NVG558 4G-LTE Gateway User Manual, STANDARD Revision X.1 October 2020 P/N 365-095-35715 Commscope Copyrights and Trademarks

Total Page:16

File Type:pdf, Size:1020Kb

NVG558 4G-LTE Gateway User Manual, STANDARD Revision X.1 October 2020 P/N 365-095-35715 Commscope Copyrights and Trademarks NVG558 4G-LTE Gateway User Manual, STANDARD Revision x.1 October 2020 P/N 365-095-35715 CommScope copyrights and trademarks © 2020 CommScope, Inc. All rights reserved. No part of this content may be reproduced in any form or by any means or used to make any derivative work (such as translation, transformation, or adaptation) without written permission from CommScope, Inc. and/or its affiliates (“CommScope”). CommScope reserves the right to revise or change this content from time to time without obligation on the part of CommScope to provide notification of such revision or change. ARRIS and the ARRIS Logo are trademarks of CommScope, Inc. and/or its affiliates. All other trademarks are the property of their respective owners. ® ® ® Wi-Fi Alliance , Wi-Fi , the Wi-Fi logo, the Wi-Fi CERTIFIED logo, Wi-Fi protected access ® (WPA), the Wi-Fi Protected Setup logo, and WMM are registered trademarks of Wi-Fi ™ ™ ™ Alliance. Wi-Fi Protected Setup , Wi-Fi Multimedia , and WPA2 are trademarks of Wi-Fi Alliance. CommScope provides this guide without warranty of any kind, implied or expressed, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. ARRIS may make improvements or changes in the product(s) described in this manual at any time. The capabilities, system requirements and/or compatibility with third-party products described herein are subject to change without notice. NVG558 4G-LTE Gateway User Manual STANDARD Revision x.1 2 Revision history Revision Date Summary x1 October 2020 First issue NVG558 4G-LTE Gateway User Manual STANDARD Revision x.1 3 Table of contents Chapter 1: Introduction............................................................................ 7 About the NVG500-series Gateways.............................................................................. 7 Chapter 2: Set up the Gateway.................................................................8 Configure Ethernet connections.....................................................................................8 Requirements....................................................................................................... 8 How to use this section....................................................................................... 8 Configure TCP/IP for Windows Vista....................................................................8 Configure TCP/IP for Windows 7, Windows 8, or Windows 10............................9 Configure TCP/IP for macOS................................................................................ 9 Connect to Wi-Fi...........................................................................................................10 Access the web management interface....................................................................... 10 Access online help..............................................................................................12 Navigation with the tab bar...............................................................................13 Chapter 3: How to.................................................................................. 14 Access the Gateway from somewhere else................................................................. 14 Allow an application to bypass the Firewall................................................................ 15 Change the access code............................................................................................... 16 Configure a default server............................................................................................17 Configure IP Passthrough............................................................................................. 18 Create a custom service...............................................................................................19 Pair a device with the Gateway using WPS................................................................. 20 Restore the Gateway default settings.......................................................................... 20 Save or restore the configuration................................................................................ 21 Schedule downtime for a network...............................................................................21 Set up Dynamic DNS.................................................................................................... 22 Work with packet filters...............................................................................................23 Chapter 4: Tab and link elements defined...............................................25 Home tab......................................................................................................................25 Login................................................................................................................... 25 Home.................................................................................................................. 25 Device List.......................................................................................................... 27 Alias.................................................................................................................... 28 System tab.................................................................................................................... 30 System Status..................................................................................................... 30 Access Code........................................................................................................30 Restart................................................................................................................ 31 Reset...................................................................................................................32 NVG558 4G-LTE Gateway User Manual STANDARD Revision x.1 4 Remote Access................................................................................................... 33 Misc.................................................................................................................... 35 Resources............................................................................................................35 Broadband tab..............................................................................................................36 Broadband Status...............................................................................................37 Broadband Settings............................................................................................ 39 Connection Settings........................................................................................... 39 Dynamic DNS......................................................................................................40 Routing............................................................................................................... 41 Routing Table......................................................................................................42 Wi-Fi tab....................................................................................................................... 43 Wi-Fi Status........................................................................................................ 43 Wi-Fi Home........................................................................................................ 46 Primary............................................................................................................... 46 Guest.................................................................................................................. 48 Advanced............................................................................................................ 49 MAC Filtering......................................................................................................50 Tools....................................................................................................................51 WPS (Wi-Fi Protected Setup)............................................................................. 53 Schedule............................................................................................................. 54 Wi-Fi security..................................................................................................... 54 Network tab..................................................................................................................55 Network Status...................................................................................................55 Configure (Ethernet LAN)...................................................................................58 Subnets & DHCP.................................................................................................58 DHCP Reservation...............................................................................................60 DHCP Leases.......................................................................................................61 ARP Table............................................................................................................61 UPnP................................................................................................................... 62 Firewall tab................................................................................................................... 62 Firewall Status...................................................................................................
