gateway to support address and port translation for certain application layer
"control/data" protocols such as RSVP, FTP, TFTP, Kerb88, NetBios , IKE, RTSP, Kerb1293 , H225 , PPTP ,
MSN , SIP , ICQ , IRC666x , ICQTalk , Net2Phone , IRC7000 , IRC8000 file transfer in IM applications etc. In
order for these protocols to work through NAT or a firewall, either the application has to know about an
address/port number combination that allows incoming packets, or the NAT has to monitor the control
traffic and open up port mappings (firewall pinhole) dynamically as required. Legitimate application data
can thus be passed through the security checks of the firewall or NAT that would have otherwise
restricted the traffic for not meeting its limited filter criteria.
22
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
IP Filtering
dŚŝƐƉĂŐĞĞŶĂďůĞƐLJŽƵƚŽĞŶƚĞƌƚŚĞ/WĂĚĚƌĞƐƐƌĂŶŐĞƐŽĨWƐŽŶLJŽƵƌ>EƚŚĂƚLJŽƵĚŽŶ͛ƚǁĂŶƚƚŽŚĂǀĞ
outbound access to the WAN. These PCs can still communicate with each other on your LAN, but
packets they send to WAN addresses are blocked by the gateway.
Fig. 13: IP Filtering Settings
23
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
MAC Filtering
This page allows configuration of MAC address filters in order to block internet traffic to specific
network devices on the LAN. This feature only applies to IPv4 traffic.
Fig. 14: MAC Filtering Settings
24
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
Port Filtering
dŚŝƐƉĂŐĞĂůůŽǁƐLJŽƵƚŽĞŶƚĞƌƌĂŶŐĞƐŽĨĚĞƐƚŝŶĂƚŝŽŶƉŽƌƚƐ;ĂƉƉůŝĐĂƚŝŽŶƐͿƚŚĂƚLJŽƵĚŽŶ͛ƚǁĂŶƚLJŽƵƌ>E
PCs to send packets to. Any packets your LAN PCs send to these destination ports will be blocked. For
example, you could block access to worldwide web browsing (http = port 80) but still allow email service
(SMTP port 25 and POP-3 port 110). To enable port filtering, set Start Port and End Port for each range,
and click Apply. To block only one port, set both Start and End ports with the same value.
Fig. 15: Port Filtering Settings
25
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
Forwarding
For LAN Ù WAN communications, the gateway normally only allows you to originate an IP connection
with a PC on the WAN; it will ignore attempts of the WAN PC to originate a connection onto your PC.
This protects you from malicious attacks from outsiders. However, sometimes you may wish for anyone
outside to be able to originate a connection to a particular PC on your LAN if the destination port
(application) matches one you specify.
Fig. 16: Forwarding Settings
26
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
Port Triggers
Some Internet activities, such as interactive gaming, require that a PC on the WAN side of your gateway
be able to originate connections during the game with your game playing PC on the LAN side. You could
use the Advanced-Forwarding web page to construct a forwarding rule during the game, and then
remove it afterwards (to restore full protection to your LAN PC) to facilitate this. Port triggering is an
elegant mechanism that does this work for you, each time you play the game.
Fig. 17: Port Triggers Settings
27
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
DMZ Host
Use this page to designate one PC on your LAN that should be left accessible to all PCs from the WAN
side, for all ports. e.g., if you put an HTTP server on this machine, anyone will be able to access that
HTTP server by using your gateway IP address as the destination. A ƐĞƚƚŝŶŐŽĨ͞Ϭ͟ŝŶĚŝĐĂƚĞƐEKDW͘
͞,ŽƐƚ͟ŝƐĂŶŽƚŚĞƌ/ŶƚĞƌŶĞƚƚĞƌŵĨŽƌĂWĐŽŶŶĞĐƚĞĚƚŽƚŚĞ/ŶƚĞƌŶĞƚ͘
Fig. 18: DMZ Host Setup
28
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
RIP (Routing Information Protocol Setup)
This feature enables the gateway to be used in small business situations where more than one LAN
;ůŽĐĂůĂƌĞĂŶĞƚǁŽƌŬͿŝƐŝŶƐƚĂůůĞĚ͘dŚĞZ/WƉƌŽƚŽĐŽůƉƌŽǀŝĚĞƐƚŚĞŐĂƚĞǁĂLJĂŵĞĂŶƐƚŽ͞ĂĚǀĞƌƚŝƐĞ͟ĂǀĂŝůĂďůĞ
IP routes to these LANs to your cable operator, so packets can be routed properly in this situation.
