If only one input is used, it is recommended to load the unused input with a 75ohm load ref. It has an output connector and a test output dB placed in the upper part of the front pannel. Broadband amplifiers in shielded zamak chassis, with gain configured by the installer. This option is used as headend amplifiers or CATV line amplifiers.
The programmer consists of 4 buttons: : short press - Selection of parameter positioning of the cursor. User manual 5. First the version of the programmer firmware appears: a. PCT firmware version V:x. To change the frequency or symbol rate, press the key until the cursor is over the selected digit. Change using the and keys. To change the selection of the LNB power, press the key until the required parameter flashes. To change the output frequency, press the key until the cursor is over the selected digit.
Note: The symbol rate will not be shown if the Auto Config option on the extended menu is activated see section 5. User manual selected in section 5. Otherwise in normal mode , 16, 32, 64, or QAM may be selected. It is important to bear in mind that the maximum symbol rate in QAM is 7. For example: Input symbol rate: For example, if we select 64QAM, the symbol rate for the previous values will be 6.
The next parameter, spectrum inversion IQ , makes it possible to change the IQ modulation format to normal or inverted.
Output level with range from 00 to To change the QAM modulation order, spectrum inversion and output level, press the key until the required parameter flashes.
This figure is useful when programming some IRDs. As it is a read-only menu, neither and keys are operative. Holding down the key gives access to the different configurations of the unit, which are changed using the and keys.
In the Autoconfig mode, the unit finds the symbol rate and QAM modulation format from a search table with priority as shown below:. The following indication will be shown:. Norm turns on the modulated signal output in QAM, while CW provides a continuous carrier at the same frequency as the output signal.
Finally, the CDCAddr menu allows users to change the device address in the main Televs control system. The range of permitted addresses is from 1 to Saving settings and restarting If the configuration data are modified but not saved, the previous configuration will be restored after 30 seconds, cancelling the changes made.
The access code for the 8PSK-QAM operates as follows: - To enter an access code, an input channel must be saved in the range of unused frequencies. Pressing the key for approximately 3 seconds will bring up the following screen:. The paswword will be set to: - To check the password, the key must be held down for approximately 3 seconds.
The screen will show the following message:. QAM modulator locking Finally, the front LED incorporates a direct view of the status of the device, showing a quick blinking in case of an unlock condition of the QPSK demodulator or QAM modulator, which blinking dissapears when the lock condition is restored.
Please type in the password: The user must enter the correct password and save it by pressing the key for approximately 3 seconds. The unit will then unlock, and the key symbol will disappear from the upper right-hand side of the screen. User manual 7. Using the program, the user can configure and read all of the parameters, as well as check that the device is working properly. Once communication has been established with the headend control, you will be able to access all the controllable devices that have been installed in the headend.
In this case, it is essential that every element is programmed using a different device address address RS between 1 and User manual 9. The air will enter again through the lower part of the device, fig 3. To facilitate the renewal and circulation of the air inside the rack, and the temperature of the units and thus improve their characteristics, it is advisable to place 2 ventilation units of 25W, particularly when the rack with the 8PSK-QAM is located in warm place, with a temperature higher than 40C.
To mount the units in the rack with ventilation, you must mount blank plates ref. These ventilators will be placed on a tray, that is screwed onto the top part of the Rack, fig. User manual It is very important that this process operates correctly, therefore the following must be observed: - Do not open the side doors, as this would cause the ventilators to extract the air from the outside rather than the air in the inside of the rack.
To install the units in racks without installation facilities, and when the rack is located in a place with a temperature of around 40C, it is advisable to place the rack completely open, in other words, do not use the side doors.
This is to facilitate the ventilation of the units. The use of the blank plates ref. If the ambient temperature in the room is above 40 C, will install the ventilation unit Ref. The maximum temperature permitted surrounding the highest cabinet is 45C in both ways of placement, horizontal or vertical way. Horizontal placement of the cabinets is strongly recommended, hanging them with as less height as possible. If the horizontal placement is impossible, then vertical placement is allowed. Respect the recommended minimum distances in the attached schemes.