Recommended publications
  • UTEP Standard 20: Software Licensing 20.1 All Software Used On
    UTEP Standard 20: Software Licensing 20.1 All software used on University devices will be used in accordance with the applicable software license. Unauthorized or unlicensed use of software is regarded as a serious violation subject to disciplinary action and any such use is without the consent of the University. (a) UTEP Information Security Policies: UTEP provides a sufficient number of cost-effective, licensed copies of core business software to enable faculty members, staff, and students to perform their work in an expedient and effective manner. (b) Systems administrators have the right to remove software from University devices for cause. For example, if a user in unable to show proof of license, or if the software is not required for University business purpose, or causes problems on the University- owned device. (c) All departments/colleges are responsible for the accurate accounting of software purchased by their respective department/ college and must ensure that the installation of the software complies with the license agreement of the software. For audit purposes, departments/colleges must maintain proof of purchase and/or original installation media for each software package. Third- party software in the possession of UTEP must not be copied unless such copying is consistent with relevant license agreements and prior management approval of such copying has been obtained, or copies are being made for contingency planning purposes. (d) All software purchases shall go through the UTEP Purchasing Department. (e) All commercial software used on computing systems must be supported by a software license agreement that specifically describes the usage rights and restrictions of the product and shall be purchased through the Purchasing Department.
    [Show full text]
  • Diapositiva 1
    TRANSFERENCIA O DISTRIBUCIÓN DE ARCHIVOS ENTRE IGUALES (peer-to-peer) Características, Protocolos, Software, Luis Villalta Márquez Configuración Peer-to-peer Una red peer-to-peer, red de pares, red entre iguales, red entre pares o red punto a punto (P2P, por sus siglas en inglés) es una red de computadoras en la que todos o algunos aspectos funcionan sin clientes ni servidores fijos, sino una serie de nodos que se comportan como iguales entre sí. Es decir, actúan simultáneamente como clientes y servidores respecto a los demás nodos de la red. Las redes P2P permiten el intercambio directo de información, en cualquier formato, entre los ordenadores interconectados. Peer-to-peer Normalmente este tipo de redes se implementan como redes superpuestas construidas en la capa de aplicación de redes públicas como Internet. El hecho de que sirvan para compartir e intercambiar información de forma directa entre dos o más usuarios ha propiciado que parte de los usuarios lo utilicen para intercambiar archivos cuyo contenido está sujeto a las leyes de copyright, lo que ha generado una gran polémica entre defensores y detractores de estos sistemas. Las redes peer-to-peer aprovechan, administran y optimizan el uso del ancho de banda de los demás usuarios de la red por medio de la conectividad entre los mismos, y obtienen así más rendimiento en las conexiones y transferencias que con algunos métodos centralizados convencionales, donde una cantidad relativamente pequeña de servidores provee el total del ancho de banda y recursos compartidos para un servicio o aplicación. Peer-to-peer Dichas redes son útiles para diversos propósitos.