Your cable operator will advise you during installation if any setting changes are required here.
Fig. 19: RIP Setup
29
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
Firewall Web Page Group
Basic
This page allows configuration of Firewall features. It is highly recommended that the Firewall is left
enabled at all times for protection against Denial of Service attacks.
Fig. 20: Firewall Basic configuration
30
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
Filtering
This page allows the filtering of outbound connections, restricting or granting access to specific MAC
Addresses. Filters with no MAC Address entered will apply to ALL MAC Addresses. The URL field is
intended to be used to block or allow access to specific sites ( cnn.com, google.com, etc. ). Filters with
no ports entered will apply to ALL ports.
Fig. 21: Filtering configuration
31
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
Local Log
The gateway builds a log of firewall blocking actions that the firewall has taken. Using the Local Log page
lets you specify an email address to which you want the gateway to email this log. You must also tell the
gateway your outgoing (i.e. SMTP) email seƌǀĞƌ͛ƐŶĂŵĞ͕ƐŽŝƚĐĂŶĚŝƌĞĐƚƚŚĞĞŵĂŝůƚŽŝƚ͘ŶĂďůĞŵĂŝů
Alerts has the gateway forward email notices when Firewall protection events occur. Click E-mail Log to
immediately send the email log. Click Clear Log to clear the table of entries for a fresh start.
The log of these events is also visible on the screen. For each blocking event type that has taken place
since the table was last cleared, the table shows Description, Count, Last Occurrence, Target, and
Source.
Fig. 22: Local Log Configuration
32
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
Remote Log
The Remote Log page allows you to specify the IP address where a SysLog server is located on the LAN
Side and select different types of firewall events that may occur. Then, each time such an event occurs,
notification is automatically sent to this log server.
Fig. 23: Remote Log Configuration
33
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
Wireless Web Page Group
Radio
To set the basic configuration for the wireless features, click RADIO from the Wireless menu. These must
match the settings you make on your wireless-equipped PC on the LAN side.
Fig. 24: Radio configuration
Wireless Interface:
Choose the wireless interface on the EMTA.
Wireless:
Enable or disable the wireless function.
Country:
Display the country code you currently use.
Output Power:
Choose output power of the device.
802.11 Band:
Choose 2.4 GHz for 802.11 b/g/n, 5 GHz for 802.11a
802.11 N Support Required:
Enable 802.11n support under 802.11 band 2.4 GHz.
34
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
Bandwidth:
For wireless signal of this AP
Sideband for Control Channel (40 MHz only):
If Bandwidth is 40 MHz this function will be enabled.
Control channel:
Choose the wireless channel to use.
Regulatory Mode:
802.11d and 802.11h for choose.
OBSS (Overlap Basic Service Set) Coexistence:
Overlapping Basic service set coexistence, enable or disable this function.
STBC Tx:
Spaceʹtime block coding is a technique used in wireless communications to transmit multiple
copies of a data stream across a number of antennas and to exploit the various received versions
of the data to improve the reliability of data-ƚƌĂŶƐĨĞƌ͘ĞĨĂƵůƚǁĂƐ͞ƵƚŽ͘͟
Restore Wireless defaults:
To recover to the default settings, press this button to retrieve the settings then click Apply.
35
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
Primary Network
This page allows configuration of the Primary Wireless Network and its security settings. Supports
WPA/WPA2, WPA-PSK/WPA2-PSK, WEP 64-bits, WEP 128-bits and WPS Securities.
Fig. 25: primary Network configuration
36
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
WPA (Wi-Fi Protected Access)/WPA2:
It must be used in connection with an authentication server such as RADIUS to provide
centralized access control and management. It can provide stronger encryption and
authentication solution than none WPA modes. WPA2 is the second generation of WPA security.
There are two types for choose AES and TKIP+AES.
TKIP (Temporal Key Integrity Protocol): Takes the original master key only as a starting point and
derives its encryption keys mathematically from this mater key. Then it regularly changes and
rotates the encryption keys so that the same encryption key will never be used twice.