Manual de instrucciones 1. ROE de entrada: 10 dB min. Velocidad smb. Las caractersticas tcnicas descritas se definen para una temperatura ambiente de 40C F Para temperaturas superiores se utilizar ventilacin forzada, ver pg.
Manual de instrucciones 2. Programador Universal. Regleta soporte 7 md. Manual de instrucciones 4. Satlite 2. Satlite 3. La canalizacin depende de la tasa binaria til del transpondedor de satlite y del formato de modulacin QAM seleccionado. Para ello, antes de nada, el 8PSK-QAM realiza la desmodulacin del canal de entrada transpondedor de satlite , para posteriormente llevar a cabo una. Los parmetros de los canales de entrada y salida son seleccionados mediante el programador ref.
Tambin se puede programar la unidad mediante un PC, tal y como se explica en el apartado 7. The conector superior 1 es el conector de la seal de entrada y habilita la alimentacin del LNB. El conector inferior 2. En el caso de un cortocircuito, el LED del frontal parpadea, cesando el parpadeo cuando el cortocircuito se haya resuelto, y restableciendo el voltaje del LNB. Dispone de dos conectores de entrada de seal, para permitir la mezcla de los canales suministrados por dos sistemas. Si se utiliza slo una de las entradas, se recomienda cargar la entrada no utilizada con una carga de 75 ohm, ref Dispone de un conector de salida y una toma de Test dB situadas en la parte superior del panel frontal.
La alimentacin se realiza a 15V, a travs de un latiguillo igual al utilizado para la alimentacin de los otros mdulos del sistema. Compartir este documento Compartir o incrustar documentos Opciones para compartir Compartir en Facebook, abre una nueva ventana Facebook. Denunciar este documento.
Marcar por contenido inapropiado. Descargar ahora. Carrusel anterior Carrusel siguiente. Buscar dentro del documento. Abra su navegador de internet. Ej: Internet Explorer.
Si la MAC Address es , anotar 5. Atencin a Clientes: 01 Documentos similares a Manual Cablecom. Cristian Rogel Castillo. Juan Carlos Roa Roa. Agustin Miranda. Neutro Sne Crew Neutro. Agustina Otegui Saffores. Isaac Raga. Victor Ernesto Quispe Chile. Nelson Andres Rodriguez Garnica. Brando Manuel Serrano Mendoza. Jonton Bagnado Algalarrondo. Luis Castilla. Felipe Pacheco. A virtual private network VPN is a computer network in which some of the links between nodes are carried by open connections or virtual circuits in some larger network e.
The link-layer protocols of the virtual network are said to be tunneled through the larger network when this is the case.
One common application is secure communications through the public Internet, but a VPN need not have explicit security features, such as authentication or content encryption.
VPNs, for example, can be used to separate the traffic of different user communities over an underlying network with strong security features. Otherwise, it shows Not Connected. IPSec is built around a number of standardized cryptographic techniques to provide confidentiality, data integrity and authentication at the IP layer. A VPN tunnel is usually established in two phases. Each phase establishes a security association SA , a contract indicating what security parameters wireless router and the remote IPSec router will use.
The primary function of key management is to establish and maintain the SA between systems. Once the SA is established, the transport of data may commence. AH Authentication Header Protocol AH protocol RFC was designed for integrity, authentication, sequence integrity replay resistance , and non-repudiation but not for confidentiality, for which the ESP was designed.
In applications where confidentiality is not required or not sanctioned by government encryption restrictions, an AH can be employed to ensure integrity. This type of implementation does not protect the information from dissemination but will allow for verification of the integrity of the information and authentication of the originator.
ESP authenticating properties are limited compared to the AH due to the non-inclusion of the IP header information during the authentication process.
However, ESP is sufficient if only the upper layer protocols need to be authenticated. An added feature of the ESP is payload padding, which further protects communications by concealing the size of the packet being transmitted. Select the specific VPN tunnel to configure. Input the naming for identifying.
