Home > Cisco > Wireless Network > Cisco Dpq3925x User Manual

Cisco Dpq3925x User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Cisco Dpq3925x User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 53 Cisco manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							4021193 Rev C  51 
     
     Configure Wireless Settings 
     
     
    Wireless Advanced Settings Page Description 
    Use the descriptions and instructions in the following table to configure the 
    advanced wireless settings for your residential gateway. After you make your 
    selections, click Save Settings to apply your changes or Cancel Changes to cancel.  
    						
    							52  4021193 Rev C 
     
    Configure Wireless Settings 
     
     
    Section Field Description  
    Advanced 
    Wireless 
    N Transmission Rate 
    The rate of data transmission should be set depending on the speed of your 
    Wireless-N networking. Select from a range of transmission speeds, or select Auto 
    to have the device automatically use the fastest possible data rate and enable the 
    Auto-Fallback feature. Auto-Fallback negotiates the best possible connection speed 
    between the device and a wireless client. The factory default setting is Auto.  
    Choose one of the following options for transmission rate: 
     Auto (factory default) 
     Use Legacy Rate 
     0: 6.5 or 13.5 Mbps 
     1: 13 or 27 Mbps 
     2: 19.5 or 40.5 Mbps 
     3: 26 or 54 Mbps 
     4: 39 or 81 Mbps 
     5: 52 or 108 Mbps 
     6: 58.5 or 121.5 Mbps 
     7: 65 or 135 Mbps 
     8: 13 or 27 Mbps 
     9: 26 or 54 Mbps 
     10: 39 or 81 Mbps 
     11: 52 or 108 Mbps 
     12: 78 or 162 Mbps 
     13: 104 or 216 Mbps 
     14:117 or 243 Mbps 
     15: 130 or 270 Mbps 
    CTS Protection Mode 
    CTS (Clear-To-Send) Protection Mode boosts the devices ability to catch all wireless 
    transmissions, but can severely decrease performance. Select Auto to use this 
    feature when needed, when the Wireless-N/G products are not able to transmit to 
    the device in an environment with heavy 802.11b traffic. Select Disable to 
    permanently disable this feature. 
    Beacon Interval 
    The Beacon Interval value indicates the frequency interval of the beacon. A beacon 
    is a packet broadcast by the device to synchronize the wireless network.  
    (Default: 100 msec, Range: 20-1000)  
    						
    							4021193 Rev C  53 
     
     Configure Wireless Settings 
     
    Section Field Description  
    DTIM Interval 
    The Delivery Traffic Indication Message (DTIM) indicates the interval between 
    Broadcasts/Multicast transmissions. DTIM field is a countdown field informing 
    clients of the next window for listening to broadcast and multicast messages. When 
    the device has buffered broadcast or multicast messages for associated clients, it 
    sends the next DTIM with a DTIM Interval value. Its clients hear the beacons and 
    awaken to receive the broadcast and multicast messages.  
    (Default: 1, Range: 1-255) 
    Fragmentation Threshold 
    The fragmentation threshold value specifies the maximum size for a packet before 
    data is fragmented into multiple packets. If you experience a high packet error rate, 
    you may slightly increase the Fragmentation Threshold. Setting the Fragmentation 
    Threshold too low may result in poor network performance. Only minor reduction 
    of the default value is recommended. In most cases, it should remain at its default 
    value of 2346.  
    RTS Threshold 
    The RTS Threshold determines at what packet size beyond which the ready to 
    send/clear to send (RTS/CTS) mechanism is invoked. Should you encounter 
    inconsistent data flow, only minor reduction of the default value, 2346, is 
    recommended. If a network packet is smaller than the preset RTS Threshold size, 
    the RTS/CTS mechanism will not be enabled. The device sends Request to Send 
    (RTS) frames to a particular receiving station and negotiates the sending of a data 
    frame. After receiving an RTS, the wireless station responds with a Clear to Send 
    (CTS) frame to acknowledge the right to begin transmission. The RTS Threshold 
    value should remain at its default value of 2347.  
      
