Home
SMC Barricade SMCWBR14S-N4 router
Contents
1. This section is dedicated to the DMZ or De Militarized Zone Since some Internet applications such as interactive games or video may not function properly behind the firewall the DMZ allows a specified hast on the LAN to access the Internet without any firewall protection DMZ Settings DMZ Settings DMZ IP Address DMZ Settings Sets the DMZ status Default Disable DMZ IP Address Specifies an IP address on the local network allowed unblocked access to the WAN 95 CHAPTER 8 Firewall Configuration System Security SYSTEM SECURITY The Wireless Broadband Router includes the facility to manage it from a remote location The unit can also be sent a ping message from a remote location Figure 50 System Security System Securty Settings System Security Settings allows you to make various configurations that maintain and protect your device Remote Management Access Remote management via WAN Ping from WAN Filter Ping from WAN Filter Stateful Packet Inspection SPI SFI Firewall Remote Management Denies or allows management access to the Gateway Router through the WAN interface Default Deny Ping from WAN Filter When enabled the Gateway Router does not respond to ping packets received on the WAN port Default Disable Stateful Packet Inspection SPI The Stateful Packet Inspection SPI firewall protects your network and computers against attacks and i
2. ka Radio LAN device atbilst Direkt vas 1999 5 EK b tiskaj m Latviski prasibam un citiem ar to saistitajiem noteikumiem Lithuanian Siuo Manufacturer deklaruoja kad Sis Radio LAN device atitinka esminius reikalavimus ir Lietuvi kitas 1999 5 EB Direktyvos nuostatas Maltese Hawnhekk Manufacturer jiddikjara li dan Radio LAN device jikkonforma mal ti ijiet Malti essenzjali u ma provvedimenti o rajn relevanti li hemm fid Dirrettiva 1999 5 EC Spanish Por medio de la presente Manufacturer declara que el Radio LAN device cumple con los Espa ol requisitos esenciales y cualesquiera otras disposiciones aplicables o exigibles de la Directiva 1999 5 CE Polish Niniejszym Manufacturer o wiadcza e Radio LAN device jest zgodny z zasadniczymi Polski wymogami oraz pozosta ymi stosownymi postanowieniami Dyrektywy 1999 5 EC Portuguese Manufacturer declara que este Radio LAN device est conforme com os requisitos Portugu s essenciais e outras disposi es da Directiva 1999 5 CE Slovak Manufacturer t mto vyhlasuje e Radio LAN device sp a z kladn po iadavky a v etky Slovensky pr slu n ustanovenia Smernice 1999 5 ES Slovenian Manufacturer izjavlja da je ta radio LAN device v skladu z bistvenimi zahtevami in ostalimi Slovensko relevantnimi dolo ili direktive 1999 5 ES COMPLIANCES PURPOSE AUDIENCE CONVENTIONS N RELATED PUBLICATIONS REVISION HISTORY ABOUT THIS GUIDE This guide gives
3. ty ae CHAPTER 8 Firewall Configuration Content Filtering Adda Host Filter Enters the keyword for a host filtering 98 ADMINISTRATION SETTINGS The Wireless Broadband Router s Administration Settings menu provides the same configuration options in both Gateway and Bridge Mode These settings allow you to configure a management access password set the system time upgrade the system software display the system status and Statistics Administration Settings contains the following sections System Management on page 100 SNTP Settings on page 101 DDNS Settings on page 102 Upgrade Firmware on page 103 Configuration Settings on page 104 System Status on page 105 Statistics on page 107 Ho OH System Log on page 108 99 CHAPTER 9 Administration Settings System Management SYSTEM MANAGEMENT The System Management commands allow you to change the language settings displayed in the interface and change the user name and password Figure 52 System Management System Management The System Management section is provided for configuration of administrative needs such as language type username password SNTP settings DNS etc Language Settings Select Language English Il a Apply Web Interface Settings User Name LANGUAGE SETTINGS You can change the language displayed in web interface Chooses the appropriate langua
4. CHAPTER 3 Installing the Gateway Router Bridge Mode Connections 1 Using Ethernet cable connect the Wireless Broadband Router s LAN and WAN ports to PCs or a LAN switch 2 Power on the Wireless Broadband Router by connecting the AC power adapter and plugging it into a power source CAUTION Use ONLY the power adapter supplied with the Wireless Broadband Router Otherwise the product may be damaged When you power on the Wireless Broadband Router verify that the Power LED turns on and that the other LED indicators start functioning as described under LED Indicators on page 25 3 Connect an Ethernet cable from the Wireless Broadband Router s LAN ports to your PCs Alternatively you can connect to a workgroup switch to support more wired users The Wireless Broadband Router can Support up to 253 wired and wireless users 4 Set up wireless devices by pressing the WPS button on the Wireless Broadband Router or by using the web interface See Initial Configuration on page 38 for more information on accessing the web interface 37 ISP SETTINGS INITIAL CONFIGURATION The Wireless Broadband Router offers a user friendly web based management interface for the configuration of all the unit s features Any PC directly attached to the unit can access the management interface using a web browser such as Internet Explorer version 6 0 or above If you are not sure of your connection method please contact
5. KEY HARDWARE FEATURES The following table describes the main hardware features of the Gateway Router Table 1 Key Hardware Features Feature Description WAN Port One 100BASE TX RJ 45 port for connecting to the Internet 4 LAN Ports Four 1OOBASE TX RJ 45 ports for local network connections WPS Button To set up a secure connection to a wireless device Reset Button For resetting the unit and restoring factory defaults LEDs Provides LED indicators for Power WAN port and LAN ports status Mounting Options Can be mounted on any horizontal surface such as a desktop or shelf or on a wall using two screws DESCRIPTION OF CAPABILITIES Internet connection through an RJ 45 WAN port Local network connection through four 10 100 Mbps Ethernet ports DHCP for dynamic IP configuration Firewall with Stateful Packet Inspection client privileges intrusion detection and NAT NAT also enables multi user Internet access via a single user account and virtual server functionality providing protected access to Internet services such as Web FTP e mail and Telnet VPN pass through PPTP User definable application sensing tunnel supports applications requiring multiple connections 21 CHAPTER 1 Introduction Description of Capabilities APPLICATIONS Easy setup through a Web browser on any operating system that supports TCP IP Compatible with all popular Internet applications In addit
6. TKIP AES Uses either TKIP or AES keys for encryption WPA and WPA2 mixed modes allow both WPA and WPA2 clients to associate to a common SSID In mixed mode the unicast encryption type TKIP or AES is negotiated for each client Key Renewal Interval Sets the time period for automatically changing data encryption keys and redistributing them to all connected clients Default 3600 seconds PMK Cache Period WPA2 provides fast roaming for authenticated clients by retaining keys and other security information in a cache so that if a client roams away from an access point and then returns reauthentication is not required This parameter sets the time for deleting the cached WPA2 Pairwise Master Key PMK security information Default 10 minutes Pre Authentication When using WPA2 pre authentication can be enabled that allows clients to roam to another access point and be quickly associated without performing full 802 1X authentication Default Disabled IEEE 802 1X AND IEEE 802 1X is a standard framework for network access control that uses RADIUS a central RADIUS server for user authentication This control feature prevents unauthorized access to the network by requiring an 802 1X client application to submit user credentials for authentication The 802 1X standard uses the Extensible Authentication Protocol EAP to pass user credentials either digital certificates user names and passwords or other from the
7. Otherwise leave the text field blank Secondary DNS Server The IP address of the Secondary Domain Name Server MAC Clone Some ISPs limit Internet connections to a specified MAC address of one PC which is registered with the ISP This setting allows you to manually change the MAC address of the Wireless Broadband Router s WAN interface to match the PC s MAC address provided to your ISP for registration You can enter the registered MAC address manually by typing it in the boxes provided Otherwise connect only the PC with the registered MAC address to the Wireless Broadband Router then click the Clone your PC s MAC Address Default Disabled CHAPTER 4 Initial Configuration Setup Wizard Note If you are unsure of the PC MAC address originally registered by your ISP call your ISP and request to register a new MAC address for your account Register the default MAC address of the Wireless Broadband Router STEP 3 WAN Configures a static IP for the WAN port SETTINGS STATIC IP Figure 16 Wizard Step 3 WAN Settings Static IP Wide Area Network VAN Settings This section allows you to configure the connection type and other related WAN parameters suitable to your environment WAN Connection Type STATIC Fixed IP Ha IP Address Subnet Mask Default Gateway Primary DNS Server Secondary DNS Server MAC Clone Enabled Dis
8. The unit can also be protected by securing all attached cables to a table leg or other nearby fixed structure GATEWAY MODE CONNECTIONS In its default Gateway Mode the Wireless Broadband Router forwards traffic between an Internet connected cable or ADSL modem and wired or wireless PCs or notebooks The basic connections are illustrated in the figure below Figure 9 Gateway Mode Connection 4 eN Set up wireless devices gt 1 Connect WAN port to Notebook PC cable DSL modem Int t 7 72 x 3 Connect AC power adapter to Cable DSL Modem power source Connect LAN port to PC s a To connect the Wireless Broadband Router in Gateway Mode for use as an Internet gateway follow these steps 1 Connect an Ethernet cable from the Wireless Broadband Router s WAN port to your Internet connected cable or ADSL modem 2 Connect an Ethernet cable from the Wireless Broadband Router s LAN ports to your PCs Alternatively you can connect to a workgroup switch to support more wired users The Wireless Broadband Router can Support up to 253 wired and wireless users 3 Power on the Wireless Broadband Router by connecting the AC power adapter and plugging it into a power source 35 CHAPTER 3 Installing the Gateway Router Bridge Mode Connections CAUTION Use ONLY the power adapter supplied with the Wireless Broadband Router Otherwise the product may be damaged When you power on the Wireless Broadba
9. Basic Service Set BSS network Security Mode The wireless network authentication and encryption method For a complete description see WLAN Security on page 69 Default Disabled 68 WLAN SECURITY CHAPTER 7 Wireless Configuration WLAN Security Access Policy The Wireless Broadband Router provides a MAC address filtering facility The access policy can be set to allow or reject specific station MAC addresses This feature can be used to connect known wireless devices that may not be able to support the configured security mode Adda station MAC Enter the MAC address of the station that you want to filter MAC addresses must be entered in the format XXIXX XXIXX IXX XX The Wireless Broadband Router s wireless interface is configured by default as an open system which broadcasts a beacon signal including the configured SSID Wireless clients with a configured SSID of ANY can read the SSID from the beacon and automatically set their SSID to allow immediate connection to the wireless network To implement wireless network security you have to employ one or both of the following functions Authentication It must be verified that clients attempting to connect to the network are authorized users Traffic Encryption Data passing between the unit and clients must be protected from interception and eavesdropping The Wireless Broadband Router supports supports ten different se
10. DNS address are dynamically assigned to clients Options Enable Disable Default Enable Start End IP Address Specify the start and end IP addresses of a range that the DHCP server can allocate to DHCP clients Note that the address pool range is always in the same subnet as the unit s IP setting The maximum clients that the unit can support is 253 Primary DNS Server The IP address of Domain Name Servers on the network A DNS maps numerical IP addresses to domain names and can be used to identify network hosts by familiar names instead of the IP addresses Secondary DNS Server The IP address of the Secondary Domain Name Server on the network Default Gateway The default gateway is the IP address of the router for the Wireless Broadband Router which is used if the requested destination address is not on the local subnet Lease Time Select a time limit for the use of an IP address from the IP pool When the time limit expires the client has to request a new IP address The lease time is expressed in seconds Options Forever Two weeks One week Two days One day Half day Two hours One hour Half hour Default One week Statically Assigned Up to three devices with specific MAC addresses can be assigned static IP addresses That is the DHCP server always assigns these devices the same IP addresses LLTD Link Layer Topology Discovery LLTD is a Microsoft proprietary discovery protocol which can
11. INSTALLING THE GATEWAY ROUTER System Requirements iil s 10 11 16 19 20 21 21 21 22 23 23 25 26 26 26 27 27 29 29 30 31 33 33 CONTENTS SECTION Il Location Selection Mounting on a Wall Mounting on a Horizontal Surface Gateway Mode Connections Bridge Mode Connections INITIAL CONFIGURATION ISP Settings Connecting to the Login Page Home Page and Main Menu Common Web Page Buttons Setup Wizard Step 1 Language Selection Step 2 SNTP Settings Step 3 WAN Settings DHCP Step 3 WAN Settings Static IP Step 3 WAN Settings PPPoE Step 3 WAN Settings PPTP Step 4 Wireless Security Completion WEB CONFIGURATION OPERATION MODE Logging In Operation Mode INTERNET SETTINGS WAN Setting DHCP Static IP PPPoE PPTP LAN Setting Advanced Routing Advanced Routing Settings Routing Table fra 33 34 35 35 36 38 38 38 39 40 40 40 41 42 43 44 45 46 47 49 51 52 54 55 33 55 57 58 59 61 63 63 64 CONTENTS Dynamic Route 65 7 WIRELESS CONFIGURATION 67 Basic Settings 67 WLAN Security 69 Wired Equivalent Privacy WEP 70 WPA Pre Shared Key 71 WPA Enterprise Mode 72 IEEE 802 1X and RADIUS 74 Advanced Settings 76 Wireless Network 76 HT Physical Mode Settings 77 Advanced Wireless 79 Wi Fi Multimedia 81 Multicast to Unicast Converter 83 Wireless Distribution System WDS 84 Wi Fi Protected Setup WPS 88 Station List 90 8 FIREWA