AES (Advanced Encryption Standard): This Provides security between client workstations
operating in ad hoc mode. It uses a mathematical ciphering algorithm that employs variable key
sizes of 128, 192 or 256 bits.
RADIUS (Remote Authentication Dial In User Service) Server:
a protocol for carrying authentication, authorization, and configuration information between a
Network Access Server which desires to authenticate its links and a shared Authentication Server.
Please key in the IP Address for the RADIUS Server.
RADIUS (Remote Authentication Dial In User Service) Port:
Besides the IP address of the RADIUS Server, you have to enter the port number for the server.
Port 1812 is the reserved RADIUS-authentication port described in RFC 2138. Earlier AP (RADIUS
clients) use port 1945. The default value will be shown on this box. You can keep and use it.
RADIUS (Remote Authentication Dial In User Service) Key:
A RADIUS Key is like a password, which is used between IAS and the specific RADIUS client to
verify identity. Both IAS and the RADIUS client must be use the same RADIUS Key for successful
communication to occur. Enter the RADIUS Key.
Group Key Rotation Interval:
Key in the time for the WAP group key rotation interval. The unit is second. With increasing rekey
interval, user bandwidth requirement is reduced
WPA/WPA2 Re-auth Interval:
When a wireless client has associated with the Wireless Voice Gateway for a period of time
longer than the setting here, it would be disconnected and the authentication will be executed
again. The default value is 3600, you may modify it
WPA-PSK (WPA-Pre-Shared Key) /WPA2-PSK:
Its useful for small places without authentication servers such as the network at home. It allows
the use of manually-entered keys or passwords and is designed to be easily set up for home
users.
Please type the key to be between 8 and 63 characters, or 64 hexadecimal digits. Only the
devices with a matching key that you set here can join this network.
WEP (Wired Equivalent Privacy) Encryption:
There are two types encryption to choose 64-bit or 128-bit. If you choose Disabled, the Network
37
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
Keys will not be shown on this page. If selected, the data is encrypted using the key before being
transmitted.
Shared Key Authentication:
Decide whether to set the shared key Optional or Required by selecting from the drop-down
menu.
Network Key 1 to 4:
This allows you to enter four sets of the WEP key. For 64-bit WEP mode, the key length is 5
characters or 10 hexadecimal digits. As for 128-bit WEP mode, the key length is 13 characters or
26 hexadecimal digits
Current Network Key:
Select one set of the network key (from 1 to 4) as the default one
Passphrase:
You can enter ASCII codes into this field. The range is from 8 characters to 64 characters. For
ASCII characters, you can key in 63 characters in this field. If you want to key in 64 characters,
only hexadecimal characters can be used
Generate WEP Keys:
Click this button to generate the Passphrase
38
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
Automatic Security Configuration:
Right side on the page, Auto Security Configuration can be enabled with WPS (Wi-Fi Protect
SetupTM).
WPS (Wi-Fi Protect SetupTM):
Its easy and secure way of configuring and connecting, make the CM is the AP and the connect
PC is STA. When configuring your Wireless Network via WPS, Messages are exchanged between
the STA and AP in order to configure the Security Settings on both devices
Device Name:
Change the factory default to a name of your choice which is up to 32 characters long as like SSID
WPS Setup AP:
UUID (Universally Unique Identifier) to Identifier this device, generate AP PIN for STA to connect.
WPS Add Client:
There are two methods "Push-Button" and "PIN". Select the method you want. But, the default
selection will be "PIN"
Apply:
After proper configuration, click Apply to invoke the settings
39
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
802.11 Advanced
This page allows configuration of data rates and Wi-Fi thresholds.
CAUTION: It is not recommended that these settings be modified without direct knowledge or
instructions to do so. Modifying these settings inappropriately could seriously degrade network
performance.
Fig. 26: 802.11 Advanced Settings
54gTM Mode:
Under 802.11n-mode OFF this option to choose 54g mode or force 802.11b only.
XPressTM Technology:
Increase aggregate throughput improve by up to 27% in 802.11g-only networks, and up to 75%
in mixed networks comprised of 802.11g and 802.11b standard equipment
802.11n Protection:
This option allow 802.11g and 802.11b devices co-exist in the same network without "speaking"
at the same time.
