Cisco Dpq3925x User Manual
Have a look at the manual Cisco Dpq3925x User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 53 Cisco manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
4021193 Rev C 51 Configure Wireless Settings Wireless Advanced Settings Page Description Use the descriptions and instructions in the following table to configure the advanced wireless settings for your residential gateway. After you make your selections, click Save Settings to apply your changes or Cancel Changes to cancel.
52 4021193 Rev C Configure Wireless Settings Section Field Description Advanced Wireless N Transmission Rate The rate of data transmission should be set depending on the speed of your Wireless-N networking. Select from a range of transmission speeds, or select Auto to have the device automatically use the fastest possible data rate and enable the Auto-Fallback feature. Auto-Fallback negotiates the best possible connection speed between the device and a wireless client. The factory default setting is Auto. Choose one of the following options for transmission rate: Auto (factory default) Use Legacy Rate 0: 6.5 or 13.5 Mbps 1: 13 or 27 Mbps 2: 19.5 or 40.5 Mbps 3: 26 or 54 Mbps 4: 39 or 81 Mbps 5: 52 or 108 Mbps 6: 58.5 or 121.5 Mbps 7: 65 or 135 Mbps 8: 13 or 27 Mbps 9: 26 or 54 Mbps 10: 39 or 81 Mbps 11: 52 or 108 Mbps 12: 78 or 162 Mbps 13: 104 or 216 Mbps 14:117 or 243 Mbps 15: 130 or 270 Mbps CTS Protection Mode CTS (Clear-To-Send) Protection Mode boosts the devices ability to catch all wireless transmissions, but can severely decrease performance. Select Auto to use this feature when needed, when the Wireless-N/G products are not able to transmit to the device in an environment with heavy 802.11b traffic. Select Disable to permanently disable this feature. Beacon Interval The Beacon Interval value indicates the frequency interval of the beacon. A beacon is a packet broadcast by the device to synchronize the wireless network. (Default: 100 msec, Range: 20-1000)
4021193 Rev C 53 Configure Wireless Settings Section Field Description DTIM Interval The Delivery Traffic Indication Message (DTIM) indicates the interval between Broadcasts/Multicast transmissions. DTIM field is a countdown field informing clients of the next window for listening to broadcast and multicast messages. When the device has buffered broadcast or multicast messages for associated clients, it sends the next DTIM with a DTIM Interval value. Its clients hear the beacons and awaken to receive the broadcast and multicast messages. (Default: 1, Range: 1-255) Fragmentation Threshold The fragmentation threshold value specifies the maximum size for a packet before data is fragmented into multiple packets. If you experience a high packet error rate, you may slightly increase the Fragmentation Threshold. Setting the Fragmentation Threshold too low may result in poor network performance. Only minor reduction of the default value is recommended. In most cases, it should remain at its default value of 2346. RTS Threshold The RTS Threshold determines at what packet size beyond which the ready to send/clear to send (RTS/CTS) mechanism is invoked. Should you encounter inconsistent data flow, only minor reduction of the default value, 2346, is recommended. If a network packet is smaller than the preset RTS Threshold size, the RTS/CTS mechanism will not be enabled. The device sends Request to Send (RTS) frames to a particular receiving station and negotiates the sending of a data frame. After receiving an RTS, the wireless station responds with a Clear to Send (CTS) frame to acknowledge the right to begin transmission. The RTS Threshold value should remain at its default value of 2347.
54 4021193 Rev C Configure Wireless Settings Wireless > WDS Settings The Wireless Distribution System (WDS) Settings page allows you to expand the coverage of your wireless network by deploying signal repeaters. Make sure the channel settings are the same for all WDS enabled devices. Select the WDS Settings tab to open the Wireless WDS Settings page. Use this page to configure the WDS settings. Wireless WDS Settings Page Description Use the descriptions and instructions in the following table to configure the wireless distribution system settings for your residential gateway. After you make your selections, click Save Settings to apply your changes or Cancel Changes to cancel. Section Field Description WDS WDS MAC Address Displays the WDS MAC Address (or BSSID) of your gateway access point Allow Wireless Signal To Be Repeated by a Repeater Check this box to allow a wireless client to connect to a repeater and route traffic between the wireless client and a repeater. A maximum of 3 repeaters are allowed. Remote Access Points MAC Address (MAC 1 through 3) Use the three fields (MAC 1, 2, and 3) to enter the MAC address of the repeaters
4021193 Rev C 55 Configure Wireless Settings Wireless > QoS Quality of Service (QoS) ensures better service to high-priority types of network traffic, which may involve demanding, real-time applications, such as video conferencing. QoS settings allow you to specify priorities for different types of traffic. Lower priority traffic will be slowed down to allow greater throughput or less delay for high priority traffic. Select the QoS tab to open the Wireless QoS page. Wireless QoS Page Description Use the descriptions and instructions in the following table to configure each QoS setting. After you make your selections, click Save Settings to apply your changes or Cancel Changes to cancel. Section Field Description Quality of Service (QoS) Wireless WMM Support If WMM (Wi-Fi Multimedia) is supported by your wireless clients, enabling this feature means that voice and multimedia traffic will be given higher priority than other traffic. Select the desired option: Enable (factory default) Disable
56 4021193 Rev C Configure Wireless Settings Section Field Description No ACK Allows you to enable or disable NO ACK. This feature is recommended for data services where transmission is important and packet loss is tolerable to a certain degree. If you select Disable, an acknowledge packet is returned for every packet received. This provides a more reliable transmission, but it increases traffic load, which decreases performance. Select the desired option: Enable Disable (factory default)