12. KEY SNTP TKIP TFTP VAP WI FI PROTECTED ACCESS GLOSSARY beacon and automatically reset their SSID to allow immediate connection to the nearest access point Orthogonal Frequency Division Multiplexing OFDM allows multiple users to transmit in an allocated band by dividing the bandwidth into many narrow bandwidth carriers Service Set Identifier An identifier that is attached to packets sent over the wireless LAN and functions as a password for joining a particular radio cell i e Basic Service Set BSS Session keys are unique to each client and are used to authenticate a client connection and correlate traffic passing between a specific client and the access point A shared key can be used to authenticate each client attached to a wireless network Shared Key authentication must be used along with the 802 11 Wireless Equivalent Privacy algorithm Simple Network Time Protocol SNTP allows a device to set its internal clock based on periodic updates from a Network Time Protocol NTP server Updates can be requested from a specific NTP server or can be received via broadcasts sent by NTP servers Temporal Key Integrity Protocol A data encryption method designed as a replacement for WEP TKIP avoids the problems of WEP static keys by dynamically changing data encryption keys Trivial File Transfer Protocol A TCP IP protocol commonly used for software downloads Virtual Access Point Virtual AP technology mul
13. LED is off amp The AC power adapter may be disconnected Check connections between the Gateway Router the power adapter and the wall outlet The access point radio has been disabled through it s web management interface Access the management interface using a web browser to enable the radio Verify that the Gateway Router is powered on Be sure cables are plugged into both the Gateway Router and corresponding PC Verify that the proper cable type is used and its length does not exceed specified limits Check the cable connections for possible defects Replace the defective cable if necessary There is no detected signal from WAN port Check connections and the management interface IF YOU CANNOT CONNECT TO THE INTERNET Check that your computer is properly configured for TCP IP Make sure the correct network adapter driver is installed for your PC operating system If necessary try reinstalling the driver Check that the network adapter s speed or duplex mode has not been configured manually We recommend setting the adapter to auto negotiation when installing the network driver BEFORE CONTACTING TECHNICAL SUPPORT Check the following items before you contact local Technical Support 1 If the Gateway Router cannot be configured using a web browser Be sure to have configured the Gateway Router with a valid IP address subnet mask and default gateway 11i APPENDIX A Troubleshooting Before C
14. WPS Configuration Station List MAC IP Port Filtering Virtual Server DMZ System Security Content Filtering System Management SNTP Settings DDNS Settings Gateway Mode Upgrade Firmware Configuration Settings System Status Gateway Mode Statistics System Log RJ 45 Connector Straight through Wiring Crossover Wiring 17 FIGURES 71 73 75 76 77 79 81 82 83 84 85 86 88 89 90 92 94 95 96 97 100 101 102 103 104 105 107 108 116 118 118 FIGURES 18 Table 1 Table 2 Table 3 Table 4 Table 5 TABLES Key Hardware Features LED Behavior WMM Access Categories LED Indicators 10 100BASE TX MDI and MDI X Port Pinouts 16 21 26 81 111 117 SECTION I GETTING STARTED This section provides an overview of the Wireless Broadband Router and describes how to install and mount the unit It also describes the basic settings required to access the management interface and run the setup Wizard This section includes these chapters Introduction on page 21 Network Planning on page 29 Initial Configuration on page 38 Installing the Gateway Router on page 33 Of s INTRODUCTION The Barricade Wireless Broadband Router SGMCWBR14S N4 supports routing from an Internet Service Provider ISP connection DSL or cable modem to a local network It is simple to configure and can be up and running in minutes
15. a free program will individually obtain patent licenses in effect making the program proprietary To prevent this we have made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification follow 119 APPENDIX D License Information The GNU General Public License GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION 1 This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License The Program below refers to any such program or work and a work based on the Program means either the Program or any derivative work under copyright law that is to say a work containing the Program or a portion of it either verbatim or with modifications and or translated into another language Hereinafter translation is included without limitation in the term modification Each licensee is addressed as you Activities other than copying distribution and modification are not covered by this License they are outside its scope The act of running the Program is not restricted and the output from the Program is covered only if its contents constitute a work based on the Program independent of having been made by running the Program Whether that is true depends on what the Progra
16. be used for both wired and wireless networks Options Disable Enable Default Enable IGMP Proxy Enables IGMP proxy on the Wireless Broadband Router Options Disable Enable Default Disable UPNP Allows the device to advertise its UPnP capabilities Default Enable Router Advertisement Enables the sending and receiving of routing advertisements to discover the existence of neighboring routers Options Disable Enable Default Disable PPPoE Relay When enabled the Wireless Broadband Router will forward PPPoE messages to clients Clients are then able to connect to the PPPoE service through the WAN port Options Disable Enable Default Disable apl s CHAPTER 6 Internet Settings Advanced Routing DNS Proxy Enables DNS proxy on the LAN port DNS Proxy receives DNS queries from the local network and forwards them to an Internet DNS server Default Enable ADVANCED ROUTING Routing setup allows a manual method to set up routing between networks The network administrator configures static routes by entering routes directly into the routing table Static routing has the advantage of being predictable and easy to configure ADVANCED ROUTING This screen is used to manually configure static routes to other IP SETTINGS networks subnetworks or hosts Click Internet Settings followed by Advanced Routing Maximum 32 entries are allowed Figure 28 Advanced Routing Gateway Mode Advan
17. conntrack version 0 5 0 1268 b SMCWBR145 N4 Warn kernel ip tables Cj 2000 2006 Netfilte SMCWBR145 N4 Warn kernel arp tables C 002 David 5 Mil i SMCWBR145 N4 info kernel ICP cubic registered SMCWBR145 N4 info kernel Registered protocol family 1 SMCWBR145 N4 info kernel NET Registered protocol family 1 _ 1 SMCWBR145 N4 info kernel NET Registered protocol family 1 L G G G DOG O O G i G roo DO G D E G j D GO O O O O i E j 3 O L a E E G G 4 mo Oe D D L oS D D a e D D D O amp J 3 2 i DG i am ae 3a saa sa 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 DODO DODO GOG O O LA LA Refresh Sends a request to add the latest entries to the System Log Table Clear Removes the current system log messages from the System Log Table 108 CHAPTER 9 Administration Settings System Log 109 SECTION Ill APPENDICES This section provides additional information and includes these items Troubleshooting on page 111 Hardware Specifications on page 114 Cables and Pinouts on page 116 Glossary on page 123 Index on page 113 L10 DIAGNOSING LED INDICATORS Table 4 LED Indicators TROUBLESHOOTING Symptom Action Power LAN LEDs are off WLAN LED is off LAN LEDs are off amp when port connected WAN
18. default data encryption type for WPA is AES WPA PSK_WPA2 PSK Clients using WPA or WPA2 with a Pre Shared Key are accepted for authentication The default data encryption type is TKIP AES 71 CHAPTER 7 Wireless Configuration WLAN Security WPA Algorithms Selects the data encryption type to use Default is determined by the Security Mode selected TKIP Uses Temporal Key Integrity Protocol TKIP keys for encryption WPA specifies TKIP as the data encryption method to replace WEP TKIP avoids the problems of WEP static keys by dynamically changing data encryption keys AES Uses Advanced Encryption Standard AES keys for encryption WPA2 uses AES Counter Mode encryption with Cipher Block Chaining Message Authentication Code CBC MAC for message integrity The AES Counter Mode CBCMAC Protocol AES CCMP provides extremely robust data confidentiality using a 128 bit key Use of AES CCMP encryption is specified as a standard requirement for WPA2 Before implementing WPA2 in the network be sure client devices are upgraded to WPA2 compliant hardware TKIP AES Uses either TKIP or AES keys for encryption WPA and WPA2 mixed modes allow both WPA and WPA2 clients to associate to a common SSID In mixed mode the unicast encryption type TKIP or AES is negotiated for each client Pass Phrase The WPA Preshared Key can be input as an ASCII string an easy to remember form of letters and numbers tha
19. in the U S A is firmware limited to channels 1 through 11 IMPORTANT NOTE FCC RADIATION EXPOSURE STATEMENT This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment This equipment should be installed and operated with minimum distance 20 cm between the radiator and your body COMPLIANCES IC STATEMENT This Class B digital apparatus complies with Canadian ICES 003 Operation is subject to the following two conditions 1 this device may not cause interference and 2 this device must accept any interference including interference that may cause undesired operation of the device Cet appareil num rique de la classe B conforme a la norme NMB 003 du Canada The device could automatically discontinue transmission in case of absence of information to transmit or operational failure Note that this is not intended to prohibit transmission of control or signaling information or the use of repetitive codes where required by the technology IMPORTANT NOTE IC RADIATION EXPOSURE STATEMENT This equipment complies with IC RSS 102 radiation exposure limits set forth for an uncontrolled environment This equipment should be installed and operated with minimum distance 20 cm between the radiator amp your body TAIWAN NCC AN FR Bd AS Ee BS RDS eR EER Se EBLE Bre RAT eS GS RAR ST BS i AE AKEHE AE Bee BAS PADRA E REET LRT ERDE PTR RDS ZEA a eR SE ke HEMNA E gt eal eee h T
20. is obligated to ensure the device is operating according to the channel limitations indoor outdoor restrictions and license requirements for each European Community country as described in this document DECLARATION OF CONFORMITY IN LANGUAGES OF THE EUROPEAN COMMUNITY Czech Manufacturer t mto prohla uje ze tento Radio LAN device je ve shod se z kladn mi Cesky po adavky a dal mi p slu n mi ustanoven mi sm rnice 1999 5 ES Estonian K esolevaga kinnitab Manufacturer seadme Radio LAN device vastavust direktiivi 1999 Eesti 5 EU p hin uetele ja nimetatud direktiivist tulenevatele teistele asjakohastele s tetele English Hereby Manufacturer declares that this Radio LAN device is in compliance with the essential requirements and other relevant provisions of Directive 1999 5 EC Finnish Valmistaja Manufacturer vakuuttaa t ten ett Radio LAN device tyyppinen laite on Suomi direktiivin 1999 5 EY oleellisten vaatimusten ja sit koskevien direktiivin muiden ehtojen mukainen Dutch Hierbij verklaart Manufacturer dat het toestel Radio LAN device in overeenstemming is Nederlands met de essenti le eisen en de andere relevante bepalingen van richtlijn 1999 5 EG Bij deze Manufacturer dat deze Radio LAN device voldoet aan de essenti le eisen en aan de overige relevante bepalingen van Richtlijn 1999 5 EC French Par la pr sente Manufacturer d clare que l appareil Radio LAN device est conforme aux Fran ais exigences essentielle
21. on the local network to allow external access Port Range Specifies the port range through which traffic is forwarded Protocol Specifies a protocol to use for port forwarding either TCP UDP or TCP amp UDP Comment Enter a useful comment to help identify the forwarded port service on the network 2 e CHAPTER 8 Firewall Configuration DMZ CURRENT VIRTUAL The Current Port Forwarding Table displays the entries that are allowed to SERVERS IN SYSTEM forward packets through the Wireless Broadband Router s firewall DMZ No The table entry number IP Address Displays an IP address on the local network to allow external access to Port Mapping Displays the port the server is mapped Protocol Displays the protocol used for forwarding of this port Comment Displays a useful comment to identify the nature of the port to be forwarded Enables a specified host PC on the local network to access the Internet without any firewall protection Some Internet applications such as interactive games or video conferencing may not function properly behind the Wireless Broadband Router s firewall By specifying a Demilitarized Zone DMZ host the PC s TCP ports are completely exposed to the Internet allowing open two way communication The host PC should be assigned a static IP address which is mapped to its MAC address and this must be configured as the DMZ IP address Figure 49 DMZ
22. retain the carton including the original packing materials Use them again to repack the product in case there is a need to return it HARDWARE DESCRIPTION The Barricade Wireless Broadband Router from herein refered to as Gateway Router connects to the Internet using its RJ 45 WAN port It connects directly to your PC or to a local area network using its RJ 45 Fast Ethernet LAN ports The Gateway Router includes an LED display on the front panel for system power and port indications that simplifies installation and network troubleshooting a oo amp CHAPTER 1 Introduction Hardware Description Figure 1 Top Panel MS ae eee Ss LED Indicators a 0A CHAPTER 1 Introduction Hardware Description Figure 2 Rear Panel WPS Button Reset Button DC Power RJ 45 WAN Port Socket RJ 45 LAN Ports LED INDICATORS The Wireless Broadband Router includes seven status LED indicators as described in the following figure and table Figure 3 LEDs Be eee Te ANI WADO AWAN AKI ANIS ANI ANIA amp VC VVLS NE L ad I TEF Y ji iy 4 i i y A mB A ae NS ee Power WLAN WPS WAN LAN 1 4 s OG CHAPTER 1 Introduction Hardware Description ETHERNET WAN PORT ETHERNET LAN PORTS POWER CONNECTOR Table 2 LED Behavior LED Status Description Power On Blue The unit is receiving power and is operating normally Off There is no power currently being supplied to the unit WLAN O