This button will delete the selected VPN Once user inputted name in Name field, he can add this tunnel. Quickly select certain VPN tunnel, and enable or disable it, need to click apply.
Define the local address type, - IP Subnet, to protect the whole subnet. Subnet mask value. In Main mode, the ID type and content are encrypted to provide identity protection. The ID type and content act as an extra level of identification for incoming SAs. Identity Remote endpoint settings The value of corresponding to selected Identity type. A pre-shared key identifies a communicating party during a phase 1 IKE negotiation.
It is called "pre-shared" because you have to share it with another party before you can communicate with them over a secure connection. Select which Diffie-Hellman key group DHx you want to use for encryption keys. Choices are: DES - a bit key with the DES encryption algorithm 3DES - a bit key with the DES encryption algorithm wireless router and the remote IPSec router must use the same algorithms and key , which can be used to encrypt and decrypt the message or to generate and verify a message authentication code.
Longer keys require more processing power, resulting in increased latency and decreased throughput. This implementation of AES applies a bit key to bit blocks of data. SHA1 is generally considered stronger than MD5, but it is also slower.
MD5 Message Digest 5 produces a bit digest to authenticate packet data. It may range from to seconds. However, every time the VPN tunnel renegotiates, all users accessing remote resources are temporarily disconnected. Select which key size and encryption algorithm to use for data communications. Not suggested. DES - a bit key with the DES encryption algorithm 3DES - a bit key with the DES encryption algorithm wireless router and the remote IPSec router must use the same algorithms and key , which can be used to encrypt and decrypt the message or to generate and verify a message authentication code.
Longer keys require more. Main Mode, which ensures the highest level of security when the communicating parties are negotiating authentication phase 1. This allows faster IPSec setup, but is not so secure. The IPSec receiver can detect and reject old or duplicate packets to protect against replay attacks. Enable replay detection by selecting this check box. UDP packets that enable a computer to find other computers.
It may sometimes be necessary to allow NetBIOS packets to pass through VPN tunnels in order to allow local computers to find computers on the remote network and vice versa. Force wireless router to detect if the remote IPSec gateway is available or not periodically. Local time mapping to a certain log event. Detail information of a log. Click to refresh current page to view new log event. Click to clear all of the logs. The Parental Control User Setup Page is the master page to which each individual user is linked to a specified time access rule, content filtering rule, and login password to get to the filtered content.
Each specified user may also be enabled as a trusted user which means that person will have access to all Internet content regardless of filters that may be set up. This check box can be used as a simple override to grant a user full access but still having the ability to keep all of the previous filtering settings stored and available. Session duration timers can also be entered to allow a finite amount of time that a user has Internet access via the rules entered once entering their password to get to the Internet for the first time.
This allows access to the Internet for a defined user without having to enter a password every time a new web page is served to the client. Likewise, there is a password inactivity timer if there is no Internet access for the specified amount of time in minutes, requiring the user to re-login at expiration to continue using the Internet.
Any time a change is made on this page for a particular user, the Apply button at the bottom of the page needs to be pressed to activate and store the settings. Input username to create a new user. Click to direct add this user into local database even you havent finished the configuration for this user.
User Settings Enable Click to active this user account, and to modify current selected users profile. Unselect this checkbox, to disable this user account. Remove User Password Click to delete the selected user. Input the password of this user. Its required when this user tries to access Internet via wireless router. Active the Enable checkbox to allow the selected user to be trusted user.
That means hes now limited to timing and content when visiting Internet. But you can define the session duration period which will trigger wireless router to disable this privilege after expiration.
Content Rule Select an existing content rule that defines what kind of website he can visit and what cant be visited. White List Access Only Suppose admin has created a content rule which defined black list and while list. Then admin can select White List Access Only checkbox to force to execute the policy to the selected user.
Time Access Rule Select a defined time access rule to apply to the selected user. Session Duration This will trigger wireless router to disable this privilege after expiration. Inactivity time Define the time out value when user has no activity with his visiting to Internet. Apply Click to save. When you change your Parental Control settings, you must click on the appropriate "Apply", "Add" or "Remove" button for your new settings to take effect.
