MG 7550
MG 7550
Contents
ii
1 Safety Precautions
Read the following information carefully before operating the device. Please follow
the following precaution items to protect the device from risks and damage caused
by fire and electric power:
Use volume labels to mark the type of power.
Use the power adapter that is packed within the device package.
Pay attention to the power load of the outlet or prolonged lines. An
overburden power outlet or damaged lines and plugs may cause electric
shock or fire accident. Check the power cords regularly. If you find any
damage, replace it at once.
Proper space left for heat dissipation is necessary to avoid any damage
caused by overheating to the device. The holes on the device are designed
for heat dissipation to ensure that the device works normally. Do not cover
these heat dissipation holes.
Do not put this device close to a place where a heat source exits or high
temperature occurs. Avoid the device from direct sunshine.
Do not put this device close to a place where is over damp or watery. Do not
spill any fluid on this device.
Do not connect this device to any PC or electronic product, unless our
customer engineer or your broadband provider instructs you to do this,
because any wrong connection may cause any power or fire risk.
Do not place this device on an unstable surface or support.
The screen of the coaxial cable is intended to be connected to earth in the
building installation.
2 Overview
The MG7550 is targeted towards DOCSIS3.0 cable modem and gateway. With
sixteen downstream channels and four upstream channels, it supports up to
600Mbs/160Mbs.The MG7550 incorporates a variety of industry standard
peripheral interfaces including dual IEEE802.3 10/100/1000Mbps interface, one
with integrated GPHY. The MG7550 supports WLAN access. It complies with IEEE
802.11,802.11b/g,802.11n and 802.11ac specifications, WEP, WPA, and WPA2
security specifications. The WLAN of the MG7550 supports 3T3R.
2.1 Application
Home gateway
SOHOs
Small enterprises
Higher data rate broadband sharing
Audio and video streaming and transfer
PC file and application sharing
Network and online gaming
2.2 Features
User-friendly GUI for web configuration
Several pre-configured popular games. Just enable the game and the port
settings are automatically configured.
Compatible with all standard Internet applications
WLAN with high-speed data transfer rates of up to 600 Mbps, compatible
with IEEE 802.11b/g/n/ac, 2.4GHz/5GHz compliant equipment
IP routing and bridging
Network/port address translation (NAT/PAT)
Wireless LAN security: WPA, 802.1x, RADIUS client
Universal plug-and-play(UPnP)
2
Warning:
Do not press the Reset button unless you want to clear the current settings. The
Reset button is in a small circular hole on the rear panel. If you want to restore the
default settings, please press the Reset button gently for 5 second with a fine needle
inserted into the hole and then release the button. The system reboots and returns to
the factory defaults.
Each network interface on the PC should either be configured with a statically defined
IP address and DNS address, or be instructed to automatically obtain an IP address
using the network DHCP server. MG7550 provides a DHCP server on its LAN and it
is recommended to configure your LAN to automatically obtain its IP address and
DNS server IP address.
The configuration principle is identical but should be carried out differently on each
operating system.
The following displays the TCP/IP Properties dialog box on Windows 7.
10
5 Web-Based Management
This chapter describes how to use Web-based management of the Cable Modem,
which allows you to configure and control all of cable modem residential gateway
features and system parameters in a user-friendly GUI.
5.1 Status
5.1.1 Software
Choose Status > Software and the following page appears.
11
5.1.2 Connection
Choose Status > Connection and the following page appears.
12
13
5.1.3 Diagnostics
Choose Status > Diagnostics and the following page appears.
14
Traceroute allows you to map the network path from the CM/RG to a public host.
Selecting Traceroute from the drop-down Utility list will present alternate controls for
the traceroute utility: To run either utility, make any changes to the default parameters
and select Start Test to begin. The window will automatically be refreshed as the
results are displayed in the Results table.
5.1.4 Security
Choose Status > Security and the following page appears.
15
Choose Basic Router and the submenus of Basic Router are shown as below.