23. to match any network wide QoS policy WMM also specifies a protocol that access points can use to communicate the configured traffic priority levels to QoS enabled wireless clients Table 3 WMM Access Categories Access WMM Description 802 1D Category Designation Tags AC_VO AC3 Voice Highest priority minimum delay Time sensitive 7 6 data such as VoIP Voice over IP calls AC_VI AC2 Video High priority minimum delay Time sensitive 5 4 data such as streaming video AC_BE ACO Best Effort Normal priority medium delay and throughput 0 3 Data only affected by long delays Data from applications or devices that lack QoS capabilities AC_BK AC1 Background Lowest priority Data with no delay or 2 1 throughput requirements such as bulk data transfers The Wi Fi Multimedia section on the Wireless Settings Advanced page allows you to enable WMM and set detailed QoS parameters Figure 38 Wi Fi Multimedia Settings Wi Fi Multimedia vil Enable Disable APSD O Enable Disable WWMM Parameters WMM Configuration soi CHAPTER 7 Wireless Configuration Advanced Settings The following items are displayed in this section on this page WMM Sets the WMM operational mode on the access point When enabled the QoS capabilities are advertised to WMM enabled clients in the network WMM must be supported on any device trying to associated with the access point Devices that do not support this feature
24. to restore the factory default configuration If you hold WPS BUTTON down the button for 5 seconds or more any configuration changes you may have made are removed and the factory default configuration is restored to the Gateway Router Press to automatically configure the Wireless Broadband Router with other WPS devices in the WLAN OF CHAPTER 1 Introduction Hardware Description a 90 NETWORK PLANNING The Wireless Broadband Router is designed to be very flexible in its deployment options It can be used as an Internet gateway for a small network or aS an access point to extend an existing wired network to Support wireless users It also Supports use as a wireless bridge to connect up to four wired LANs This chapter explains some of the basic features of the Wireless Broadband Router and shows some network topology examples in which the device is implemented INTERNET GATEWAY ROUTER The Wireless Broadband Router can connect directly to a cable or DSL modem to provide an Internet connection for multiple users through a single service provider account Users connect to the Wireless Broadband Router either through a wired connection to a LAN port or though the device s own wireless network The Wireless Broadband Router functions as an Internet gateway when set to Gateway Mode An Internet gateway employs several functions that essentially create two separate Internet Protocol IP subnetworks a private int
25. when PPTP Network Mode is set to static IP Subnet Mask Sets the static IP subnet mask Default 255 255 255 0 available when PPTP Network Mode is set to static IP Default Gateway The IP address of a router that is used when the requested destination IP address is not on the local subnet 45 CHAPTER 4 Initial Configuration Setup Wizard Operation Mode Enables and configures the keep alive time Primary DNS Server The IP address of the Primary Domain Name Server A DNS maps numerical IP addresses to domain names and can be used to identify network hosts by familiar names instead of the IP addresses To specify a DNS server type the IP addresses in the text field provided Otherwise leave the text field blank Secondary DNS Server The IP address of the Secondary Domain Name Server MAC Clone Some ISPs limit Internet connections to a specified MAC address of one PC This setting allows you to manually change the MAC address of the Wireless Broadband Router s WAN interface to match the PC s MAC address provided to your ISP for registration You can enter the registered MAC address manually by typing it in the boxes provided Otherwise connect only the PC with the registered MAC address to the Wireless Broadband Router then click the Clone your PC s MAC Address Default Disable STEP 4 WIRELESS The Step 4 page of the Wizard configures the wireless network name and SECURITY secu
26. with the registered MAC address to the Wireless Broadband Router then click the Clone your PC s MAC Address Default Disable STEP 3 WAN Enable the Wireless Broadband Router IP address to be assigned SETTINGS PPPoE automatically from an Internet service provider ISP through an ADSL modem using Point to Point Protocol over Ethernet PPPoE Figure 17 Wizard Step 3 WAN Settings PPPoE Wide Area Network WAN Settings This section allows you to configure the connection type and other related WAN parameters suitable to your environment WAN Connection Type PPPoE ADSL v User Name pppoe_user Password eececcecccece Verify Password eeoecccecsece KeepAlive Operation Mode Keep Alive Mode Redial Period 60 senconds On demand Mode Idle Time minutes MAC Clone Enabled Disable The following items are displayed on this page User Name Sets the PPPoE user name for the WAN port Default pppoe_user Range 1 32 characters Password Sets a PPPoE password for the WAN port Default pppoe _password Range 1 32 characters Verify Password Prompts you to re enter your chosen password Operation Mode Enables and configures the keep alive time and configures the on demand idle time MAC Clone Some ISPs limit Internet connections to a specified MAC address of one PC This se
27. your Internet Service Provider There are several connection types to choose from Static IP DHCP cable connection PPPoE DSL connection and PPTP NoTE If using the PPPoE option you will need to remove or disable any PPPoE client software on your computers CONNECTING TO THE LOGIN PAGE It is recommended to make initial configuration changes by connecting a PC directly to one of the Wireless Broadband Router s LAN ports The Wireless Broadband Router has a default IP address of 192 168 2 1 anda subnet mask of 255 255 255 0 You must set your PC IP address to be on the same subnet as the Gateway Router that is the PC and Gateway Router addresses must both start 192 168 2 x To access the Wireless Broadband Router s management interface follow these steps 1 Use your web browser to connect to the management interface using the default IP address of 192 168 2 1 2 Log into the interface by entering the default username admin and password smcadmin then click Login NoTE It is strongly recommended to change the default user name and password the first time you access the web interface For information on changing user names and passwords See System Management on page 100 38 CHAPTER 4 Initial Configuration Home Page and Main Menu Figure 11 Login Page Connect to 192 168 2 1 The server 192 168 2 1 at SMCWBR145 H4 requires a username and password Warning This server is requ
28. 0 Short Preamble O Enable Disable Short Slot Enable Disable Tx Burst Enable Disable Packet Aggregate Enable Disable The following items are displayed in this section on this page BG Protection Mode Enables a backward compatible protection mechanism for 802 11b clients There are three modes Default Auto Auto The unit enables its protection mechanism for 802 11b clients when they are detected in the network When 802 11b clients are not detected the protection mechanism is disabled On Forces the unit to always use protection for 802 11b clients whether they are detected in the network or not Note that enabling b g Protection can slow throughput for 802 11g n clients by as much as 50 Off Forces the unit to never use protection for 802 11b clients This prevents 802 11b clients from connecting to the network Beacon Interval The rate at which beacon signals are transmitted from the access point The beacon signals allow wireless clients to maintain contact with the access point They may also carry power management information Range 20 999 TUs Default 100 TUs Data Beacon Rate DTIM The rate at which stations in sleep mode must wake up to receive broadcast multicast transmissions Known also as the Delivery Traffic Indication Map DTIM interval it indicates how often the MAC layer forwards broadcast multicast traffic which is necessary to wake up statio
29. 1A Power WLAN Wireless Local Area Network WPS Wi Fi Protected Setup WAN Wide Area Network LAN 1 4 Local Area Network Web browser Operating O to 40 C 32 to 104 F Storage 20 to 70 C 32 to 158 F 20 to 85 non condensing 136 X 90 8 X 28 5 mm 157 g 5 54 oz FCC Part 15c EN 300 328 LPOOO2 FCC Part 15b EN 55022 24 EN 301 489 1 17 EN 60950 1 114 APPENDIX B Hardware Specifications STANDARDS UL60950 1 CSA22 2 No 60950 1 EN 60950 1 IEC 60950 1 ETSI EN 300 019 2 1 Class 1 2 Storage ETSI EN 300 019 2 2 Class 2 3 Packaged ETSI EN 300 019 2 3 Class 3 2 Operating 115 CABLES AND PINOUTS TWISTED PAIR CABLE ASSIGNMENTS For 10 100BASE TX connections a twisted pair cable must have two pairs of wires For 1000BASE T connections the twisted pair cable must have four pairs of wires Each wire pair is identified by two different colors For example one wire might be green and the other green with white stripes Also an RJ 45 connector must be attached to both ends of the cable NoTE Each wire pair must be attached to the RJ 45 connectors in a specific orientation CAUTION DO NOT plug a phone jack connector into the RJ 45 port Use only twisted pair cables with RJ 45 connectors that conform with FCC standards The following figure illustrates how the pins on the RJ 45 connector are numbered Be sure to hold the connectors in the same orientation when attaching the
30. 6 hexadecimal digits for 128 bit keys Default Hex no preset value WPA PRE SHARED Wi Fi Protected Access WPA was introduced as an interim solution for the Key vulnerability of WEP pending the adoption of a more robust wireless security standard WPA2 includes the complete wireless security standard but also offers backward compatibility with WPA Both WPA and WPA2 provide an enterprise and personal mode of operation For small home or office networks WPA and WPA2 provide a simple personal operating mode that uses just a pre shared key for network access The WPA Pre Shared Key WPA PSK mode uses a common password phrase for user authentication that is manually entered on the access point and all wireless clients Data encryption keys are automatically generated by the access point and distributed to all clients connected to the network Figure 32 Security Mode WPA PSK Security Mode WPA Algorithms CITKIP AES CITKIPAES Key Renewal Interval 3600 seconds Security Mode Configures the WPA PSK and WPA2 PSK security modes used by clients When using WPA PSK or WPA2 PSK be sure to define the Shared key for the Wireless Broadband Router and all its clients Default Disable WPA PSK Clients using WPA with a Pre shared Key are accepted for authentication The default data encryption type for WPA is TKIP WPA2 PSK Clients using WPA2 with a Pre shared Key are accepted for authentication The
31. ALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU SHOULD THE PROGRAM PROVE DEFECTIVE YOU ASSUME THE COST OF ALL NECESSARY SERVICING REPAIR OR CORRECTION INNO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER OR ANY OTHER PARTY WHO MAY MODIFY AND OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE BE LIABLE TO YOU FOR DAMAGES INCLUDING ANY GENERAL SPECIAL INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES END OF TERMS AND CONDITIONS 122 10BASE T 100BASE TX 1000BASE T ACCESS POINT AES AUTHENTICATION BACKBONE BEACON BROADCAST KEY DHCP GLOSSARY IEEE 802 3 2005 specification for 10 Mbps Ethernet over two pairs of Category 3 or better UTP cable IEEE 802 3 2005 specification for 100 Mbps Fast Ethernet over two pairs of Category 5 or better UTP cable IEEE 802 3ab specification for 1000 Mbps Gigabit Ethernet over four pairs of Category 5 or better UTP cable An internetworking device that seamlessly connects wired and wireless networks Access points attached to a wired network support the creation of multiple radio cells that enable roaming throughout a fa
32. ERIA gt WANEER TERRIERE o BIE Sis gt TEE RE ESRC EARTE fa BIRHEN E LSS BPE Be eae Ad a RET VE BS eins OZ HE e EC CONFORMANCE DECLARATION CEC Marking by the above symbol indicates compliance with the Essential Requirements of the R amp TTE Directive of the European Union 1999 5 EC This equipment meets the following conformance standards EN 60950 1 IEC 60950 1 Product Safety EN 55022 24 ITE EMC EN 301 489 1 17 RF EMC EN 300 328 802 11 b g n COMPLIANCES This device is intended for use in the following European Community and EFTA countries Austria Belgium Bulgaria Cyprus Czech Republic Denmark Estonia Finland France Germany Greece Hungary Iceland Ireland Italy Latvia Lithuania Luxembourg Malta Netherlands Norway Poland Portugal Romania Slovakia Slovenia Spain Sweden Switzerland United Kingdom Note The user must use the configuration utility provided with this product to ensure the channels of operation are in conformance with the spectrum usage rules for European Community countries as described below This device will automatically limit the allowable channels determined by the current country of operation Incorrectly entering the country of operation may result in illegal operation and may cause harmful interference to other systems The user
33. Firmware This section allows you to upgrade to the latest firmware To upgrade the firmware connect your PC to one ofthe LAN ports via a standard Ethernet cable Click Browse and select the firmware image saved on your PC Then click Apply Firmware upgrade takes approximately 3 minutes Do NOT interrupt while the firmware upgrade is in process Fi rmware U pgrade Firmware Upgrade Allows you to upload new firmware manually by specifying a file path Make sure the firmware you want to use is on the local computer by clicking Browse to search for the firmware to be used for the update Browse Opens a directory on the local hard drive for specifying the path of the file to upload Apply Starts the upload procedure 103 CHAPTER 9 Administration Settings Configuration Settings CONFIGURATION SETTINGS The Configuration Setting page allows you to save the Wireless Broadband Router s current configuration or restore a previously saved configuration back to the device Figure 56 Configuration Settings Settings Management In this section you will be able to export or load a configuration file and reset settings to factory Import Settings Import Configuration File fs B Load Factory Defaults Restore settings to factory default Load Default Export Settings Saves the current configuration to a fil