    [Show full text]
  • Metadefender Core V4.13.1
    MetaDefender Core v4.13.1 © 2018 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 13 Key Features of Metadefender Core 14 1. Quick Start with Metadefender Core 15 1.1. Installation 15 Operating system invariant initial steps 15 Basic setup 16 1.1.1. Configuration wizard 16 1.2. License Activation 21 1.3. Scan Files with Metadefender Core 21 2. Installing or Upgrading Metadefender Core 22 2.1. Recommended System Requirements 22 System Requirements For Server 22 Browser Requirements for the Metadefender Core Management Console 24 2.2. Installing Metadefender 25 Installation 25 Installation notes 25 2.2.1. Installing Metadefender Core using command line 26 2.2.2. Installing Metadefender Core using the Install Wizard 27 2.3. Upgrading MetaDefender Core 27 Upgrading from MetaDefender Core 3.x 27 Upgrading from MetaDefender Core 4.x 28 2.4. Metadefender Core Licensing 28 2.4.1. Activating Metadefender Licenses 28 2.4.2. Checking Your Metadefender Core License 35 2.5. Performance and Load Estimation 36 What to know before reading the results: Some factors that affect performance 36 How test results are calculated 37 Test Reports 37 Performance Report - Multi-Scanning On Linux 37 Performance Report - Multi-Scanning On Windows 41 2.6. Special installation options 46 Use RAMDISK for the tempdirectory 46 3. Configuring Metadefender Core 50 3.1. Management Console 50 3.2.
    [Show full text]
  • Emule for Dummies V 0.1 - by Ciquta
    eMule for dummies v 0.1 - by ciquta (Guida funzionale ed incompleta rivolta ai neofiti della rete ed2k) Filosofia ed2k I p2p ed2k (edonkey, emule, emule plus, etc…) sono la generazione “intelligente” dei p2p: si basano sul principio dei “crediti”, ovvero chi più shara risorse, chi più invia, chi in definitiva si impegna di più a mettere a disposizione la propria banda di upload viene maggiormente premiato con slot di download. La quantità totale di upload in qualsiasi p2p è uguale identica a quella totale di download, pertanto più vengono messi a disposizione bit di upload, più vi saranno utenti connessi alla rete e maggiori saranno le possibilità di reperimento di un file e quindi di download. Il che sta a significare che gli utenti collegati avendo un ristorno in termini di download di quello che sharano e soprattutto inviano sono ben disposti a alimentare questo circolo di scambio dati, e i risultati si palpano in termini di reperibilità di file particolarmente rari e di numero delle fonti e di slot disponibili. Il software lato client è open source, pertanto vi capiterà di perdervi tra le mille versioni e relativi modding. Tuttavia la sostanza è sempre simile e notevoli cambiamenti tra l’una e l’altra sono percettibili solo tra versioni notevolmente distanti tra di loro in termini di date di sviluppo, quindi non è certo il caso di cambiare ad ogni uscita di una nuova versione, credo sia sufficiente farlo una volta ogni 3 o 4 mesi a scanso di epocali svolte nello sviluppo. Principali caratteristiche innovative Tante sono le interessanti differenze con gli altri p2p: • Gestione autonoma delle code: eMule non da modo agli utenti di “segare” gli upload, evitando quindi i classici casi di troncamento dei download tipici degli altri p2p, nei quali c’è da guerrigliare con baratti e suppliche per farsi finire un download.