Short Guard Interval:
For 802.11n added optional to increase data rate. This provides an 11% increase in data rate.
Basic Rate Set:
For all clients to associate with, "Default" or "All" for all 802.11 b/g/n users.
40
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
Multicast Set:
For users, in order to connect to the AP, set the baseline level to deliver. Lower multicast rates
mean weaker, farther signals are allowed to connection. Higher multicast rates mean that only
close, strong signals are allowed.
NPHY Rate:
Set Physical Layer rate, only applicable when the 802.11n-mode set as auto.
Legacy Rate:
When AP released to share the band with existing legacy device, 802.11g/b/a devices. It
provided ways of ensuring coexistence between legacy and successor devices.
Beacon Interval:
This is the time interval between beacon transmissions. The measure unit is "time units" (TU) of
1024 microseconds. (Value range: 1~65535)
DTIM (Delivery Traffic Indication Message) Interval:
The value set here which informs the clients about the presence of buffered multicast/broadcast
data on the AP. It define CM will be delivered and how often that delivery occurs. (Value range:
1~255)
Fragmentation Threshold:
This option division of the MTU (Maximum transmission unit), default is 2346.
RTS (Request to Send) Threshold:
Sending RTS frames does not occur unless the packet size exceeds this threshold, default is 2347.
41
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
802.11 Access Control
This page allows configuration of the Access Control to the AP as well as status on the connected clients.
Fig. 27: 802.11 Access Control configurations
MAC Restrict Mode: Restrict specific client cannot allow access the AP by MAC address. Select
"Disabled" to welcome all of the clients on the network; select "Allow" to permit only the clients
on the list to access the cable modem; or select "Deny" to prevent the clients on the list to
access this device.
MAC Address: Your Gateway identifies wireless PCs by their Wireless MAC Address. This address
consists of a string of 6 pairs of numbers 0-9 and letters A-F, such as 00 90 4B F0 FF 50. It is
usually printed on the Wireless card of the device (e.g. the PCMCIA card in a laptop) or at the
button of the laptop. Enter the MAC address of the connected clients into the fields, and then
click Apply to add them to the list for access control.
Apply: After proper configuration, click Apply to invoke the settings.
Connected Clients: The information of currently connected clients will be displayed here.
42
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
WMM
This page allows configuration of the Wi-Fi Multimedia QoS.
Fig. 28: 802.11 WMM configurations
WMM Support: This field allows you to enable WMM to improve multimedia transmission.
No-Acknowledgement: This field allows you to enable WMM No-Acknowledgement. Enable this
avoids retransmission on highly time-critical data.
Power Save Support: This field allows you to enable WMM Power-Save-Support.
EDCA AP parameters: Specifies the transmit parameter for traffic transmitted from the AP to the
STA for the 4 Access Priority Categories: Best effort (AC_BE), Background (AC_BK), Video (AC_VI)
and voice (AC_VO). Transmit parameters include contention window (CWmin CWmax) ,
arbitration Inter Frame Spacing Number AIFSN, and Transmit opportunity Limit (TXOP limit).
Admission Control specifies if admission control is enforced for the Access categories. Discard
Oldest first specified the discard policy for the queues , "On" discards the oldest first ; "Off"
discards the newest first.
EDCA STA parameters: Specifies the transmit parameter for traffic transmitted from STA to the
AP for the 4 Access Priority Categories :Best effort (AC_BE), Background (AC_BK), Video (AC_VI)
43
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
and voice (AC_VO). Transmit parameters include contention window (CWmin CWmax) ,
arbitration Inter Frame Spacing Number AIFSN, and Transmit opportunity Limit (TXOP limit).
WMM TXOP parameters: Specifies the TXOP parameter for the 4 Access Priority Categories :Best
effort (AC_BE), Background (AC_BK), Video (AC_VI) and voice(AC_VO). WMM Transmit
parameters include Short Retry Limit , Short Fallbk Limit , Long Retry Limit , Long Fallbk Limit.
Those retry limit defines how many times the MAC retries to send different types of packets. If
the number of retries reach their limit, the frame is discarded. Also we can set the Max Rate in
500kbps.
44
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
WDS
This page allows configuration of WDS (Wireless Distribution System) features.
