The devices all have a static address of 192.168.0.2. The reasons you'd want to access the devices are to enable encryption and/or change the frequency it operates on.
There are a couple of "hacks" I've found. One is that you can have two IP addresses on your computer, such that you can be on your normal home network and be connected to the 192.168.0.x network that the Motorola MoCA devices use for management access. Second, you can manipulate your computer's ARP table to be able to get to more than one of these devices without having to physically connect directly to them. I have 3 of these devices and use this to verify connectivity before and after working on my coax network.
First, find the MAC address of each of your devices and record these on your computer (you'll want to be able to cut and paste them so you don't make mistakes). This is listed on the bottom of each device.
Get your computer connected to the 192.168.0.x 255.255.255.0 ( /24 ) network (note you cannot use 192.168.0.2 - as that is what the Motorola MoCA devices are all using). This will vary depending on your OS. Hack #1: For Linux, I bind it as an additional IP address on my existing network interface (Windows and MacOS can do this as well). So I have my normal network IP statically assigned, plus I add a 192.168.0.5 /24 ( /24 is just bit-based mask notation for 255.255.255.0), and no default gateway for that IP.
Once you're on this network, try to ping 192.168.0.2. One of your Motorola MoCA devices will respond, but you don't know which. Look at your arp table. This command's flags will vary by OS, but for Linux it is:
apr -a
You can browse to whatever device first responded to the arp request (the arp request occurred when you did the ping) at
http://192.168.0.2/
Here you can set a basic encryption key and enable encryption (available with firmware 1.0.0.8, but all of mine came with this firmware, or you can manually upgrade them to this version). Motorola MoCA encryption prevents a casual eavesdropper from accessing your MoCA network if you share the physical coax network.*
Ok, so the Hack #2 is manipulating your ARP table such that you can specify which IP:MAC association you want to have in place, which will then allow you connect to a specific Motorola MoCA device.
In Linux I paste these 3 lines all at once:
sudo arp -d 192.168.0.2
sudo arp -s 192.168.0.2 e4:90:7e:AB:CD:EF
arp -a
Here is a breakdown of what each does:
Delete the current ARP table association with 192.168.0.2
sudo arp -d 192.168.0.2
Statically set the ARP table association to the MAC address of a specific Motorola MoCA device:
sudo arp -s 192.168.0.2 e4:90:7e:AB:CD:EF
Review the ARP table to make sure it was set as expected:
arp -a
Then refresh my browser at
http://192.168.0.2 and verify on the Device Info page that I'm talking to the right S/N and MAC address. Additionally, on the Node Info page I can see all of my MoCA nodes. So long as I always connect and power them on in the same order, the Node # remains the same.
Now say I want to talk to my second node, I just paste in the lines I have stored for it:
sudo arp -d 192.168.0.2
sudo arp -s 192.168.0.2 38:80:df:FE:CC:BA
arp -a
Here are some Motorola links, one of which has the latest firmware:
Support for MM1000 - Motorola Network
MM1000 Firmware Update - Motorola Network
*Coax network security: depending on your setup, you may be piggy-backing on the CableCo's neighborhood coax network, or be splitting a coax connection and connecting all of your home coax network to the same CableCo's network. One step better (or in addition to) the Motorola MoCA encryption is to use the
PoE filter between the CableCo's network coax network and your home. The absolute best security is to just have two different physical coax networks. But this isn't always possible, and/or perhaps you share a building with roommates and don't trust them to be on your private networks, etc. Note: a dedicated adversary can just try all combinations of the 12-17 digit "Security Password" until they found the correct one. Physical security is king, as always.
Note: I'm not using any non-Motorola MoCA devices, so I don't know if the Motorola MoCA "Securty Password" is compatible with any other MoCA devices. However, there appears to be a MoCASec standard that uses 12-17 digit passwords, which matches what the Motorola is doing.
MoCASec Peer-to-Peer MoCA Link Security
The Tivo-branded bridges are just Actiontec ECB6000 devices and support MoCASec as show in a picture in this post:
Moca intermittent issues
Do the TiVo MoCA-based Minis support MoCASec? Nothing I can find when searching the tivo.com website mentions MoCASec or MoCA Security.