5.2.1 Setup
Choose Basic Router > Setup , and the following page appears.
16
Some configurations settings are retrieved only once from non-volatile storage
when the CM/RG first powers up. One such setting is changing the IPv4 Address
parameters. Any changes to these settings will force the CM/RG to reset so that
the new configuration can be read from non-volatile storage.
When this mandatory reset is required, the web interface will notify as follows:
17
5.2.2 DHCP
Choose Basic Router > DHCP, and the following page appears.
18
19
5.2.3 DHCPv6
Choose Basic Router > DHCPv6 , and the following page appears.
20
5.2.5 DDNS
Choose Basic Router > DDNS , and the following page appears.
21
The CM/RG supports a dynamic DNS client compatible with the Dynamic DNS
service (http://www.dyndns.com/).
To activate the DDNS client:
1. Go to the Dynamic DNS website and create an account for the Dynamic DNS
service. You will create a username and password, and be asked to choose a
host name for your server, and the dynamic DNS domain to which your host will be
assigned. You will also be asked for your host’s current IP address. This is the
WAN IP address that has been assigned to your CM/RG during provisioning. (See
WAN IP Address on the Basic Router/ Setup web page.)
2. Enter your account information on the Basic Router/ DDNS web page, enable
the service by selecting www.DynDNS.org from the DDNS Service drop-down list,
and click Save.
3. The DDNS client will notify the DDNS service whenever the WAN IP address
changes so that your chosen host name will be resolved properly by inquiring hosts.
The current status of the service is shown at the bottom of the DDNS web page.
5.2.6 Backup/Restore
Choose Basic Router > Backup/Restore and the following page appears.
22
configuration, or to recover from changes you may have made that have had an
undesirable effect.
To back up the current configuration, click Backup and follow the prompts.
To restore a previous configuration, click Browse and use the navigation window to
locate the file. (Usually GatewaySettings.bin, unless you rename it before
saving.) Once the file has been located, click Restore to restore the settings.
Note that once the settings are restored, the device will reboot.
5.3.1 Options
Choose Advanced Router > Options to display the following page.
23
24
visible from the Internet. This makes it difficult for hackers to discover your WAN IP
address and launch an attack on your private LAN.
IpSec PassThrough enables a VPN device or VPN software located behind your
cable modem/router and running IpSec to communicate successfully with endpoints
on the Internet.
PPTP (Point-to-Point Tunneling Protocol) PassThrough enables a VPN device or
VPN software located behind your cable modem/router and running PPTP to
communicate successfully with endpoints on the Internet.
Remote Config Management: When enabled, navigate to http://‹CM WAN
IPAddress›:8080/ to administer your Cable Modem/Router remotely. You can find
your Cable Modem/Router's WAN IP address on the Basic Setup page.
Multicast :Allows multicast specific traffic to be passed to and from the PCs on your
LAN behind your Cable Modem/Router
UPnP: If you are running an application that requires UPnP, Enable UPnP.
Primary Network Bridged: Enable or Disable the feature Pass Through These MAC
Addresses.
5.3.2 IP Filtering
Choose Advanced Router> IP Filtering to display the following page.
25
26
5.3.5 Forwarding
Choose Advanced Router > Forwarding to display the following page.
27
29
5.) To specify a RIP unicast destination IP address, enter the IP address and subnet
mask.
To enable the CMTS for RIPv2 with MD-5 authentication (Cisco uBR example shown
below):
1.) The following steps go through configuring RIPv2 for a Cisco CMTS. The network
number used in this configuration will vary from network to network so use the
network number that matches your set-up.