Fig. 29: WDS configuration
TCG220 can allow to communicate with other "extender" wireless access points either exclusively or
mixed with communications to local PCs. Use this page to designate the remote devices, the gateway is
allowed to communicate with, and to select the WDS mode. You will need to configure the same SSID,
WiFi encryption mode and also the pass phrases for both TCG220 and remote WiFi gateway before you
can extend the WiFi network together.
WDS:
Choose ͞Disabled͟ to shut down this function; select Enabled to turn on the function of WDS.
Remote APs:
Enter the MAC Addresses of the remote devices to relay the signals for each other.
Apply:
After proper configuration, click Apply to invoke the settings.
45
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
Media
This page allows configuration of Wireless Media features.
Fig. 30: 802.11 Media Advanced Feature Configuration
Band Steering is a new feature that TCG220 has and will balancing the WiFi loading and
performance on both 2.4G and 5G band. When enabled, TCG220 will send 5G enabled client
which connected on 2.4G to the 5G interface (since TCG220 is a Dual Band Dual Concurrent
Cable Voice WiFi Gateway), vice versa. This will also requires the support from WiFi Client.
Airtime Fairness is a new feature that TCG220 has. If enabled, this will balance the WiFi
performance when High Throughput device such as 802.11n device and legacy 802.11b/g device
connected on the same channel. CG220 will dynamically allocate the time for transmission to
each device so that the performance to High Throughput device will not be severely affected by
the legacy device.
46
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
MTA Web Page Group
Status
This page displays initialization status of the MTA.
Fig.31: MTA Status
Event Log
This page displays the MTA Event Log.
Fig. 32: MTA Event Log
47
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
Logout Web Page Group
This page warning you are logged out, click "Back to Login" return to Login page.
Fig. 33: Logout Page
48
Illustrations contained in this document are for representation only.
Chapter 4: Additional Information
Chapter 4: Additional Information
General Troubleshooting
You can correct most problems you have with your product by consulting the troubleshooting list that
follows.
I cannot access the Internet.
Check all of the connections to your EMTA.
Your Ethernet card may not be working well. Check the documentation for more information.
The Network Properties of your operating system may not be setting correctly. Check with your ISP or
cable company.
All of the lights are flashing in sequence.
This means the EMTA is automatically updating its system software. Please wait for the lights to stop
flashing. The updating process typically lasts less than one minute.
Do not remove the power supply or reset the EMTA during this process.
/ĐĂŶ͛ƚŐĞƚƚŚĞŵŽĚĞŵƚŽĞƐƚĂďůŝƐŚĂŶƚŚĞƌŶĞƚĐŽŶŶĞĐƚŝŽŶ͘
ǀĞŶŶĞǁĐŽŵƉƵƚĞƌƐĚŽŶ͛ƚĂůǁĂLJƐŚĂǀĞƚŚĞƌŶĞƚĐĂƉĂďŝůŝƚŝĞƐʹ be sure to verify that your computer has
a properly installed Ethernet card and the driver software to support it.
Check to see that you are using the right type of Ethernet cable.
The modem won͛ƚƌĞŐŝƐƚĞƌĂĐĂďůĞĐŽŶŶĞĐƚŝŽŶ;>>/E<ůŝŐŚƚŶŽƚŽŶĐŽŶƚŝŶƵŽƵƐůLJͿ͘
If the modem is in Initialization Mode, the INTERNET light will be flashing. Call your cable company if it
has not completed this 5-step process within 30 minutes.
The modem should work with a standard RG-ϲĐŽĂdžŝĂůĐĂďůĞ͕ďƵƚŝĨLJŽƵ͛ƌĞƵƐŝŶŐĂĐĂďůĞŽƚŚĞƌƚŚĂŶŽŶĞ
your cable company recommends, or if the terminal connections are loose, it may not work. Check with
your cĂďůĞĐŽŵƉĂŶLJƚŽĚĞƚĞƌŵŝŶĞǁŚĞƚŚĞƌLJŽƵ͛ƌĞƵƐŝŶŐƚŚĞĐŽƌƌĞĐƚĐĂďůĞ͘
If you subscribe to video service over cable, the cable signal may not be reaching the modem. Confirm
that good quality cable television pictures are available to the coaxial connector you are using by
connecting a television to it. If your cable outlet is "dead", call your cable company.
Verify that the EMTA service is DOCSIS compliant by calling your cable provider.