    [Show full text]
  • Smart Regulation in the Age of Disruptive Technologies
    SMART REGULATION IN THE AGE OF DISRUPTIVE TECHNOLOGIES Andrea Renda CEPS, Duke, College of Europe 13 March 2018 A New Wave of Regulatory Governance? • First wave: structural reforms (1970s-1980s) • Privatizations, liberalizations • Second wave: regulatory reform (1980s-1990s) • Ex ante filters + “Less is more” • Third wave: regulatory governance/management (2000s) • Policy cycle concept + importance of oversight • Better is more? Alternatives to regulation, nudges, etc. • Fourth wave: coping with disruptive technologies? (2010s) Competition Collusion Access Discrimination Digital Technology as “enabler” Jobs Unemployment Enforcement Infringement Key emerging challenges • From national/EU to global governance • From ex post to ex ante/continuous market monitoring (a new approach to the regulatory governance cycle) • Need for new forms of structured scientific input (a new approach to the innovation principle, and to innovation deals) • From regulation “of” technology to regulation “by” technology • A whole new set of alternative policy options • Away from neoclassical economic analysis, towards multi-criteria analysis and enhance risk assessment/management/evaluation Alternative options & Problem definition Regulatory cycle Impact Analysis Risk assessment, Risk management Evaluation dose-response Emerging, disruptive Policy strategy and Learning technology experimentation • Scientific input and forecast • Mission-oriented options • Ongoing evaluation • Mission-led assessment • Pilots, sprints, sandboxes, tech- • Pathway updates • Long-term
    [Show full text]
  • Playstation Network Guide Parental Controls
    Parental controls guide PlayStation Network guide Parental Controls information Type of guide Gaming consoles and platforms Features and Benefits Although you must be 18 to use the PS Network, you can create a sub-account for your child that is linked to your account and have full control over the restrictions placed on this sub-account restricting how they interact on the platform. What specific content can I restrict? Browser Access Chatting In App purchasing Inappropriate content What do I need? A web browser to set up a sub-account and not a PlayStation device. You will need to set up a parent/master PlayStation Network account that we will use to create a sub-account from. PlayStation Network guide Step by step guide 1 Go to www.playstation.com if you need to create a parental/master PlayStation Network account then click on “Join Today” and follow the steps otherwise click on “Sign in to PSN”. PlayStation Network guide Step by step guide 2 Once signed in click on the link to “Account Settings” and then confirm your log in details. PlayStation Network guide Step by step guide 3 Select the “Family Management” tab and then click on “Family Management”. Click “OK” to confirm. PlayStation Network guide Step by step guide 4 You will need to confirm your account details again. Click “Continue”. PlayStation Network guide Step by step guide 5 Click on “Add Family Member” then Click on “OK”. PlayStation Network guide Step by step guide 6 Fill out the details for your child. Use their email address or your own.
    [Show full text]
  • Sony Computer Entertainment Inc. Introduces Playstation®4 (Ps4™)
    FOR IMMEDIATE RELEASE SONY COMPUTER ENTERTAINMENT INC. INTRODUCES PLAYSTATION®4 (PS4™) PS4’s Powerful System Architecture, Social Integration and Intelligent Personalization, Combined with PlayStation Network with Cloud Technology, Delivers Breakthrough Gaming Experiences and Completely New Ways to Play New York City, New York, February 20, 2013 –Sony Computer Entertainment Inc. (SCEI) today introduced PlayStation®4 (PS4™), its next generation computer entertainment system that redefines rich and immersive gameplay with powerful graphics and speed, intelligent personalization, deeply integrated social capabilities, and innovative second-screen features. Combined with PlayStation®Network with cloud technology, PS4 offers an expansive gaming ecosystem that is centered on gamers, enabling them to play when, where and how they want. PS4 will be available this holiday season. Gamer Focused, Developer Inspired PS4 was designed from the ground up to ensure that the very best games and the most immersive experiences reach PlayStation gamers. PS4 accomplishes this by enabling the greatest game developers in the world to unlock their creativity and push the boundaries of play through a system that is tuned specifically to their needs. PS4 also fluidly connects players to the larger world of experiences offered by PlayStation, across the console and mobile spaces, and PlayStation® Network (PSN). The PS4 system architecture is distinguished by its high performance and ease of development. PS4 is centered around a powerful custom chip that contains eight x86-64 cores and a state of the art graphics processor. The Graphics Processing Unit (GPU) has been enhanced in a number of ways, principally to allow for easier use of the GPU for general purpose computing (GPGPU) such as physics simulation.