7223#configure terminal
7223(config)#key chain ubr
7223(config-keychain)#key 1
7223(config-keychain-key)#key-str BRCMV2
7223(config-keychain-key)#exit
7223(config-keychain)#exit
7223(config)#router rip
7223(config-router)#ver 2
7223(config-router)#no validate-update
7223(config-router)#passive-interface cable 2/0
7223(config-router)#network 10.0.0.0
7223(config-router)#exit
7223(config)#inter cable 2/0
7223(config-if)#ip rip receive ver 2
7223(config-if)#ip rip authentication mode md5
7223(config-if)#ip rip authentication key-chain ubr
7223(config-if)#exit
7223(config)#exit
In this example, we have named the key chain ‘ubr’. This was chosen arbitrarily. You
can use any name you like as long as you specify the correct name when specifying
which key chain to use for RIPv2 authentication.
2.) The next step is enable RIP debugging to ensure that the CMTS is receiving and
authenticating messages from the residential gateway.
7223#debug ip rip
RIP protocol debugging is on
31
7223#term mon
The CMTS is now configured to accept RIPv2 messages. If the CM/RG is registered
on the CMTS, you should see messages that are similar to the message below:
00:28:41: RIP: received packet with MD5 authentication
00:28:41: RIP: received v2 update from 10.24.81.148 on Cable2/0
00:28:41: 10.24.81.0/24 via 10.24.81.148 in 1 hops
The CM/RG has broadcast that is connected to the network 10.24.81.0/24 through
the interface 10.24.81.148. This information is not very useful to the CMTS because it
already knows that the network 10.24.81.0/24 is connected directly to one of its
interfaces (Cable2/0). It ignores this message and doesn’t add any information to the
IP routing table. Here is the IP routing table after the CMTS has received RIPv2
messages:
7223#sh ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route
Gateway of last resort is 10.24.95.17 to network 0.0.0.0
10.0.0.0/8 is variably subnetted, 3 subnets, 2 masks
C 10.24.80.0/24 is directly connected, Cable2/0
C 10.24.81.0/24 is directly connected, Cable2/0
C 10.24.95.16/28 is directly connected, FastEthernet0/0
S* 0.0.0.0/0 [1/0] via 10.24.95.17
In the example above, the CM/RG was set up to send RIPv2 messages to the CMTS.
The CMTS was also set up to receive these messages.
32
5.4 Wireless
5.4.1 Basic
Choose Wireless > Basic to display the following page.
33
34
These issues are more likely to be encountered in the 2.4 GHz band where legacy
(802.11b/g) devices may be operating using 20 MHz channels.
Sideband for Control Channel (40 MHz only):
Whether the 20 MHz control channel uses the upper or lower half of the 40 MHz
channel. Changes to this setting may change the control channel setting. For
example (in the 2.4 GHz band), if the upper 20 MHz is selected as the sideband for
the control channel, then the lowest control channel available would be channel 5 to
allow the lower 20 MHz for data.
5.4.2 Radio
Choose Wireless > Radio to display the following page.
5.4.3 WPS_RADIUS_WEP
Choose Wireless > WPS_RADIUS_WEP to display the following page.
35
36
WPS Enable/Disable:
WPS stands for Wi-Fi Protected Setup. WPS provides two methods to automatically
distribute wireless keys to clients that support this feature, described below. For the
record, as of July, 2015, Apple devices did not support WPS.
WPS Client PIN Method:
On your client device, run a utility to generate a WPS PIN.
Copy the PIN that the client generates and enter it here, then press the Save button.
Once this process is complete, your cable modem/router will display the results, or it
will time out after about two minutes.
Note that this method will change the default SSID and key for your network.
WPA:
Wi-Fi Protected Access is a slightly older and less secure algorithm for securing a
wireless network. This is the Enterprise variant that requires configuration of a
RADIUS server.
WPA-PSK:
The Pre-Shared Key mode of the WPA algorithm which does not require use of a
RADIUS server. This is also known as WPA Personal. WPA and WPA-PSK cannot be
used at the same time.
WPA2:
An advanced form of WPA that is more secure. This is the Enterprise mode of WPA2
which requires the use of a RADIUS server. WPA2 and WPA may be used at the
same time to provide backward compatibility with devices that do not support WPA2.