/ĚŽŶ͛ƚŚĞĂƌĂĚŝĂůƚŽŶĞǁŚĞŶ/ƵƐĞĂƚĞůĞƉŚŽŶĞ͘
Telephone service is not activated. If the rightmost light on the EMTA stays on while others flash, check
with your TSP or cable company.
49
Illustrations contained in this document are for representation only.
Chapter 4: Additional Information
If the EMTA is connected to existing house telephone wiring, make sure that another telephone service
is not connected. The other service can normally be disconnected at the Network Interface Device
located on the outside of the house.
If using the second line on a two-line telephone, use a 2-line to 1-line adapter cable.
50
Illustrations contained in this document are for representation only.
Chapter 4: Additional Information
Service Information
If you purchased or leased your EMTA directly from your cable company, then warranty service for the
EMTA may be provided through your cable provider or its authorized representative. For information on
the following, please contact your cable company. See the enclosed warranty card if you purchased your
EMTA from a retailer.
1) Ordering Service,
2) Obtaining Customer Support
3) Additional Service Information
51
Illustrations contained in this document are for representation only.
Chapter 4: Additional Information
Glossary
10BaseT ʹ Unshielded, twisted pair cable with an RJ-45 connector, used with Ethernet LAN (Local Area
Network). "10" indicates speed (10 Mbps), "Base" refers to baseband technology, and "T" means twisted
pair cable.
Authentication - The process of verifying the identity of an entity on a network.
DHCP (Dynamic Host Control Protocol) ʹ A protocol with which allows a server to assign IP addresses
dynamically to hosts on the fly.
DOCSIS (Data Over Cable Service Interface Specifications) ʹ A project with the objective of developing a
set of necessary specifications and operations support interface specifications for cable modems and
associated equipment.
Ethernet card ʹ A plug-in circuit board installed in an expansion slot of a personal computer. The
Ethernet card (sometimes called a Network Interface Card or NIC) takes parallel data from the computer,
converts it to serial data, puts it into a packet format, and sends it over the 10BaseT or 100BaseT LAN
cable.
F Connector ʹ A type of coaxial connector, labeled CABLE IN on the rear of the cable modem that
connects the modem to the cable system.
HTTP (HyperText Transfer Protocol) ʹ Invisible to the user, HTTP is used by servers and clients to
communicate and display information on a web browser.
Hub ʹ A device used to connect multiple computers to the cable modem.
IP Address ʹ A unique, 32-bit address assigned to every device in a network. An IP (Internet Protocol)
address has two parts: a network address and a host address. This modem receives a new IP address
from your cable operator via DHCP each time it goes through Initialization Mode.
Key exchange - The swapping of mathematical values between entities on a network in order to allow
encrypted communication between them.
MAC Address ʹ The permanent "identity" for a device programmed into the Media Access Control layer
ŝŶƚŚĞŶĞƚǁŽƌŬĂƌĐŚŝƚĞĐƚƵƌĞĚƵƌŝŶŐƚŚĞŵŽĚĞŵ͛ƐŵĂŶƵĨĂĐƚƵƌing.
NID - Network Interface Device, the interconnection between the internal house telephone wiring and a
ĐŽŶǀĞŶƚŝŽŶĂůƚĞůĞƉŚŽŶĞƐĞƌǀŝĐĞƉƌŽǀŝĚĞƌ͛ƐĞƋƵŝƉŵĞŶƚ͘dŚĞƐĞǁŝƌŝŶŐĐŽŶŶĞĐƚŝŽŶƐĂƌĞŶŽƌŵĂůůLJŚŽƵƐĞĚŝŶ
a small plastic box located on an outer wall of the house. It is the legal demarcation between the
ƐƵďƐĐƌŝďĞƌ͛ƐƉƌŽƉĞƌƚLJĂŶĚƚŚĞƐĞƌǀŝĐĞƉƌŽǀŝĚĞƌ͛ƐƉƌŽƉĞƌƚLJ͘
PacketCable ʹ A project with the objective of developing a set of necessary telephony specifications and
operations support interface specifications for cable modems and associated equipment used over the
DOCSIS-based cable network.
PSTN (Public Switched Telephone Network) ʹ The worldwide voice telephone network which provides
dial tone, ringing, full-duplex voice band audio and optional services using standard telephones.
