User`s guide
 User’s Guide     
3 
Cable Modem Information ............................................................................................................................. 33
Cable Modem Status........................................................................................................................................ 34 
Downstream ..................................................................................................................................................... 35 
Upstream .......................................................................................................................................................... 36 
Upstream Burst................................................................................................................................................ 37 
Operation Parameters..................................................................................................................................... 38 
Event Log ......................................................................................................................................................... 39 
FIREWALL...................................................................................................................................................... 40 
TOD Filter.............................................................................................................................................. 40 
Application Filters ................................................................................................................................. 41 
Event Log ............................................................................................................................................... 43 
Parental Control .............................................................................................................................................. 44 
Setup....................................................................................................................................................... 44 
Violation Log.......................................................................................................................................... 45 
Diagnostics........................................................................................................................................................ 46 
Ping......................................................................................................................................................... 46 
Client List ............................................................................................................................................... 47 
Security................................................................................................................................................... 48 