WPA2-PSK:
The Pre-Shared Key mode of WPA2, also known as WPA2 Personal.WPA2 and
WPA2-PSK cannot be used at the same time. WPA2-PSK and WPA-PSK may be
used at the same time to provide backward compatibility with devices that do not
support WPA2.
Encryption:
Select the desired encryption protocol for your network. The default is TKIP+AES.
RADIUS:
Disable WPA-PSK / WPA2-PSK and Enable WPA / WPA2 to un-gray out RADIUS
settings.
37
802.11n Mode:
Set this parameter to OFF to force 802.11g mode (required to enable WEP). The
default value is Auto.
WEP Encryption:
Disabled and grayed out by default. If you need WEP Encryption, set 802.11n Mode
to OFF to un-gray out, and then Enable this parameter.
Network Key 1 thru Network Key 4:
When WEP encryption is enabled, sets the static WEP keys. Enter 5 ASCII
characters or 10 hexadecimal digits for a 64-bit key. Enter 13 ASCII characters or 26
hexadecimal digits for a 128-bit key.
Current Network Key:
This selects the Network Key used for transmissions. Select 1 - 4 (default 1).
PassPhrase:
Enter a 10 or 26 character string, then press Generate WEP Keys to generate
Network Keys 1 - 4.
5.4.4 Guest
Choose Wireless > Guest to display the following page.
38
The page allows you to configure a secondary guest network on the wireless
interface.
Select Guest Network:
This is a pull down of Moto_Guest0 to Moto_Guest7.
Guest Network Status:
Enable or Disable the Guest Network selected above.
Guest Network Name (SSID):
Either accept the default Network Name, or change the name by entering the new
name here, and clicking the Save button.
WPA-PSK / WPA2-PSK Security Key / Password:
Enter a key here, and click the Save button to save it.
5.4.5 Access
Choose Wireless > Access to display the following page.
39
40
receive signal strength (in dBm), IP address, and host name are presented. The age
is the amount of time elapsed since data was transmitted to or received from the
client.
5.4.6 Advanced
Choose Wireless > Advanced to display the following page.
41
42
OBSS Coexistence:
OBSS coexistence refers to the ability of your device to support 20 MHz clients within
40 MHz channels. It also allows your device to reduce interference from nearby 20
MHz devices that are interfering with part of your device's 40 MHz channel.
Hide SSID (Closed Network):
When this feature is enabled, the SSID is not broadcast. Therefore, only devices that
already know the SSID will be able to connect.
Mode Required:
Select None, HT or ERP, where HT and ERP refer to High Throughput and Extended
Rate PHY, respectively. These settings determine how your network interacts with
older (802.11b/g) and newer (802.11n) wireless clients. Most users will leave this at
the default setting of None.
Isolate Client:
When this feature is enabled, wireless clients are isolated from your wired network
and from each other. They can only access the Internet, but not any servers or other
devices on your network.
54g™ Mode:
Sets the network mode for legacy 802.11g & 802.11b networks. To un-gray out this
selection, under the 2.4GHz tab in WPS_RADIUS_WEP, Disable 802.11n Mode.
Choices are 54g Auto, 54g only, 54g Performance, 54g LRS, and 802.11b Only. 54g
Auto accepts 54g, 802.11g, and 802.11b clients, but optimizes performance based on
the type of clients connected. 54g Performance accepts only 54g™ clients and
provides the highest throughout; nearby 802.11b networks may have degraded
performance. 54g LRS interoperates with the widest variety of 54g™, 802.11g, and
802.11b clients. 80211b accepts only 802.11b clients.
Xpress Technology:
Enable Broadcom proprietary method of block frame acknowledgement for 802.11g
frames. This feature may improve throughput, but may cause problems.
Afterburner Technology
This feature removes the need for the acknowledgement of data frames. It may
improve throughput, but may cause problems.