    						
    							54  4021193 Rev C 
     
    Configure Wireless Settings 
     
    Wireless > WDS Settings 
    The Wireless Distribution System (WDS) Settings page allows you to expand the 
    coverage of your wireless network by deploying signal repeaters.  Make sure the 
    channel settings are the same for all WDS enabled devices.  
    Select the WDS Settings tab to open the Wireless WDS Settings page. Use this page 
    to configure the WDS settings. 
     
    Wireless WDS Settings Page Description 
    Use the descriptions and instructions in the following table to configure the wireless 
    distribution system settings for your residential gateway. After you make your 
    selections, click Save Settings to apply your changes or Cancel Changes to cancel. 
    Section Field Description   
    WDS  WDS MAC Address 
    Displays the WDS MAC Address (or BSSID) of your gateway access point 
    Allow Wireless Signal To Be Repeated by a Repeater 
    Check this box to allow a wireless client to connect to a repeater and route 
    traffic between the wireless client and a repeater. A maximum of 3 
    repeaters are allowed.  
    Remote Access Points MAC Address (MAC 1 through 3) 
    Use the three fields (MAC 1, 2, and 3) to enter the MAC address of the 
    repeaters 
       
    						
    							4021193 Rev C  55 
     
     Configure Wireless Settings 
     
    Wireless > QoS 
    Quality of Service (QoS) ensures better service to high-priority types of network 
    traffic, which may involve demanding, real-time applications, such as video 
    conferencing. QoS settings allow you to specify priorities for different types of 
    traffic. Lower priority traffic will be slowed down to allow greater throughput or 
    less delay for high priority traffic. Select the QoS tab to open the Wireless QoS page. 
     
    Wireless QoS Page Description 
    Use the descriptions and instructions in the following table to configure each QoS 
    setting. After you make your selections, click Save Settings to apply your changes or 
    Cancel Changes to cancel. 
    Section Field Description   
    Quality of Service 
    (QoS) 
                Wireless 
     
     
    WMM Support 
    If WMM (Wi-Fi Multimedia) is supported by your wireless 
    clients, enabling this feature means that voice and multimedia 
    traffic will be given higher priority than other traffic. Select 
    the desired option: 
     Enable (factory default) 
     Disable  
    						
    							56  4021193 Rev C 
     
    Configure Wireless Settings 
     
    Section Field Description   
    No ACK 
    Allows you to enable or disable NO ACK. This feature is 
    recommended for data services where transmission is 
    important and packet loss is tolerable to a certain degree. If 
    you select Disable, an acknowledge packet is returned for 
    every packet received. This provides a more reliable 
    transmission, but it increases traffic load, which decreases 
    performance. 
    Select the desired option: 
     Enable 
     Disable (factory default) 
     
      
    						
    							4021193 Rev C  57 
     
     Configure Security 
     
    Configure Security 
    Security > Firewall 
    Advanced firewall technology deters hackers and protects the home network from 
    unauthorized access. Use this page to configure a firewall that can filter out various 
    types of unwanted traffic on the gateway‘s local network. 
    Select the Firewall tab to open the Security Firewall page. 
     
    Use the descriptions and instructions in the following table to configure the firewall 
    for your residential gateway. After you make your selections, click Save Settings to 
    apply your changes or Cancel Changes to cancel. 
    Section Field Description   
    Firewall SPI Firewall Protection  
    SPI Firewall Protection blocks Denial of Service (DoS) attacks. A DoS attack does not 
    attempt to steal data or damage your computers, but it overloads your Internet 
    connection so you cannot use it.  
    Select the desired option: 
     Enable (factory default) 
     Disable   
    						