34. HT PHYSICAL MODE The HT Physical Mode section on the Wireless Settings Advanced page SETTINGS includes additional parameters for 802 11n operation Figure 36 HT Physical Mode Settings HT Physical Mode Channel Bandwidth 20 O 20 40 Guard Interval Long Auto MCS Reverse Direction Grant ROG O Disable Enable Aggregation MSDU A MSDU Disable Enable Auto Block ACK Disable Enable Decline BA Request Disable Enable Apy 77 CHAPTER 7 Wireless Configuration Advanced Settings The following items are displayed in this section on this page HT Channel Bandwidth The Wireless Broadband Router provides a channel bandwidth of 40 MHz by default giving an 802 11g connection speed of 108 Mbps sometimes referred to as Turbo Mode and a 802 11n connection speed of up to 150 Mbps Setting the HT Channel Bandwidth to 20 MHz slows connection speed for 802 11g and 802 11n to 54 Mbps and 74 Mbps respectively and ensures backward compliance for slower 802 11b devices Default 20MHz Guard Interval The guard interval between symbols helps receivers overcome the effects of multipath delays When you add a guard time the back portion of useful signal time is copied and appended to the front Default Auto MCS The Modulation and Coding Scheme MCS is a value that determines the modulation coding and number of spatial channels Options value range O 7 1 Tx Stream 8 15 2 TxStrea
35. LL CONFIGURATION 91 MAC IP Port Filtering 91 Current Filter Rules 93 Virtual Server Settings Port Forwarding 94 Current Virtual Servers in system 95 DMZ 95 System Security 96 Content Filtering 97 9 ADMINISTRATION SETTINGS 99 System Management 100 Language Settings 100 Web Interface Settings 100 SNTP Settings 101 DDNS Settings 102 Upgrade Firmware 103 Configuration Settings 104 System Status 105 Statistics 107 ie CONTENTS SECTION III System Log APPENDICES TROUBLESHOOTING Diagnosing LED Indicators If You Cannot Connect to the Internet Before Contacting Technical Support HARDWARE SPECIFICATIONS CABLES AND PINOUTS Twisted Pair Cable Assignments 10 100BASE TX Pin Assignments Straight Through Wiring Crossover Wiring LICENSE INFORMATION The GNU General Public License GLOSSARY 14 108 110 111 111 111 111 114 116 116 117 117 118 119 119 123 15 CONTENTS Figure 1 Figure 2 Figure 3 Figure 4 Figure 5 Figure 6 Figure 7 Figure 8 Figure 9 Figure 10 Figure 11 Figure 12 Figure 13 Figure 14 Figure 15 Figure 16 Figure 17 Figure 18 Figure 19 Figure 20 Figure 21 Figure 22 Figure 23 Figure 24 Figure 25 Figure 26 Figure 27 Figure 28 Figure 29 Figure 30 Figure 31 FIGURES Top Panel Rear Panel LEDs Operating as an Internet Gateway Router Operating as an Access Point Operating as a Wireless Bridge Operati
36. S eee Cables A o eee 2 Modem ae ae a a Gateway Router A me t 7 Gateway Mode z Gateway Router T a Bridge Mode NS N 2 Notebook PC E 5 7 r i 2 2 Nee EE Notebook PC INSTALLING THE GATEWAY ROUTER The Wireless Broadband Router has two basic operating modes that can be set through the web based management interface For information on setting the mode suitable for your network environment See Operation Mode on page 54 Gateway Mode A gateway mode that connects a wired LAN and wireless clients to an Internet access device such as a cable or DSL modem This is the factory set default mode Bridge Mode An access point mode that extends a wired LAN to wirelessclients In addition to these basic operating modes the wireless interface supports a Wireless Distribution System WDS link to another Wireless Broadband Router These advanced configurations are not described in this section See Network Planning on page 29 for more information In a basic configuration how the Wireless Broadband Router is connected depends on the operating mode The sections in this chapter describe connections for basic Gateway Mode and Bridge Mode operation SYSTEM REQUIREMENTS You must meet the following minimum requirements An Internet access device DSL or Cable modem with an Ethernet port connection An up to date web browser Internet Explorer 6 0 or above or Mozilla F
37. SMC Networks USER GUIDE Barricade N 150 Mbps 4 Port Wireless Broadband Router SMCWBR14S N4 Barricade SMCWBR14S N4 User Guide SMC Networks 20 Mason September 2009 Irvine CA 92618 Pub 149100000034W E092009 CS R01 Information furnished by SMC Networks Inc SMC is believed to be accurate and reliable However no responsibility is assumed by SMC for its use nor for any infringements of patents or other rights of third parties which may result from its use No license is granted by implication or otherwise under any patent or patent rights of SMC SMC reserves the right to change specifications at any time without notice Copyright 2009 by SMC Networks Inc 20 Mason Irvine CA 92618 All rights reserved Trademarks SMC is a registered trademark and Barricade EZ Switch TigerStack TigerSwitch and TigerAccess are trademarks of SMC Networks Inc Other product and company names are trademarks or registered trademarks of their respective holders WARRANTY AND PRODUCT REGISTRATION To register SMC products and to review the detailed warranty statement please refer to the Support Section of the SMC Website at http www smc com COMPLIANCES FEDERAL COMMUNICATION COMMISSION INTERFERENCE STATEMENT This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules These limits are designed to provide reasonable protecti
38. Wireless Configuration Wi Fi Protected Setup WPS Figure 45 WPS Configuration WPS Summary WPS Current Status WPS Configured es WPS 35D SMOCWBR145 N4_AFP WPS Auth Mode Open WPS Encryp Type None WPS Default Key Index Booo WPS Key ASCII le cei 64824901 Reset OOB WPS Progress WPS mode PIN PBC PN Apply WPS Status Idle WPS Summary Provides detailed WPS statistical information WPS Current Status Displays if there is currently any WPS traffic connecting to the Wireless Broadband Router Options Start WSC Process Idle WPS Configured States if WPS for wireless clients has been configured for this device WPS SSID The service set identifier for the unit WPS Auth Mode The method of authentication used WPS Encryp Type The encryption type used for the unit WPS Default Key Index Displays the WEP default key 1 4 WPS Key ASCII Displays the WPS security key ASCII which can be used to ensure the security of the wireless network AP PIN Displays the PIN Code for the Wireless Broadband Router The default is exclusive for each unit Default 64824901 Reset OOB Resets the WPS settings to factory default values 89 CHAPTER 7 Wireless Configuration Station List WPS Config Configures WPS settings for the Wireless Broadband Router WPS Mode Selects between methods of broadcasting the WPS beacon to network c
39. Wireless Settings followed by Basic Sieg CHAPTER 7 Wireless Configuration Basic Settings Figure 29 Basic Settings Wireless Security and Encryption Settings The V vireless Security and Encryption Settings page allows you to make detailed Security configurations to prevent unauthorized access and monitoring Network Name SSID SMCYYBR145 N4_AP Broadcast Network Mame 551D Enable Disable AP Isolation O Enable Disable BSSID 00 22 20 62 EA 3A Security Mode Access Policy 00 11 22 33144 55 Add a station MAC fs The following items are displayed on this page Network Name SSID The name of the wireless network service provided by the Wireless Broadband Router Clients that want to connect to the network must set their SSID to the same as that of the Wireless Broadband Router Default SMCWBR14S N4_AP Range 1 32 characters Broadcast Network Name SSID By default the Wireless Broadband Router always broadcasts the SSID in its beacon signal Disabling the SSID broadcast increases security of the network because wireless clients need to already know the SSID before attempting to connect Default Enabled AP Isolation The Wireless Broadband Router will isolate communincation between all clients in order to protect them Normally for users who are at hotspots Default Disabled BSSID The identifier MAC address of the Wireless Broadband Router in the
40. able Cancel The following items are displayed on this page WAN Connection Type Select the connection type for the WAN port from the drop down list Default DHCP IP Address The IP address of the Wireless Broadband Router Valid IP addresses consist of four decimal numbers 0 to 255 separated by periods Subnet Mask The mask that identifies the host address bits used for routing to specific subnets Default Gateway The IP address of the gateway router for the Wireless Broadband Router which is used if the requested destination address is not on the local subnet Primary DNS Server The IP address of the Primary Domain Name Server A DNS maps numerical IP addresses to domain names and can be used to identify network hosts by familiar names instead of the IP addresses To specify a DNS server type the IP addresses in the text field provided Otherwise leave the text field blank Secondary DNS Server The IP address of the Secondary Domain Name Server aa CHAPTER 4 Initial Configuration Setup Wizard MAC Clone Some ISPs limit Internet connections to a specified MAC address This setting allows you to manually change the MAC address of the Wireless Broadband Router s WAN interface to match the PC s MAC address provided to your ISP for registration You can enter the registered MAC address manually by typing it in the boxes provided Otherwise connect only the PC
41. age specifies the Internet connection parameters Click on Internet Settings followed by WAN WAN Connection Type By default the access point WAN port is configured with DHCP enabled After you have network access to the access point you can use the web browser interface to modify the initial IP configuration if needed The options are Static IP DHCP cable modem PPPoE ADSL and PPTP Each option changes the parameters displayed below it Default DHCP Enables Dynamic Host Configuration Protocol DHCP for the WAN port This setting allows the Wireless Broadband Router to automatically obtain an IP address from a DHCP server normally operated by the Internet Service Provider ISP 55 CHAPTER 6 Internet Settings WAN Setting Figure 23 DHCP Configuration Wide Area Network WAN Settings This section allows you to configure the connection type and other related WAN parameters suitable to your environment WAN Connection Type Primary DNS Server MAC Clone Enabled v MAC Address Clone Your PC s MAC Address The following items are displayed on this page Hostname Optional The hostname of the DHCP client Primary DNS Server The IP address of the Primary Domain Name Server A DNS maps numerical IP addresses to domain names and can be used to identify network hosts by familiar names instead of the IP addresses To specify a DNS server type the IP addresses in the text field pr
42. and Router then click the Clone your PC s MAC Address Default Disable 60 CHAPTER 6 Internet Settings LAN Setting LAN SETTING The Wireless Broadband Router must have a valid IP address for management using a web browser and to support other features The unit has a default IP address of 192 168 2 1 You can use this IP address or assign another address that is compatible with your existing local network Click on Internet Settings followed by LAN Figure 27 LAN Configuration Local Area Network LAN Settings This section is provided to configure LAN settings like DHCP and other networking features LAN Setup MAC Address 00 22 20 82 EA 38 IP Address 192 168 2 1 Subnet Mask 26 755 255 0 DHCP Server Star IP Address 1927 168 2 100 End IP Address 1927 168 2 199 Lease Time IGMP Proxy Router Advertisement PPPoE Relay DNs Proxy LAN IP Address Valid IP addresses consist of four decimal numbers 0 to 255 separated by periods The default setting is 192 168 2 1 Subnet Mask Indicate the local subnet mask Default 255 255 255 0 Bt CHAPTER 6 Internet Settings LAN Setting MAC Address The shared physical layer address for the Wireless Broadband Router s LAN ports DHCP Server Enable this feature to assign IP settings to wired and wireless clients connected to the Gateway Router The IP address subnet mask default gateway and Domain Name Server
43. arty software subject to the terms of the GNU General Public License GPL GNU Lesser General Public License LGPL or other related free software licenses The GPL code used in this product is distributed WITHOUT ANY WARRANTY and is subject to the copyrights of one or more authors For details refer to the section The GNU General Public License below or refer to the applicable license as included in the source code archive THE GNU GENERAL PUBLIC LICENSE GNU GENERAL PUBLIC LICENSE Version 2 June 1991 Copyright C 1989 1991 Free Software Foundation Inc 59 Temple Place Suite 330 Boston MA 02111 1307 USA Everyone is permitted to copy and distribute verbatim copies of this license document but changing it is not allowed Preamble The licenses for most software are designed to take away your freedom to share and change it By contrast the GNU General Public License is intended to guarantee your freedom to share and change free software to make sure the software is free for all its users This General Public License applies to most of the Free Software Foundation s software and to any other program whose authors commit to using it Some other Free Software Foundation software is covered by the GNU Library General Public License instead You can apply it to your programs too When we speak of free software we are referring to freedom not price Our General Public Licenses are designed to make sure that you have the freedom to
44. ask Default 255 255 255 0 available when PPTP Network Mode is set to static IP Default Gateway The IP address of the gateway router for the Wireless Broadband Router which is used if the requested destination address is not on the local subnet Operation Mode Selects the operation mode as Keep Alive or Manual Default Keep Alive Keep Alive Mode The Wireless Broadband Router will periodically check your Internet connection and automatically re establish your connection when disconnected Default 60 seconds Manual Mode The unit will remain connected to the Internet without disconnecting Primary DNS Server The IP address of the Primary Domain Name Server A DNS maps numerical IP addresses to domain names and can be used to identify network hosts by familiar names instead of the IP addresses To specify a DNS server type the IP addresses in the text field provided Otherwise leave the text field blank Secondary DNS Server The IP address of the Secondary Domain Name Server MAC Clone Some ISPs limit Internet connections to a specified MAC address of one PC This setting allows you to manually change the MAC address of the Wireless Broadband Router s WAN interface to match the PC s MAC address provided to your ISP for registration You can enter the registered MAC address manually by typing it in the boxes provided Otherwise connect only the PC with the registered MAC address to the Wireless Broadb