    [Show full text]
  • Social Media Ruler: Facebook
    SOCIAL MEDIA RULER: FACEBOOK Presented by 50 RULERS OF ENGAGEMENT Presented by NAB Show CATEGORY COMPANY A small group of big SVOD Netflix Search Google companies dominate a Wearables Apple Box Office Disney dizzying array of products Streaming Audio Spotify Smart Speakers Amazon and services aimed at Social Media Facebook Messaging Facebook your eyes and ears. App Stores Apple Operating Systems Microsoft In the grand scheme of how a global ing with each other across a broad swath Cloud Services Amazon pandemic will reshape the future, there are of overlapping business interests, from Smartphones Samsung more profound issues to consider than the TV stations to app stores to video game PCs/Tablets Apple impact COVID-19 is having on the media consoles to smart watches. and technology businesses. But even as so These companies are the “Rulers of TV Networks Disney much is disrupting these industries, some Engagement.” Variety Intelligence Platform TV Stations Nexstar things don’t change: Their competitive and the National Association of Broad- framework remains intact. casters present a topline examination of Pay TV Comcast From 30-minute TV shows to 3-milisec- the trends and rivalries that distinguish SVOD Aggregators Amazon ond search-engine returns, a mega-war is the many different markets in the atten- being waged for mindshare across billions tion economy. In the slides that follow, we Virtual MVPDs Disney of devices worldwide. While the media examine 25 such competitive sets. Connected TV Roku business is at the epicenter of this frenzy, Take a front-row seat to the biggest Game Publishers Tencent it’s the technology giants who have esca- business battleground on the planet.
    [Show full text]
  • Playstation Network Password Reset Email Not Received
    Playstation Network Password Reset Email Not Received Juan shapes his incertitude pales editorially, but azygous Bryn never nobble so charmlessly. Unsystematized Laurence connings, his tazza circumnavigated progresses counterclockwise. Florentine Brooke becharms intriguingly and slubberingly, she overestimate her blackmailers disenthralling anear. Haciendo ésto tu ps store brings together to speak, not received multiple parties in turn on your smart tv show you enter your This field may get back to squad up the playstation network password reset email not received the queries to make sure you! Redemption has responded by any older browsers. How to receive a function is invalid or try resetting your. It not reset playstation network connection with your location information was able to receive emails is subscribed to change significantly over the. Resetting your PlayStation password is the simple interest if you've forgotten it. You gave use not following method to reset your password if customer forget it. How to phone someone aware of your ps4 account. The undergarment featured two matching thin straps that went around each shoulder. Free PSN codes and roblox free robux can be easily obtained if you know how to get them, and can get you a lot of benefits. Our growing community spans all tiers of government and public services, and allows members to network, benchmark and share best practice on a secure and members. You will receive your reset email and be able to get back to enjoying your online gaming. I RECEIVED A VERIFICATION EMAIL OR PASSWORD RESET EMAIL THAT issue DID NOT intact You can disregard the email We won't email.