43
802.11n Protection:
802.11n Protection protects legacy 802.11b&g devices that are within range of your
cable modem/router. This feature is enabled (Auto) by default.
In some environments with no legacy devices, you may improve performance by
disabling this feature.
Basic Rate Set:
Determines which rates are advertised as “basic” rates. Default uses the driver
defaults. Sets all available rates as basic rates.
Multicast Rate:
This is the rate at which you send out multicast packets to stations. Multicast packets
are not acknowledged.
NPHY Rate:
Choose 802.11n rate to be applied to all unicast packets.
Legacy Rate:
“N” mode must be off on the “radio” webpage for this control to be active. When
active the user can force the rate in which the AP will operate.
Beacon Interval:
Sets the beacon interval in milliseconds for the AP. The default is 100, which is fine
for nearly all applications.
DTIM Interval:
Sets the wakeup interval for clients in power-save mode. When a client is running in
power save mode, lower values provide higher performance but result in decreased
client battery life, while higher values provide lower performance but result in
increased client battery life.
Fragmentation Threshold:
Sets the fragmentation threshold. Packets exceeding this threshold will be
fragmented into packets no larger than the threshold before packet transmission.
RTS Threshold:
Sets the RTS threshold. Packets exceeding this threshold will cause the AP to
perform an RTS/CTS exchange to reserve the wireless medium before packet
transmission.
44
5.4.7 WMM
Choose Wireless > WMM to display the following page.
45
46
5.4.8 Scan/Bridging
Choose Wireless > Scan/Bridging to display the following page.
The “low” setting does not block any services/ports, however it does protect against
invalid packets and well known attacks. The “medium” setting will cause the firewall to
drop a packet unless it is on a specific port of allowed services; the allowed services
are listed on the same page. The “high” setting is similar to “medium”, but allows
access to even fewer services. The “off” setting allows all traffic to pass.
48
Block Fragmented IP packets prevent all fragmented IP packets from passing through
the firewall. Port Scan Detection detects and blocks port scan activity originating on
both the LAN and WAN. IP Flood Detection detects and blocks packet floods
originating on both the LAN and WAN. The Save button must be clicked in order to
activate any of the checkbox items. All of these settings can be activated on-the-fly
without a CM/RG reboot.
49
50
the entry.
Note that you can Disable the entry temporarily if you may want to re-Enable it later.
List of Allowed Addresses: Enter the MAC Address of the device you want to allow
access to a particular site. (Check the user documentation for the device if you need
help finding its MAC Address). Then enter the URL of the web site whose access you
want to allow. Next, if you want to allow access only during certain times enter the
days and start and end times of the access. Next, enter the Protocols to allow
(choose both if you're not sure). Finally, select Enable and click Save to activate the
entry.
Note that you can Disable the entry temporarily if you may want to re-Enable it later.
5.6 VPN
5.6.1 IPSec
Choose VPN > IPSec to display the following page.
51
5.6.2 L2TP/PPTP
Choose VPN > L2TP/PPTP to display the page below.
52
53
5.7 Logout
Choose Logout to logout Account and the following page will be shown after logout.
54
6 Q&A
Apply customer :
55
FCC statement
Warning: Changes or modifications to this unit not expressly approved by the
party responsible for compliance could void the user’s authority to operate the
equipment.
NOTE: This equipment has been tested and found to comply with the limits for
a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are
designed to provide reasonable protection against harmful interference in a
residential installation. This equipment generates, uses and can radiate radio
frequency energy and, if not installed and used in accordance with the
instructions, may cause harmful interference to radio communications.
“The device must not be co-located or operating in conjunction with any other antenna
or transmitter.”
High power radars are allocated as primary users of the 5.25 to 5.35 GHz and 5.65
to 5.85 GHz bands. These radar stations can cause interference with and/or damage
this device. No configuration controls are provided for this wireless equipment allowing
any change in the frequency of operations outside the FCC grant of authorization for
US operation according to Part 15.407 of the FCC rules.
56