45. ata encryption When enabled WEP encryption keys are automatically generated by the RADIUS server and distributed to all connected clients Default Disabled RADIUS Server Configures RADIUS server settings IP Address Specifies the IP address of the RADIUS server Port The User Datagram Protocol UDP port number used by the RADIUS server for authentication messages Range 1024 65535 Default 1812 Shared Secret A shared text string used to encrypt messages between the access point and the RADIUS server Be sure that the same text string is specified on the RADIUS server Do not use blank Spaces in the string Maximum length 20 characters Session Timeout Number of seconds the access point waits for a reply from the RADIUS server before resending a request Range 1 60 seconds Default 0 Idle Timeout Sets the maximum time in seconds of client inactivity before a session is terminated a 75 CHAPTER 7 Wireless Configuration Advanced Settings ADVANCED SETTINGS The Advanced Settings page includes additional parameters concerning the wireless network including HT Physical Mode and Wi Fi Multimedia settings NoTE There are several variables to consider when selecting a radio mode that make it fully functional Simply selecting the mode you want is not enough to ensure full compatibility for that mode Information on these variables may be found in the HT Physcial Mode Setting
46. ced Routing Settings The Advanced Routing Section allows you to configure Static and Dynamic Routing settings Destination Coo Range Interface Comment LT Current Routing table in the system No Destination Netmask Seem Flags wet So use merce Comes 295 295 255 255 255 255 255 255 0 0 0 0 0 0 Tha 192 168 2 0 255 255 255 0 o 0 0 0 l oo i cs Dynamic Routi ng Protocol 63 CHAPTER 6 Internet Settings Advanced Routing Destination A destination network or specific host to which packets can be routed Type Defines the type of destination Options Host Net Default Host Gateway The IP address of the router at the next hop to which matching frames are forwarded Interface The selected interface to which a static routing subnet is to be applied Comment Enters a useful comment to help identify this route ROUTING TABLE This page displays the information necessary to forward a packet along the best path toward its destination Each packet contains information about its origin and destination When a packet is received a network device examines the packet and matches it to the routing table entry providing the best match for its destination The table then provides the device with instructions for sending the packet to the next hop on its route across the network Note The Routing Table is only available when the Wireless Broadband Router is set to Gateway Mode Dest
47. cility Advanced Encryption Standard An encryption algorithm that implements symmetric key cryptography AES provides very strong encryption using a completely different ciphering algorithm to TKIP and WEP The process to verify the identity of a client requesting network access IEEE 802 11 specifies two forms of authentication open system and Shared key The core infrastructure of a network The portion of the network that transports information from one central location to another central location where it is unloaded onto a local system A signal periodically transmitted from the access point that is used to identify the service set and to maintain contact with wireless clients Broadcast keys are sent to stations using dynamic keying Dynamic broadcast key rotation is often used to allow the access point to generate a random group key and periodically update all key management capable wireless clients Dynamic Host Configuration Protocol Provides a framework for passing configuration information to hosts on a TCP IP network DHCP is based on 123 GLOSSARY ENCRYPTION ETHERNET FTP HTTP IEEE 802 11B IEEE 802 11G INFRASTRUCTURE LAN MAC ADDRESS NTP OPEN SYSTEM the Bootstrap Protocol BOOTP adding the capability of automatic allocation of reusable network addresses and additional configuration options Data passing between the access point and clients can use encryption to protect from in
48. ckets fo WAN Rx bytes o WAN TX packets 613 WAN Tx bytes 361050 LAN Rx packets 3145 LAN Rx bytes 399661 LAN Tx packets 3854 LAN Tx bytes 2529384 All interfaces Name lo Rx Packet lo Rx Byte 0 Tx Facket fo Tx Byte fo Name eth Rx Facket 3176 The following items are displayed on this page Memory total The total memory of this Wireless Broadband Router Memory left The available memory of this Wireless Broadband Router WAN LAN AIl Interfaces Displays the interface on which traffic is being monitored Rx packets Displays the total number of packets received by the specified interface Rx bytes Displays the total number of bytes transmitted by the specified interface 107 CHAPTER 9 Administration Settings System Log SYSTEM LOG Tx packets Displays the total number of packets transmitted by the specified interfaces Tx bytes Displays the total number of bytes transmitted by the specified interface The Wireless Broadband Router supports a logging process that controls error messages saved to memory or sent to a Syslog server The logged messages serve as a valuable tool for isolating Wireless Broadband Router and network problems The System Log page displays the latest messages logged in chronological order from the newest to the oldest Log messages saved in the Wireless Broadband Router s memory are erased when the device is
49. client to the RADIUS server Client authentication is then verified on the RADIUS server before the client can access the network Remote Authentication Dial in User Service RADIUS is an authentication protocol that uses software running on a central server to control access to RADIUS aware devices on the network An authentication server contains a database of user credentials for each user that requires access to the network The WPA and WPA2 enterprise security modes use 802 1X as the method of user authentication IEEE 802 1X can also be enabled on its own asa security mode for user authentication When 802 1X is used a RADIUS server must be configured and be available on the connected wired network NoTE This guide assumes that you have already configured RADIUS server s to support the access point Configuration of RADIUS server software is beyond the scope of this guide refer to the documentation provided with the RADIUS server software 74 CHAPTER 7 Wireless Configuration WLAN Security Figure 34 Security Mode 802 1X Security Mode 021X hai 607 1 WEP Disable 2 Enable Radius Server Shared Secret session Timeout Idle Timeout Security Mode Configures the 802 1X security mode used by clients When using 802 1 either with WPA WPA2 or on its own be sure there is a configured RADIUS server in the connected wired network Default Disable 802 1X WEP Selects WEP keys for d
50. curity mechanisms that provide various levels of authentication and encryption depending on the requirements of the network Click on Wireless Settings followed by Basic Figure 30 Security Mode Options security Mode Access Policy Policy Add a station MAC The supported security mechanisms and their configuration parameters are described in the following sections OPEN SHARED WEP AUTO See Wired Equivalent Privacy WEP on page 70 69 CHAPTER 7 Wireless Configuration WLAN Security WPA PSK WPA2 PSK WPA PSK_WPA2 PSK See WPA Pre Shared Key on page 71 WPA WPA2 WPA1_WPA2 See WPA Enterprise Mode on page 72 802 1X See IEEE 802 1X and RADIUS on page 74 WIRED EQUIVALENT WEP provides a basic level of security preventing unauthorized access to PRIVACY WEP the network and encrypting data transmitted between wireless clients and an access point WEP uses static shared keys fixed length hexadecimal or alphanumeric strings that are manually distributed to all clients that want to use the network When you select to use WEP be sure to define at least one static WEP key for user authentication or data encryption Also be sure that the WEP shared keys are the same for each client in the wireless network Figure 31 Security Mode WEP security Mode Encrypt Type Wire Equivalence Protection VWWEP Default Key WEP Key 1 WEP Key 2 WEP K
51. ddress Displays a MAC address to filter Destination IP Address Displays the destination IP address Source IP Address Displays the source IP address Protocol Displays the destination port type Destination Port Range Displays the destination port range Source Port Range Displays the source port range Action Displays if the specified traffic is accepted or dropped Comment Displays a useful comment to identify the routing rules 93 CHAPTER 8 Firewall Configuration Virtual Server Settings Port Forwarding VIRTUAL SERVER SETTINGS PORT FORWARDING Virtual Server sometimes referred to as Port Forwarding is the act of forwarding a network port from one network node to another This technique can allow an external user to reach a port on a private IP address inside a LAN from the outside through a NAT enabled router Maximum 32 entries are allowed Figure 48 Virtual Server Virtual Server Settings This section is provided for the configuration of the Virtual Server Virtual Server Settings Virtual Server Settings Private Port Public Port C Protocol TCP amp UDP The maximum rule countis 32 Current Virtual Servers in system No IP Address Port Mapping Protocol Comment Delete Selected Reset Virtual Server Settings Selects between enabling or disabling port forwarding the virtual server Default Disable IP Address Specifies the IP address
52. ddresses consist of four decimal numbers O to 255 separated by periods Subnet Mask The mask that identifies the host address bits used for routing to specific subnets Default Gateway The IP address of the gateway router for the Wireless Broadband Router which is used if the requested destination address is not on the local subnet Primary DNS Server The IP address of the Primary Domain Name Server on the network A DNS maps numerical IP addresses to domain names and can be used to identify network hosts by familiar names instead of the IP addresses If you have one or more DNS servers located on the local network type the IP addresses in the text fields provided Otherwise leave the addresses as all zeros 0 0 0 0 Secondary DNS Server The IP address of the Secondary Domain Name Server on the network MAC Clone Some ISPs limit Internet connections to a specified MAC address of one PC This setting allows you to manually change the MAC address of the Wireless Broadband Router s WAN interface to match the PC s MAC address provided to your ISP for registration You can enter the registered MAC address manually by typing it in the boxes 57 CHAPTER 6 Internet Settings WAN Setting provided Otherwise connect only the PC with the registered MAC address to the Wireless Broadband Router then click the Clone your PC s MAC Address Default Disable PPPOE Enables the Wireless Broadband Ro
53. distribute copies of free software and charge for this service if you wish that you receive source code or can get it if you want it that you can change the software or use pieces of it in new free programs and that you know you can do these things To protect your rights we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights These restrictions translate to certain responsibilities for you if you distribute copies of the software or if you modify it For example if you distribute copies of such a program whether gratis or for a fee you must give the recipients all the rights that you have You must make sure that they too receive or can get the source code And you must show them these terms so they know their rights We protect your rights with two steps 1 copyright the software and 2 offer you this license which gives you legal permission to copy distribute and or modify the software Also for each author s protection and ours we want to make certain that everyone understands that there is no warranty for this free software If the software is modified by someone else and passed on we want its recipients to know that what they have is not the original so that any problems introduced by others will not reflect on the original authors reputations Finally any free program is threatened constantly by software patents We wish to avoid the danger that redistributors of
54. e locally Import Settings Allows the user to load previously saved configuration files from a local source Load Factory Defaults Restores the factory defaults 104 CHAPTER 9 Administration Settings System Status SYSTEM STATUS The System Information page displays basic system information and the displayed settings are for status information only and are not configurable on this page This information is split into the three sections that follow Figure 57 System Status Gateway Mode Displays the status of the device Firmware Version 0 0 3 5 Aug 2 2009 System Time Wed 02 Sep 2009 16 04 40 Operation Mode Gateway Mode Connected Type DHCP WAN IP Address Subnet Mask Default Gateway Primary Domain Name Server Secondary Domain Name Server MAC Address 00 22 2D 62 EA 3 LAN IP Address 192 168 2 1 LAN Netmask 255 256 266 0 MAC Address 00 22 2D 62 EA 36 System Info Displays the basic system information in both Bridge and Gateway Modes Firmware Version The version number of the current Wireless Broadband Router software System Time Length of time the management agent has been up specified in hours and minutes Operation Mode Displays the mode setting of the unit Internet Configurations Displays the basic WAN information Connected Type Displays the WAN connected mode Default DHCP WAN IP Address IP address of the WAN p
55. eless Broadband Router in the Basic Service Set BSS network Security Mode Specifies the security mode for the SSID Select the security method and then configure the required parameters For more information see WLAN Security on page 69 Options Disabled Open Shared WEP AUTO WPA PSK WPA2 PSK WPA PSK_WPA2 PSK WPA WPA2 WPA1_WPA2 802 1X Default Disabled NoTE To keep your wireless network protected and secure you should implement the highest security possible For small networks it is recommended to select WPA2 PSK using AES encryption as the most secure option However if you have older wireless devices in the network that do not support AES encryption select TKIP as the encryption algorithm Access Policy The Wireless Broadband Router provides a MAC address filtering facility The access policy can be set to allow or reject specific station MAC addresses This feature can be used to connect known wireless devices that may not be able to support the configured security mode Adda station MAC Enter the MAC address of the station that you want to filter MAC addresses must be entered in the format XXIXX XXIXX XX XX COMPLETION After completion of the Wizard the screen returns to the Home Page 47 CHAPTER 4 Initial Configuration Setup Wizard ae SECTION Il WEB CONFIGURATION This section provides details on configuring the Wireless Broadband Router using the web browser