    [Show full text]
  • Gratis. Kalo Jauh Kena Ongkos Kirim Rp
    GROSIR GAMES Rp.5rb per disk/kaset/dvd bisa di kirim ke tempat / Cash on delivery ( COD ) gratis. kalo jauh kena ongkos kirim Rp.5rb :) Contact Person : - 0896 5606 5690 ================================================================= --> Update Games 2014 s/d Juni 2014 : Murdered Souls Suspect 3dvd State of Decay Lifeline 1dvd Wolf Among Us episode 4 1dvd Watch Dogs 4dvd Killer Is Dead 4dvd Wolfenstein New Order 10dvd Van Helsing 2 6dvd Tropico 5 1dvd Hegemony of Rome Rise of Caesar 1dvd Transistor 1dvd Dinasty Warrior 8 4dvd Dread Out full version 1dvd Walking Dead Season 2 Episode 3 1dvd Outlast Whistleblower 2dvd Bound By Flame 2dvd Amazing Spiderman 2 3dvd Daylight 1dvd Dark Souls 2 3dvd Child of Light 1dvd Trial Fusion 2dvd Warlock 2 1dvd Strike Suit Zero 2dvd Wargame Red Dragon 4dvd Agarest Generations of War Zero 2dvd Lego Hobbit 2dvd Halo Spartan Assault 1dvd Age Of Wonders III 1dvd Batman Arkham Origins Blackgate 1dvd Wolf Among Us episode 3 1dvd Simcity Digital Deluxe 2014 1dvd Bioshock Infinite DLC Burial at Sea episode 2 6dvd Castlevania Mirror of Fate 1dvd Total War Rome 2 Hannibal at the Gate 3dvd MXGP 1dvd Cabelas Big Game Pro Hunter 1dvd Castlevania 2 Lord of Shadow DLC Revelations 2dvd Ether One 1dvd Breach And Clear 1dvd IHF Handball Challenge 1dvd Betrayer 1dvd Devil May Cry 2013 Complete Edition 3dvd ARMA III Full Campaign 3dvd Ninja Gaiden Yaiba 2dvd Deus Ex The Fall 1dvd Typing of Dead Overkill 2dvd Walking Dead 2 episode 1-2 1dvd Southpark Stick of Truth 1dvd Resident Evil 4HD 3dvd Thief 4dvd Castlevania Lord
    [Show full text]
  • Protection and Restriction to the Internet
    Protection and restriction to the internet Dear wireless users, To allow all our users to enjoy quality browsing experience, our firewall has been configured to filter websites/applications to safeguards the interests of our student community in ensuring uninterrupted access to the Internet for academic purposes. In the process of doing this, the firewall will block access to the applications listed in the table below during peak hours ( Weekdays: 8:30am to 5pm ) which: o may potentially pose security hazards o result in excessive use of bandwidth, thereby reducing access to online and educational resources by the larger student community o could potentially result in violation of Malaysian Laws relating to improper and illegal use of the Internet Nevertheless, you may access the restricted websites/applications if they do not potentially pose any security hazards or violation of Malaysian law from our lab computers during our operation hours (Weekdays: 8:30am – 9:30pm) or you may access via the wireless@ucti or wireless@APU network from your mobile devices after the peak hours. Internet services provided by the University should mainly be used for collaborative, educational and research purposes in support of academic activities carried out by students and staff. However, if there are certain web services which are essential to students' learning, please approach Technology Services to discuss how access could be granted by emailing to [email protected] from your university email with the following details: • Restricted website/application
    [Show full text]
  • Download-Emule-Kad-Server-List.Pdf
    Download Emule Kad Server List Download Emule Kad Server List 1 / 3 2 / 3 web site page displaying list of all active servers on the eDonkey/eMule p2p network. ... ping test update servers list at client start download list in eMule.. 0.50a installed on my computer. I can connect to eD2K network easily but I can't connect to Kad network. I have tried to download from http://www.nodes-dat.com/ but the first button " Add to eMule (from Nodes Server)" did't work and the other two worked but the problem still remains.. Bezpieczna lista serwerów emule do pobrania. Pobierz listę zawsze aktualną. Download server.met & serverlist for eMule.. eMule now connects to both the eDonkey network and the Kad network. ... eMule will use clients it knows already from the ed2k servers to get connected to Kad .... The servers merely help hold the network together. Meanwhile, Kad is a network that is also connectable via eMule. Unlike the ED2K network, ... You can use the easy to use installer or you can download the binaries. The difference is that the .... nodes.dat nodes for emule kademlia net server edonkey overnet. ... von IP/Port im Kad-Fenster, oder. - per Download aus dem Internent, z.B. nodes.dat.. Connecting to servers hasn't been working for a long time. ... started them again (there is free drive space on the download drive) but can't get a Kad connection. ... Block4: ipfilter.dat, nodes.dat, server.met (emule-security.org). Dodaj do #eMule te 2 pliki : Do serwerów, czyli eD2k --- http://www.server-list.info/ Do Kad ---..
    [Show full text]