4021193 Rev C 57 Configure Security Configure Security Security > Firewall Advanced firewall technology deters hackers and protects the home network from unauthorized access. Use this page to configure a firewall that can filter out various types of unwanted traffic on the gateway‘s local network. Select the Firewall tab to open the Security Firewall page. Use the descriptions and instructions in the following table to configure the firewall for your residential gateway. After you make your selections, click Save Settings to apply your changes or Cancel Changes to cancel. Section Field Description Firewall SPI Firewall Protection SPI Firewall Protection blocks Denial of Service (DoS) attacks. A DoS attack does not attempt to steal data or damage your computers, but it overloads your Internet connection so you cannot use it. Select the desired option: Enable (factory default) Disable
58 4021193 Rev C Configure Security Section Field Description Filters Filter Proxy Enables/disables filter proxy. If local users have access to WAN proxy servers, they may be able to circumvent the content filters and access Internet sites blocked by the device. If you select the Filter Proxy feature, it will block access to any WAN proxy servers. Block Pop-Up Windows Enables/disables popup windows. Some commonly used applications employ popup windows as part of the application. If you disable popup windows, it may interfere with some of these applications. Block Web Page Cookies Enables/disables cookie blocking. This feature filters the unsolicited delivery of cookies to devices from the Internet to devices in your private local network. Cookies are computer files that contain personal information or web surfing behavior data. Block Java and ActiveX Scripts Enables/disables java applets and ActiveX scripts. This feature helps to protect the devices in your private network from irritating or malicious Java applets that are sent, unsolicited, to devices in your private network from the Internet. These applets run automatically when they are received by a PC. Java is a programming language for websites. If you select the Filter Java Applets feature, you may not have access to Internet sites created using this programming language. This feature also helps to protect the devices in your private network from irritating or malicious ActiveX controls that are sent, unsolicited, to devices in your private network from the Internet. These ActiveX controls run automatically when they are received by a PC. Block fragmented IP packets Enables/disables filtering of fragmented IP packets. This feature helps protect your private local network from Internet based denial of service attacks. Block Port Scan Detection Enables/disables the gateway from responding to Internet based port scans. This feature is designed to protect your private local network from Internet based hackers who attempt to gain unsolicited access your network by detecting open IP ports on your gateway. Block IP Flood Detection (checked – factory default) Blocks malicious devices that are attempting to flood devices or networks with illegal broadcast packets. Also referred to as ―broadcast storm.‖ Block WAN Requests Block Anonymous Internet Requests (checked – factory default) Enable this feature to keep your network from being pinged or detected by other Internet users. The Block Anonymous Internet Requests feature also hides your network ports. Both make it more difficult for outside users to enter your network.
4021193 Rev C 59 Configure Security Security > VPN Passthrough Use this page to configure Virtual Private Network (VPN) support. Enabling the settings on this page allows VPN tunnels using IPsec or PPTP protocols to pass through the gateways firewall. Select the VPN Passthrough tab to open the Security VPN Passthrough page. Use the descriptions and instructions in the following table to configure the VPN passthrough for your residential gateway. After you make your selections, click Save Settings to apply your changes or Cancel Changes to cancel. Section Field Description VPN Passthrough IPSec Passthrough Enables/disables Internet Protocol Security (IPsec). IPsec is a suite of protocols used to implement secure exchange of packets at the IP layer. If you enable IPSec Passthrough, applications that use IPsec (IP Security) can pass through the firewall. To disable IPSec Passthrough select Disable. Select the desired option: Enable (factory default) Disable PPTP Passthrough Enables/disables Point-to-Point Tunneling Protocol (PPTP). PPTP allows the Point-to-Point Protocol (PPP) to be tunneled through an IP network. If you enable PPTP passthrough, applications that use Point to Point Tunneling Protocol (PPTP) can pass through the firewall To disable PPTP Passthrough select Disable. Select the desired option: Enable (factory default) Disable
60 4021193 Rev C Configure Security Security > VPN A Virtual Private Network (VPN) is a connection between two endpoints in different networks that allows private data to be sent securely over public networks or other private networks. This is accomplished by creating a VPN tunnel. A VPN tunnel connects the two PCs or networks and allows data to be transmitted over the Internet as if it were on a private network. The VPN tunnel uses IPsec to encrypt the data sent between the two endpoints and encapsulate the data within a normal Ethernet/IP frame allowing the data to pass between networks securely and seamlessly. A VPN provides a cost-effective and more secure alternative to using a private, dedicated, leased line for a private network. Using industry standard encryption and authentication techniques, an IPsec VPN creates a secure connection that operates as if you were directly connected to your local private network. For example, a VPN allows users to sit at home and connect to his/her employers corporate network and receive an IP address in their private network just as though they were sitting in their office connected to their corporate LAN. Select the VPN tab to open the Security VPN page. Use this page to configure the VPN for your residential gateway.