56. ernal network with wired and wireless users and a public external network that connects to the Internet Network traffic is forwarded or routed between the two subnetworks J0 CHAPTER 2 Network Planning LAN Access Point Figure 4 Operating as an Internet Gateway Router Internet Service Provider G gt NAS Modem is ed from isP Wireless m eg b si NAN wr A 9214082 Notebook PC w LAN N p IP 192 168 2 x g LAN Switch Server Q p IP 192 168 2 x N Desktop PC IP 192 168 2 x The private local network connected to the LAN port or wireless interface provides a Dynamic Host Configuration Protocol DHCP server for allocating IP addresses to local PCs and wireless clients and Network Address Translation NAT for mapping the multiple internal IP addresses to one external IP address The public external network connected to the WAN port supports DHCP client Point to Point Protocol over Ethernet PPPoE and static IP for connection to an Internet service provider ISP through a cable or DSL modem LAN ACCESS POINT The Wireless Broadband Router can provide an access point service for an existing wired LAN creating a wireless extension to the local network The Wireless Broadband Router functions as purely an access point when set to Bridge Mode When used in this mode there are no gateway functions between the WAN port and the LAN and wireless interface A Wi Fi
57. esting that your username and password be sent in an insecure manner basic authentication without a secure connection Rermermber my password HOME PAGE AND MAIN MENU After logging in to the web interface the Home page displays The Home page shows the main menu and the method to access the Setup Wizard Figure 12 Home Page SMC Networks SMCWBR14S N4 Setup Wizard Operation Mode Internet Settings Wireless Settings Firewall Administration Welcome to the SMCWBR14S N4 Home Page If you wish to directly configure or view the status of this device please use the menu bar located above For basic configuration to get started enter Setup wizard Enter Setup Wizard 39 CHAPTER 4 Initial Configuration Common Web Page Buttons COMMON WEB PAGE BUTTONS SETUP WIZARD STEP 1 LANGUAGE SELECTION The list below describes the common buttons found on most web management pages Apply Applies the new parameters and saves them to memory Also displays a screen to inform you when it has taken affect Clicking Apply returns to the home page Cancel Cancels the newly entered settings and restores the previous settings Next Proceeds to the next step Back Returns to the previous screen The Wizard is designed to help you configure the basic settings required to get the the Wireless Broadband Router up and running There are only a few basic steps you need to set up the the Wireless B
58. eys WEP Key 3 WEP Key 4 Security Mode Configures the WEP security mode used by clients When using WEP be sure to define at least one static WEP key for the Wireless Broadband Router and all its clients Default Disable OPEN Open system authentication accepts any client attempting to connect the Wireless Broadband Router without verifying its identity In this mode the default data encryption type is WEP SHARED The shared key security uses a WEP key to authenticate clients connecting to the network and for data encryption WEP AUTO Allows wireless clients to connect to the network using Open WEP uses WEP for encryption only or Shared WEP uses WEP for authentication and encryption Encrypt Type Selects WEP for data encryption OPEN mode only s 70 CHAPTER 7 Wireless Configuration WLAN Security Default Key Selects the WEP key number to use for authentication or data encryption If wireless clients have all four WEP keys configured to the same values you can change the encryption key to any of the settings without having to update the client keys Default 1 Range 1 4 WEP Keys 1 4 Sets WEP key values The user must first select ASCII or hexadecimal keys Each WEP key has an index number Enter key values that match the key type and length settings Enter 5 alphanumeric characters or 10 hexadecimal digits for 64 bit keys or enter 13 alphanumeric characters or 2
59. ge of your choice from the drop down list then click Apply Options English Traditional Chinese Default English WEB INTERFACE To protect access to the management interface you need to configure a SETTINGS new Administrator s user name and password as soon as possible If a new user name and password are not configured then anyone having access to the Wireless Broadband Router may be able to compromise the unit s security by entering the default values User Name The name of the user The default name for access to the unit is admin Length 3 16 characters case sensitive Password The password for management access The default password preset for access to the unit is smcadmin Length 3 16 characters case sensitive Confirm Password Prompts you to enter the password again for verification 100 SNTP SETTINGS CHAPTER 9 Administration Settings SNTP Settings The System Management page allows you to manually configure time settings or enable the use of a Simple Network Time Protocol SNTP or NTP server Figure 53 SNTP Settings Current Time Sat Jan 1 0110 42 UTC 200 sync with host Time Zone GMT England Ww SNTP Server ex time nist gov ntp broad mitedu time stdtime gov tw SNTP synchronization hours Current Time Displays the current system time on the unit Sync with host Updates the unit s time from the web management PC s system time T
60. idge Mode 3 Both units in a link are configured as Bridge Mode When two or more units in the WDS network are set to Gateway Mode be Sure to check these settings Be sure each unit is configured with a different LAN IP address Be sure that only one unit has an Internet access on its WAN port Be sure the DHCP server is enabled only on one unit When one unit is providing Internet access enable the DHCP server on that unit Note When using WDS Lazy mode in the network at least one unit must be set to Bridge or Repeater mode 85 CHAPTER 7 Wireless Configuration Wireless Distribution System WDS Figure 43 WDS Configuration Wireless Distribution System WIS The Wireless Distribution page allows configuration of WDS parameters for the purpose of bridging or creating a repeater application Wireless Distribution System WDS WDS Mode Physica CCK fe Encryption Type AP MAC Address a Encryption Type AP MAC Address SSS Encryption Type Enator Ke AP MAC Address T Encryption Type The WDS settings configure WDS related parameters Up to four MAC addresses can be specified for each unit in the WDS network WDS links may either be manually configured Bridge and Repeater modes or auto discovered Lazy mode 86 CHAPTER 7 Wireless Configuration Wireless Distribution System WDS WDS Mode Selects the WDS mode of the SSID Options Disable Lazy Br
61. idge Repeater Default Disable Disable WDS is disabled Lazy Operates in an automatic mode that detects and learns WDS peer addresses from received WDS packets without the need to configure a WDS MAC list entry This feature allows the Wireless Broadband Router to associate with other Wireless Broadband Routers in the network and use their WDS MAC list Lazy mode requires one other Wireless Broadband Router within the wireless network that is configured in Bridge or Repeater mode and has a configured MAC address list Bridge Operates as a standard bridge that forwards traffic between WDS links links that connect to other units in Repeater or Lazy mode The MAC addresses of WDS peers must be configured on the Wireless Broadband Router Repeater Operates as a wireless repeater extending the range for remote wireless clients and connecting them to an AP connected to the wired network The MAC addresses of WDS peers must be configured on the Wireless Broadband Router Physical The radio media coding used on all WDS links CCK corresponds to 11b OFDM corresponds to 11g and HTMIX corresponds to Lin Encryption Type The data encryption used on the WDS link Be sure that both ends of a WDS link are configured with the same encryption type and key Options None WEP TKIP AES Default None Encryption Key The encryption key for the WDS link The key type and length varies depending on the encryption type
62. ight through or crossover cable to connect to any device type You must connect all four wire pairs as shown in the following diagram to Support Gigabit Ethernet connections Lif APPENDIX C Cables and Pinouts Crossover Wiring Figure 61 Straight through Wiring EIA TIA 568B RJ 45 Wiring Standard 10 100BASE TX Straight through Cable White Orange Stripe Orange White Green Stripe EndA End B Blue White Blue Stripe Green LUN W CONOOaRWN White Brown Stripe Brown CROSSOVER WIRING If the twisted pair cable is to join two ports and either both ports are labeled with an X MDI X or neither port is labeled with an X MDI a crossover must be implemented in the wiring When auto negotiation is enabled for any RJ 45 port on this switch you can use either straight through or crossover cable to connect to any device type You must connect all four wire pairs as shown in the following diagram to Support Gigabit Ethernet connections Figure 62 Crossover Wiring EIA TIA 568B RJ 45 Wiring Standard 10 100BASE TX Crossover Cable White Orange Stripe Uf Orange N White Green Stripe N End A Blue End B White Blue Stripe 4 Green LINN NW CONOORWN White Brown Stripe Brown L18 LICENSE INFORMATION This product includes copyrighted third p
63. ime Zone Specifies the time zone in relation to Greenwich Mean Time GMT SNTP Server The IP address or URL of the NTP server to be used SNTP synchronization Sets the SNTP sycnronization in hours 01 CHAPTER 9 Administration Settings DDNS Settings DDNS SETTINGS Dynamic DNS DDNS provides users on the Internet with a method to tie a specific domain name to the unit s dynamically assigned IP address DDNS allows your domain name to follow your IP address automatically by changing your DNS records when your IP address changes The Wireless Broadband Router provides access to three DDNS service providers DynDns org Non IP com and ZoneEdit com To set up an DDNS account visit the websites of these service providers at www dyndns org www non ip com or www zoneedit com Figure 54 DDNS Settings Gateway Mode DDNS Settings Dynamic ONS Provider User Name Password HostName Dynamic DNS Provider Specifies the DDNS service provider DynDns org Freedns afraid org ZoneEdit com or Non IP com Default none User Name Specifies your user name for the DDNS service Password Specifies your password for the DDNS service HostName Specifies the URL of the DDNS service 102 CHAPTER 9 Administration Settings Upgrade Firmware UPGRADE FIRMWARE You can update the Wireless Broadband Router firmware by using the Firmware Update facility Figure 55 Upgrade
64. ination Displays all destination networks or specific hosts to which packets can be routed Netmask Displays the subnetwork associated with the destination Gateway Displays the IP address of the router at the next hop to which matching frames are forwarded Flags Flags Possible flags identify as below m 0 reject route 1 route is up 3 route is up use gateway 5 route is up target is a host 7 route is up use gateway target is a host Metric A number used to indicate the cost of the route so that the best route among potentially multiple routes to the same destination can be selected Ref Number of references to this route pA DYNAMIC ROUTE CHAPTER 6 Internet Settings Advanced Routing Use Count of lookups for the route Interface Interface to which packets for this route will be sent Comment Displays a useful comment to identify the routing rules The Wireless Broadband Router supports RIP 1 and RIP 2 dynamic routing protocol Routing Information Protocol RIP is the most widely used method for dynamically maintaining routing tables RIP uses a distance vector based approach to routing Routes are chosen to minimize the distance vector or hop count which serves as a rough estimate of transmission cost Each router broadcasts its advertisement every 30 seconds together with any updates to its routing table This allows all routers on the network t
65. ing distributing or modifying the Program or works based on it Each time you redistribute the Program or any work based on the Program the recipient automatically receives a license from the original licensor to copy distribute or modify the Program subject to these terms and conditions You may not impose any further restrictions on the recipients exercise of the rights granted herein You are not responsible for enforcing compliance by third parties to this License If as a consequence of a court judgment or allegation of patent infringement or for any other reason not limited to patent issues conditions are imposed on you whether by court order agreement or otherwise that contradict the conditions of this License they do not excuse you from the conditions of this License If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations then as a consequence you may not distribute the Program at all For example if a patent license would not permit royalty free redistribution of the Program by all those who receive copies directly or indirectly through you then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program If any portion of this section is held invalid or unenforceable under any particular circumstance the balance of the section is intended to apply and the section as a whole is intended to appl
66. interface This section includes these chapters Operation Mode on page 51 Internet Settings on page 55 Wireless Configuration on page 67 Firewall Configuration on page 91 Administration Settings on page 99 4G SECTION Web Configuration 50 OPERATION MODE The Wireless Broadband Router offers a user friendly web based management interface for the configuration of all the unit s features Any PC directly attached to the unit can access the management interface using a web browser such as Internet Explorer version 6 0 or above The following sections are contained in this chapter Logging In on page 52 Operation Mode on page 54 51 CHAPTER 5 Operation Mode Logging In LOGGING IN It is recommended to make initial configuration changes by connecting a PC directly to one of the Wireless Broadband Router s LAN ports The Wireless Broadband Router has a default IP address of 192 168 2 1 anda subnet mask of 255 255 255 0 If your PC is set to Obtain an IP address automatically that is set as a DHCP client you can connect immediately to the web interface Otherwise you must set your PC IP address to be on the same subnet as the Wireless Broadband Router that is the PC and Wireless Broadband Router addresses must both start 192 168 2 x To access the configuration menu follow these steps 1 Use your web browser to c