If you refresh your browser's display, you will see the currently active settings. Input rule name and click to create a new policy. Allow admin to select a certain policy rule. Click to delete the selected policy rule. URL key word list thats used to be used. Click to insert a new keyword. Click to delete an existing keyword. Domain list thats to be blocked.
Click to add a new domain. Click to delete an existing domain White list, which allows users to visit. Click to insert new white list. Click to delete the selected URL list. Click to delete a selected rule. Select the day that this time policy rule limited user to visit Internet. Define the detailed time for this policy rule. Select All Day to eliminate any chance for access within the day blocked.
Description Display the time when the last event occurred. Display whats done by parental control, drop or permit an access request. The networking term firewall is a system or group of systems that enforces an access-control policy between two networks.
It may also be defined as a mechanism used to protect a trusted network from an untrusted network. Of course, firewalls cannot solve all of the security problems. A firewall is one of the mechanisms used to establish a network security perimeter in support of a network security policy. It should never be the only mechanism or method employed. For a firewall to guard effectively, you must design and deploy it appropriately. This requires integrating the firewall into a broad information-security policy.
In addition, specific policies must be implemented within the firewall itself. A list of "trusted computers" can also be defined that are not subject to any filters configured.
Specific Firewall features can also be enabled. It is highly. Go to the Parental Control page to block internet access to specific sites. Content Filter Settings Filter Proxy A server that acts as an intermediary between a user and the Internet to provide security, administrative control, and caching service. When a proxy server is located on the WAN it is possible for LAN users to circumvent content filtering by pointing to this proxy server.
Filter Cookies Cookies are files stored on a computers hard drive. Some web servers use them to track usage and provide service based on ID. Filter Java Applets Java is a programming language and development environment for building downloadable Web components or Internet and intranet business applications of all kinds. Filter ActiveX ActiveX is a tool for building dynamic and active web pages and distributed object applications. When you visit an ActiveX web site, ActiveX controls are downloaded to your.
Filter those pop windows when visiting some website. Enable firewall to detect port scan attack. Enable firewall to detect IP flood attack. Enable firewall function. Enable firewall to protect all of the routed subnet connected to the wireless router. If the flag exists, the CM will discard the packet. For example, streaming media applications may fragment the packets depending on the encoding used for the video stream. Depending on the encoding used for the clip, some or a majority of the packets will become fragmented.
Enter E-mail address for sending Firewall event log. If you enable ,the alert can appearance when have a new mail. Click to submit changes. Summary of this firewall event log. If a certain firewall event log repeated for several times, value in count will increase. Display the time when the last of the firewall event occurred. Display the destination IP address of this access event.
Display the source IP address of this access event. Click to send current Firewall event log to e-mail address specified.
Click to clear event log. Select to record all of the access attempts that are allowed by firewall. Select to record all of the access attempts that are blocked by firewall. Record event log for known attacks from Internet.
Record into event log once device configuration is modified by user or admin. Define the IP address of the Syslog server. Click to make the configuration to take effect. Ping Target Ping Size No. Input the IP address user wants to pin to. Define the packet size of ping operation. Define the amount of the batch ping operation.
Define the interval between 2 ping operations. Click to start test Click to stop test Click to clear existing testing result. This area will display result. Click to refresh old logs. Input the specific IP address user wants to trace route to it. Define the MAX hop. Define the expiration time for this tracert operation. Click to start tracert test Click to stop test Click to clear existing testing result. This area will display tracert route operation result. Display the host name of the DHCP client.
Display the method via which the DHCP client is connected to wireless router. Click to refresh the client list. By default, theres one user account that has limited privilege, here to modify username for this account. Input the value of new password Double confirm with the new password. Select to make the wireless router to reset to factory default settings only for firewall and parental settings.
Select to do a power cycle reboot. Open navigation menu. Close suggestions Search Search. User Settings.
0コメント