Provisioning - The process of enabling the Media Terminal Adapter (MTA) to register and provide
services over the network.
52
Illustrations contained in this document are for representation only.
Chapter 4: Additional Information
TCP/IP (Transmission Control Protocol/Internet Protocol) ʹ A networking protocol that provides
communication across interconnected networks, between computers with diverse hardware
architectures and various operating systems.
TFTP - dƌŝǀŝĂů&ŝůĞdƌĂŶƐĨĞƌWƌŽƚŽĐŽů͕ƚŚĞƐLJƐƚĞŵďLJǁŚŝĐŚƚŚĞDĞĚŝĂdĞƌŵŝŶĂůĚĂƉƚĞƌ͛ƐĐŽŶĨŝŐƵƌĂƚŝŽŶ
data file is downloaded.
TSP - Telephony Service Provider, an organization that provides telephone services such as dial tone,
local service, long distance, billing and records, and maintenance.
53
Illustrations contained in this document are for representation only.
Chapter 4: Additional Information
CAUTION for UL(Check caution label on gift box)
North American Cable Installer:
This reminder is provided to call your attention to Article 820.93 of the National Electrical Code (Section
54 of the Canadian Electrical Code, Part 1) which provides guidelines for proper grounding and, in
particular, specifies that the cable ground shall be connected to the grounding system of the building as
close to the point of cable entry as practical.
54
Illustrations contained in this document are for representation only.
Chapter 4: Additional Information
Federal Communication Commission Interference Statement
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions:
(1) This device may not cause harmful interference, and (2) this device must accept any interference
received, including interference that may cause undesired operation.
This equipment has been tested and found to comply with the limits for a Class B digital device,
pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection
against harmful interference in a residential installation. This equipment generates, uses and can
radiate radio frequency energy and, if not installed and used in accordance with the instructions, may
cause harmful interference to radio communications. However, there is no guarantee that
interference will not occur in a particular installation.
If this equipment does cause harmful
interference to radio or television reception, which can be determined by turning the equipment off
and on, the user is encouraged to try to correct the interference by one of the following measures:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and receiver.
Connect the equipment into an outlet on a circuit different from that
to which the receiver is connected.
Consult the dealer or an experienced radio/TV technician for help.
FCC Caution: Any changes or modifications not expressly approved by the party responsible for
compliance could void the user's authority to operate this equipment.
This transmitter must not be co-located or operating in conjunction with any other antenna or
transmitter.
For operation within 5.15 ~ 5.25GHz / 5.47 ~5.725GHz frequency range, it is restricted to indoor
environment. The band from 5600-5650MHz will be disabled by the software during the
manufacturing and cannot be changed by the end user. This device meets all the other requirements
specified in Part 15E, Section 15.407 of the FCC Rules.
55
Illustrations contained in this document are for representation only.
Chapter 4: Additional Information
Radiation Exposure Statement:
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment.
This equipment should be installed and operated with minimum distance 27cm between the radiator
& your body.
Note: The country code selection is for non-US model only and is not available to all US model. Per FCC
regulation, all WiFi product marketed in US must fixed to US operation channels only.
56
Illustrations contained in this document are for representation only.

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.4
Linearized                      : Yes
XMP Toolkit                     : 3.1-701
Producer                        : Acrobat Distiller 7.0 (Windows)
Create Date                     : 2015:09:14 16:42:44+08:00
Modify Date                     : 2015:09:14 16:42:44+08:00
Metadata Date                   : 2015:09:14 16:42:42+08:00
Creator Tool                    : PScript5.dll Version 5.2.2
Document ID                     : uuid:905F1B90BC5AE511931DA444DCF62AD2
Instance ID                     : uuid:150851ef-592c-429b-b1fc-03b3fe3fa98e
Derived From Instance ID        : uuid:be700845-2fec-4847-a74d-2ea78e24cdd2
Derived From Document ID        : uuid:9ED89264BB5AE511AA84F40A9E2B04F2
Format                          : application/postscript
Creator                         : CARRIE
Title                           : UM_PKE1334D(US-RoHS)_TCG220_V14_David_20150820.pdf
Page Count                      : 59
Author                          : CARRIE
EXIF Metadata provided by EXIF.tools
FCC ID Filing: H8N-PKE1334

Navigation menu