67. ion the Gateway Router offers full network management capabilities through an easy to configure web interface Many advanced networking features are provided by the Barricade Wired LAN The Barricade provides connectivity to wired 10 100 Mbps devices making it easy to create a network in small offices or homes Internet Access This device supports Internet access through a WAN connection Since many DSL providers use PPPoE to establish communications with end users the Barricade includes built in clients for these protocols eliminating the need to install these services on your computer Shared IP Address The Barricade provides Internet access for up to 253 users via a single shared IP address Using only one ISP account multiple users on your network can browse the Web at the same time Virtual Server If you have a fixed IP address you can set the Barricade to act as a virtual host for network address translation Remote users access various services at your site using a constant IP address Then depending on the requested service or port number the Barricade can route the request to the appropriate server at another internal IP address This secures your network from direct attack by hackers and provides more flexible management by allowing you to change internal IP addresses without affecting outside access to your network DMZ Host Support Allows a networked computer to be fully exposed to the Inte
68. irefox 2 0 or above LOCATION SELECTION The Wireless Broadband Router can be mounted on any horizontal surface or on a wall The following sections describe the mounting options 33 CHAPTER 3 Installing the Gateway Router Mounting on a Wall MOUNTING ON A WALL The Wireless Broadband Router should be mounted only to a wall or wood surface that is at least 1 2 inch plywood or its equivalent To mount the unit on a wall always use its wall mounting bracket The unit must be mounted with the RJ 45 cable connector oriented upwards to ensure proper operation Figure 8 Wall Mounting Mounting Slots j To mount on a wall follow the instructions below 1 Mark the position of the two screw holes on the wall For concrete or brick walls you will need to drill holes and insert wall plugs for the screws 2 Insert the included screws into the holes leaving about 0 08 0 12 inches 2 3 mm clearance from the wall 3 Line up the two mounting points on the unit with the screws in the wall then slide the unit down onto the screws until it is in a secured position 34 CHAPTER 3 Installing the Gateway Router Mounting on a Horizontal Surface MOUNTING ON A HORIZONTAL SURFACE To keep the Wireless Broadband Router from sliding on the surface the Wireless Broadband Router has four rubber feet on the bottom of the unit It is recommended to select an uncluttered area on a sturdy surface such as a desktop or table
69. lients wanting to join the network PIN The Wireless Broadband Router along with other WPS devices such as notebook PCs cameras or phones all come with their own eight digit PIN code When one device the WPS enrollee sends a PIN code to the Wireless Broadband Router it becomes the WPS registrar After configuring PIN Code information you must press Apply to send the beacon after which you have up to two minutes to activate WPS on devices that need to join the network PBC This has the same effect as pressing the physical WPS button that is located on the front of the Wireless Broadband Router After checking this option and clicking Apply you have up to two minutes to activate WPS on devices that need to join the network STATION LIST Displays the station information which associated to this Wireless Broadband Router Figure 46 Station List This section allows you to view the stations that have associated with this device Wireless Network MAG Address PSM MimoPS MCS BW SGI STEC 90 FIREWALL CONFIGURATION The Wireless Broadband Router provides extensive firewall protection by restricting connection parameters to limit the risk of intrusion and defending against a wide array of common hacker attacks Firewall Configuration contains the following sections MAC IP Port Filtering on page 91 Virtual Server Settings Port Forwarding on page 94 DMZ on page 95 S
70. m 32 and auto 33 Default auto Reverse Direction Grant RDG When Reverse Direction Grant is enabled the Wireless Broadband Router can reduce the transmitted data packet collision by using the reverse direction protocol During TXOP Transmission Opportunity period the receiver could use remaining transmission time to transmit data to a sender The RDG improves transmission performance and scalability in a wireless environment Extension Channel When 20 40MHz channel bandwidth has been set the extension channel option will be enabled The extension channel will allow you to get extra bandwidth Options 2417MHz Channel 2 2457MHz Channel 10 Default AutoSelect Aggregate MSDU A MSDU This option enables Mac Service Data Unit MSDU aggregation Default Disable Auto Block ACK Select to block ACK Acknowledge Number or not during data transferring Decline BA Request Select to reject peer BA Request or not Fe CHAPTER 7 Wireless Configuration Advanced Settings ADVANCED WIRELESS The Advanced Wireless section on the Wireless Settings Advanced page includes additional radio parameters Figure 37 Advanced Wireless Settings BG Protection Mode Auto Beacon Interval 00 ms range 20 999 default 100 Data Beacon Rate OTIM ms range 1 255 default 1 Fragment Threshold 2346 2346 default 2346 RTS Threshold 2347 range 1 2347 default 2347 TX Power 100 range 1 100 default 10
71. m does You may copy and distribute verbatim copies of the Program s source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and give any other recipients of the Program a copy of this License along with the Program You may charge a fee for the physical act of transferring a copy and you may at your option offer warranty protection in exchange for a fee You may modify your copy or copies of the Program or any portion of it thus forming a work based on the Program and copy and distribute such modifications or work under the terms of Section 1 above provided that you also meet all of these conditions a You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change b You must cause any work that you distribute or publish that in whole or in part contains or is derived from the Program or any part thereof to be licensed as a whole at no charge to all third parties under the terms of this License c Ifthe modified program normally reads commands interactively when run you must cause it when started running for such interactive use in the most ordinary way to print or display an announcement including an appropriate copyright notice and a notice that there is no wa
72. n Blinking Blue The 802 11n radio is enabled and transmitting or receiving data through wireless links Off The 802 11n radio is disabled WPS Blinking WPS authentication is in progress Off WPS authentication is not in progress WAN On Blue The Ethernet WAN port is aquiring an IP address Blinking The Ethernet WAN port is connected and is transmitting receiving data Off The Ethernet WAN port is disconnected or has malfunctioned LANI LAN4 On Blue The Ethernet LAN port is connected to a PC or server Blinking The Ethernet port is connected and is transmitting receiving data Off The Ethernet port is disconnected or has malfunctioned A 100BASE TX RJ 45 port that can be attached to an Internet access device such as a DSL or Cable modem The Wireless Broadband Router has four 100BASE TX RJ 45 ports that can be attached directly to 1OBASE T 100BASE TX LAN segments These port support automatic MDI MDI X operation so you can use straight through cables for all network connections to PCs switches or hubs The Wireless Broadband Router must be powered with its supplied power adapter Failure to do so results in voiding of any warrantly supplied with the product The power adapter automatically adjusts to any voltage between 100 240 volts at 50 or 60 Hz and supplies 5 volts DC power to the unit No voltage range settings are required OG s CHAPTER 1 Introduction Hardware Description RESET BUTTON This button is used
73. nd Router verify that the Power LED turns on and that the other LED indicators start functioning as described under see LED Indicators on page 25 4 Set up wireless devices by pressing the WPS button on the Wireless Broadband Router or by using the web interface See Initial Configuration on page 38 for more information on accessing the web interface BRIDGE MODE CONNECTIONS In Bridge Mode the Wireless Broadband Router operates as a wireless access point extending a local wired network to associated wireless clients PCs or notebooks with wireless capability From any nearby location you can then make a wireless connection to the Wireless Broadband Router and access the wired network resources including local servers and the Internet In Bridge Mode the Wireless Broadband Router does not support gateway functions on its WAN port Both the LAN port and the WAN ports can be connected to a local Ethernet LAN NoTE Bridge Mode is not the factory default mode and must be manually set using the web management interface Figure 10 Bridge Mode Connection 4 Set up wireless CGEA devices A 7 Notebook PC LAN Switch y gt ao w t A 2 Cannat AC power adapter to I power source Desktop PCs 1 Connect LAN and WAN Serer ports to an Ethernet LAN 3 switch or PCs Connect LAN port to PC a To connect the Wireless Broadband Router for use as an access point follow these steps 36
74. ng as a Wireless Repeater Wall Mounting Gateway Mode Connection Bridge Mode Connection Login Page Home Page Wizard Step 1 Language Selection Wizard Step 2 Time and SNTP Settings Wizard Step 3 WAN Settings DHCP Wizard Step 3 WAN Settings Static IP Wizard Step 3 WAN Settings PPPoE Wizard Step 3 WAN Settings PPTP Wizard Step 4 Wireless Security Logging On Home Page Operation Mode Gateway DHCP Configuration Static IP Configuration PPPoE Configuration PPTP Configuration LAN Configuration Advanced Routing Gateway Mode Basic Settings Security Mode Options Security Mode WEP te 24 25 25 30 31 31 32 34 35 36 39 39 40 41 42 43 44 45 46 52 53 54 56 57 58 59 61 63 68 69 70 Figure 32 Figure 33 Figure 34 Figure 35 Figure 36 Figure 37 Figure 38 Figure 39 Figure 40 Figure 41 Figure 42 Figure 43 Figure 44 Figure 45 Figure 46 Figure 47 Figure 48 Figure 49 Figure 50 Figure 51 Figure 52 Figure 53 Figure 54 Figure 55 Figure 56 Figure 57 Figure 58 Figure 59 Figure 60 Figure 61 Figure 62 Security Mode WPA PSK Security Mode WPA Security Mode 802 1X Advanced Settings Wireless Network HT Physical Mode Settings Advanced Wireless Settings Wi Fi Multimedia Settings WMM Configuration Multicast to Unicast Converter Manual WDS MAC Address Configuration WDS Configuration Example WDS Configuration Enabling WPS
75. ns that are using Power Save mode The default value of one beacon indicates that the access point will save all broadcast multicast frames for the Basic Service Set BSS a Fo CHAPTER 7 Wireless Configuration Advanced Settings and forward them after every beacon Using smaller DTIM intervals delivers broadcast multicast frames in a more timely manner causing stations in Power Save mode to wake up more often and drain power faster Using higher DTIM values reduces the power used by stations in Power Save mode but delays the transmission of broadcast multicast frames Range 1 255 beacons Default 1 beacon Fragmentation Threshold Configures the minimum packet size that can be fragmented when passing through the access point Fragmentation of the PDUs Package Data Unit can increase the reliability of transmissions because it increases the probability of a successful transmission due to smaller frame size If there is significant interference present or collisions due to high network utilization try setting the fragment size to send smaller fragments This will speed up the retransmission of smaller frames However it is more efficient to set the fragment size larger if very little or no interference is present because it requires overhead to send multiple frames Range 256 2346 bytes Default 2346 bytes RTS Threshold Sets the packet size threshold at which a Request to Send RTS signal must be sent to a receiving sta
76. ntrusions A stateful packet firewall looks at packet contents to check if the traffic may involve some type of security risk Default Disable 96 CONTENT FILTERING CHAPTER 8 Firewall Configuration Content Filtering The Wireless Broadband Router provides a variety of options for blocking Internet access based on content URL and host name Figure 51 Content Filtering Content Filter Settings The Content Filtering Settings page helps to control access through various types of restrictions Current Web URL Filters No URL Add a URL filter wo Oooo o Current Website Host Filters Host Keyword Add a Host keyword Filter Web URL Filter Settings By filtering inbound Uniform Resource Locators URLs the risk of compromising the network can be reduced URLs are commonly used to point to websites By specifying a URL ora keyword contained in a URL traffic from that site may be blocked Current URL Filters Displays current URL filter Adda URL Filter Adds a URL filter to the settings For example myhost example com Web Host Filter Settings The Wireless Broadband Router allows Internet content access to be restricted based on web address keywords and web domains A domain name is the name of a particular web site For example for the address www FUNGAMES com the domain name is FUNGAMES com Enter the Keyword then click Add Current Host Filters Displays current Host filter