    							58  4021193 Rev C 
     
    Configure Security 
     
    Section Field Description   
    Filters Filter Proxy 
    Enables/disables filter proxy. If local users have access to WAN proxy servers, they 
    may be able to circumvent the content filters and access Internet sites blocked by 
    the device. If you select the Filter Proxy feature, it will block access to any WAN 
    proxy servers. 
    Block Pop-Up Windows  
    Enables/disables popup windows. Some commonly used applications employ 
    popup windows as part of the application. If you disable popup windows, it may 
    interfere with some of these applications.  
    Block Web Page Cookies 
    Enables/disables cookie blocking. This feature filters the unsolicited delivery of 
    cookies to devices from the Internet to devices in your private local network. 
    Cookies are computer files that contain personal information or web surfing 
    behavior data. 
    Block Java and ActiveX Scripts 
    Enables/disables java applets and ActiveX scripts. This feature helps to protect the 
    devices in your private network from irritating or malicious Java applets that are 
    sent, unsolicited, to devices in your private network from the Internet. These 
    applets run automatically when they are received by a PC.  
    Java is a programming language for websites. If you select the Filter Java Applets 
    feature, you may not have access to Internet sites created using this programming 
    language.  
    This feature also helps to protect the devices in your private network from irritating 
    or malicious ActiveX controls that are sent, unsolicited, to devices in your private 
    network from the Internet. These ActiveX controls run automatically when they are 
    received by a PC. 
    Block fragmented IP packets 
    Enables/disables filtering of fragmented IP packets. This feature helps protect your 
    private local network from Internet based denial of service attacks. 
    Block Port Scan Detection 
    Enables/disables the gateway from responding to Internet based port scans. This 
    feature is designed to protect your private local network from Internet based 
    hackers who attempt to gain unsolicited access your network by detecting open IP 
    ports on your gateway. 
    Block IP Flood Detection (checked – factory default) 
    Blocks malicious devices that are attempting to flood devices or networks with 
    illegal broadcast packets. Also referred to as ―broadcast storm.‖ 
    Block WAN 
    Requests 
    Block Anonymous Internet Requests (checked – factory default) 
    Enable this feature to keep your network from being pinged or detected by other 
    Internet users. The Block Anonymous Internet Requests feature also hides your 
    network ports. Both make it more difficult for outside users to enter your network.    
    						
    							4021193 Rev C  59 
     
     Configure Security 
     
    Security > VPN Passthrough 
    Use this page to configure Virtual Private Network (VPN) support. Enabling the 
    settings on this page allows VPN tunnels using IPsec or PPTP protocols to pass 
    through the gateways firewall. Select the VPN Passthrough tab to open the Security 
    VPN Passthrough page. 
     
    Use the descriptions and instructions in the following table to configure the VPN 
    passthrough for your residential gateway. After you make your selections, click Save 
    Settings to apply your changes or Cancel Changes to cancel. 
    Section Field Description   
    VPN 
    Passthrough 
    IPSec Passthrough 
    Enables/disables Internet Protocol Security (IPsec). IPsec is a suite of 
    protocols used to implement secure exchange of packets at the IP layer. If 
    you enable IPSec Passthrough, applications that use IPsec (IP Security) can 
    pass through the firewall. To disable IPSec Passthrough select Disable. 
    Select the desired option: 
     Enable (factory default) 
     Disable 
    PPTP Passthrough 
    Enables/disables Point-to-Point Tunneling Protocol (PPTP). PPTP allows the 
    Point-to-Point Protocol (PPP) to be tunneled through an IP network. If you 
    enable PPTP passthrough, applications that use Point to Point Tunneling 
    Protocol (PPTP) can pass through the firewall To disable PPTP Passthrough 
    select Disable. 
    Select the desired option: 
     Enable (factory default) 
     Disable 
       
    						
    							60  4021193 Rev C 
     
    Configure Security 
     
    Security > VPN 
    A Virtual Private Network (VPN) is a connection between two endpoints in different 
    networks that allows private data to be sent securely over public networks or other 
    private networks. This is accomplished by creating a VPN tunnel. A VPN tunnel 
    connects the two PCs or networks and allows data to be transmitted over the 
    Internet as if it were on a private network. The VPN tunnel uses IPsec to encrypt the 
    data sent between the two endpoints and encapsulate the data within a normal 
    Ethernet/IP frame allowing the data to pass between networks securely and 
    seamlessly.  
    A VPN provides a cost-effective and more secure alternative to using a private, 
    dedicated, leased line for a private network. Using industry standard encryption and 
    authentication techniques, an IPsec VPN creates a secure connection that operates as 
    if you were directly connected to your local private network. 
    For example, a VPN allows users to sit at home and connect to his/her employers 
    corporate network and receive an IP address in their private network just as though 
    they were sitting in their office connected to their corporate LAN.  
    Select the VPN tab to open the Security VPN page. 
    Use this page to configure the VPN for your residential gateway. 
      
    						
    All Cisco manuals Comments (0)