77. o build consistent tables of next hop links which lead to relevant subnets RIP Enables or disable the RIP protocol for the WAN or LAN interface Options Disable v1 v2 Default Disable 65 CHAPTER 6 Internet Settings Advanced Routing 66 BASIC SETTINGS WIRELESS CONFIGURATION The wireless settings section displays configuration settings for the access point functionality of the Wireless Broadband Router It includes the following sections Basic Settings on page 67 WLAN Security on page 69 Advanced Settings on page 76 Wireless Distribution System WDS on page 84 Wi Fi Protected Setup WPS on page 88 Station List on page 90 The IEEE 802 11n interface includes configuration options for radio signal characteristics and wireless security features The Wireless Broadband Router s radio can operate in six modes mixed 802 11b g n mixed 802 11b g mixed 802 11g n 802 11n only 802 11b only or 802 11g only Note that 802 11g is backward compatible with 802 11b and 802 11n is backward compatible with 802 11b g at slower data transmit rates NoTE The radio channel settings for the access point are limited by local regulations which determine the number of channels that are available The Basic Settings page allows you to configure the wireless network name Service Set Identifier or SSID and set the wireless security method Click on
78. on against harmful interference in a residential installation This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications This transmitter must not be co located or operating in conjunction with any other antenna or transmitter However there is no guarantee that interference will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference by one of the following measures Reorient or relocate the receiving antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device may not cause harmful interference and 2 this device must accept any interference received including interference that may cause undesired operation FCC Caution Any changes or modifications not expressly approved by the party responsible for compliance could void the user s authority to operate this equipment IEEE 802 11b or 802 11g operation of this product
79. onnect to the management interface using the default IP address of 192 168 2 1 2 Log into the Wireless Broadband Router management interface by entering the default user name admin and password smcadmin then click Login NoTE It is strongly recommended to change the default user name and password the first time you access the web interface For information on changing user names and passwords see Administration Settings on page 99 Figure 20 Logging On Connect to 192 168 2 1 The server 192 168 2 1 at SMCWBR14S h4 requires a Username and password Warning This server is requesting that your username and password be sent in an insecure manner basic authentication without a secure connection User name E admin v Remember my password so a CHAPTER 5 Operation Mode Logging In The home page displays the main menu items at the top of the screen and the Setup Wizard See Setup Wizard on page 40 Figure 21 Home Page SMC Networks SMCWBR14S N4 Setup Wizard Operation Mode Internet Settings Wireless Settings Firewall Administration Welcome to the SMCWBR14S N4 Home Page If you wish to directly configure or view the status of this device please use the menu bar located above For basic configuration to get started enter Setup wizard Enter Setup Wizard Copyright 2009 SMC Inc All Rights Reserved NoTE The displayed pages and settings may differ depending on whe
80. ontacting Technical Support PA m Check that you have a valid network connection to the Gateway Router and that the Ethernet port or the wireless interface that you are using has not been disabled If you are connecting to the Gateway Router through the wired Ethernet interface check the network cabling between the management station and the Gateway Router If you are connecting to Gateway Router from a wireless client ensure that you have a valid connection to the Gateway Router If you forgot or lost the password set the Gateway Router to its default configuration by pressing the reset button on the back panel for 5 seconds or more Then use the default user name admin and password smcadmin to access the management interface If all other recovery measure fail and the Gateway Router is still not functioning properly reset the Gateway Router s hardware using the web interface or through a power reset 112 APPENDIX A Troubleshooting Before Contacting Technical Support 113 PORT INTERFACES AC POWER ADAPTER LED INDICATORS NETWORK MANAGEMENT TEMPERATURE HUMIDITY PHYSICAL SIZE WEIGHT RADIO EMC SAFETY HARDWARE SPECIFICATIONS WAN 10 100BASE TX port RJ 45 connector auto MDI X 100 ohm UTP cable Category 5 or better LAN 1 4 10 100BASE TX port RJ 45 connector auto MDI X 100 ohm UTP cable Category 5 or better Input 100 240 VAC 50 60 Hz Output 5V
81. ore wireless medium access can be attempted The contention window is doubled after each detected collision up to the CWMax value Specify the CWMax value in the range 0 15 microseconds Note that the CWMax value must be greater or equal to the CWMin value Txop Transmit Opportunity Limit The maximum time an AC transmit queue has access to the wireless medium When an AC queue is granted a transmit opportunity it can transmit data for a time up to the TxOpLimit This data bursting greatly improves the efficiency for high data rate traffic Specify a value in the range 0 65535 microseconds ACM The admission control mode for the access category When enabled clients are blocked from using the access category Default Disabled AckPolicy By default all wireless data transmissions require the sender to wait for an acknowledgement from the receiver WMM allows the acknowledgement wait time to be turned off for each Access Category AC 0 3 Although this increases data throughput it can also result in a high number of errors when traffic levels are heavy Default Acknowledge MULTICAST TO The Multicast to Unicast Converter section on the Wireless Settings UNICAST CONVERTER Advanced page allows you to enable multicast traffic conversion Converting multicast traffic to unicast before sending to wireless clients allows a longer DTIM Data Beacon Rate interval to be set A longer DTIM interval prevents clients in power
82. ort for this device Subnet Mask The mask that identifies the host address bits used for routing to the WAN port 105 CHAPTER 9 Administration Settings System Status Default Gateway The default gateway is the IP address of the router for the Wireless Broadband Router which is used if the requested destination address is not on the local subnet Primary DNS Server Secondary DNS Server The IP address of Domain Name Servers A DNS maps numerical IP addresses to domain names and can be used to identify network hosts by familiar names instead of the IP addresses MAC Address The shared physical layer address for the Wireless Broadband Router s LAN ports Local Network Displays the basic LAN information LAN IP Address The IP address configured on the Wireless Broadband Router LAN Netmask The mask that identifies the host address bits used for routing to the LAN port MAC Address The shared physical layer address for the Wireless Broadband Router s LAN ports L0G STATISTICS CHAPTER 9 Administration Settings Statistics The Wireless Broadband Router Traffic Statistics Interfaces window displays received and transmitted packet statistics for all interfaces on the Wireless Broadband Router Figure 58 Statistics Statistics This section displays various status information of the device Memory total 13656 KB Memory left 1636 kB WAN Rx pa
83. ovided Otherwise leave the text field blank Secondary DNS Server The IP address of the Secondary Domain Name Server MAC Clone Some ISPs limit Internet connections to a specified MAC address of one PC This setting allows you to manually change the MAC address of the Wireless Broadband Router s WAN interface to match the PC s MAC address provided to your ISP for registration You can enter the registered MAC address manually by typing it in the boxes provided Otherwise connect only the PC with the registered MAC address to the Wireless Broadband Router then click the Clone your PC s MAC Address Default Disable Note If you are unsure of the PC MAC address originally registered by your ISP call your ISP and request to register a new MAC address for your account Register the default MAC address of the Wireless Broadband Router 56 CHAPTER 6 Internet Settings WAN Setting STATIC IP Configures a static IP for the WAN port Figure 24 Static IP Configuration Wide Area Network WAH Settings This section allows you to configure the connection type and other related WAN parameters suitable to your environment WAN Connection Type STATIC Fixed IP fig IP Address Subnet Mask a Lo S S Default Gateway CoS Too Lo S S L S Primary DNS Server secondary DNS Server MAC Clone Enabled MAC Address Fill my MAC IP Address The IP address of the Wireless Broadband Router Valid IP a
84. pirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Program specifies a version number of this License which applies to it and any later version you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation If the Program does not specify a version number of this License you may choose any version ever published by the Free Software Foundation If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different write to the author to ask for permission For software which is copyrighted by the Free Software Foundation write to the Free Software Foundation we sometimes make exceptions for this Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally NO WARRANTY BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE THERE IS NO WARRANTY FOR THE PROGRAM TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE PROGRAM AS IS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE THE ENTIRE RISK AS TO THE QU
85. ption the source code distributed need not include anything that is normally distributed in either source or binary form with the major components compiler kernel and so on of the operating system on which the executable runs unless that component itself accompanies the executable If distribution of executable or object code is made by offering access to copy from a designated place then offering equivalent access to copy the source code from the same place counts as distribution of the source code even though third parties are not compelled to copy the source along with the object code You may not copy modify sublicense or distribute the Program except as expressly provided under this License Any attempt otherwise to copy modify sublicense or distribute the Program is void and will automatically terminate your rights under this License However parties who have received copies or rights from you under this License will not have their licenses terminated so long as such parties remain in full compliance You are not required to accept this License since you have not signed it However nothing else grants you permission to modify or distribute the Program or its derivative works These actions are prohibited by law if you do not accept this License Therefore by modifying or distributing the Program or any work based on the Program you indicate your acceptance of this License to do so and all its terms and conditions for copy
86. rebooted Figure 59 System Log System Log This section provides a system log of the device System Log Li SMCWERI45 N4 user info kernel N HDLC line discipline registered gt SMCWBR145 N4 info kernel Serial 8250 16550 driver Revisi SMCWBR145 N4 info kernel gerial 6250 ttyS0 at I O Oxb00005 SMCWBR145 N4 into kernel gerial 250 ttySl1 at I O OxbO000c SMCWBR145 N4 info kernel loop loaded max 6 devices SMCWBR145 N4 Warn kernel rdm major 254 SMCWBR145 N4 info kernel PPP generic driver version 2 4 2 SMCWBR145 N4 info kernel PPP BSD Compression module regist i SMCWBR145 N4 info kernel NET Registered protocol family 2 SMCWBR145 N4 notice kernel ralink flash device Ox400000 a SMCWBR145 N4 info kernel Ralink SoC physically mapped flas 1 SMCWBR145 N4 warn kernel Amd Fujitsu Extended Query Table SMCWBR145 N4 notice kernel number of CFI chips 1 SMCWBR145 N4 notice kernel cfi_amdset 00027 Disabling eras SMCWBR145 N4 hotice kernel Creating 5 MID partitions on R SMCWBR145 N4 hotice kernel Ox00000000 0xe00030000 Bootlo i SMCWBR145 N4 notice kernel 0Ox00030000 0x00040000 Config 7 SMCWERR145 N4 notice kernel Ox00040000 0x00050000 Factor SMCWBRI45 N4 notice kernel Ox00050000 0x200120000 Kernel SMCWER145 N4 notice kernel 0 00120000 0400400000 RootFS SMCWBR145 HN4 info kernel block mtd version Revision 1 1 SMCWBRI145 N4 Warn kernel nf
87. red See IEEE 802 1X and RADIUS on page 74 for more information Default Disable WPA Clients using WPA with an 802 1X authentication method are accepted for authentication The default data encryption type for WPA is TKIP WPA2 Clients using WPA2 with an 802 1X authentication method are accepted for authentication The default data encryption type for WPA is AES WPA1_WPA2 Clients using WPA or WPA2 with an 802 1X authentication method are accepted for authentication The default data encryption type is TKIP AES WPA Algorithms Selects the data encryption type to use Default is determined by the Security Mode selected TKIP Uses Temporal Key Integrity Protocol TKIP keys for encryption WPA specifies TKIP as the data encryption method to replace WEP TKIP avoids the problems of WEP static keys by dynamically changing data encryption keys AES Uses Advanced Encryption Standard AES keys for encryption WPA2 uses AES Counter Mode encryption with Cipher Block Chaining Message Authentication Code CBC MAC for message integrity The AES Counter Mode CBCMAC Protocol AES CCMP provides extremely robust data confidentiality using a 128 Fae S CHAPTER 7 Wireless Configuration WLAN Security bit key Use of AES CCMP encryption is specified as a standard requirement for WPA2 Before implementing WPA2 in the network be sure client devices are upgraded to WPA2 compliant hardware
88. rity options Figure 19 Wizard Step 4 Wireless Security Wireless Security and Encryption Settings The Wireless Security and Encryption Settings page allows you to make detailed security configurations to prevent unauthorized access and monitoring Network Name SSID SMCWBR14S N4_AP Broadcast Network Name SSID Enable Disable AP Isolation O Enable Disable ESSIE 00 22 2D 62 EA 3A Security Mode Disable v Access Policy Policy Allow Add a station MAC Cancel The following items are displayed on this page Network Name SSID The name of the wireless network service provided by the Wireless Broadband Router Clients that want to connect to the network must set their SSID to the same as that of the Wireless Broadband Router Default SMCWBR14S N4_AP Range 1 32 characters ie CHAPTER 4 Initial Configuration Setup Wizard Broadcast Network Name SSID By default the Wireless Broadband Router always broadcasts the SSID in its beacon signal Disabling the SSID broadcast increases security of the network because wireless clients need to already know the SSID before attempting to connect Default Enabled AP Isolation The Wireless Broadband Router will isolate communincation between all clients in order to protect them Normally for users who are at hotspots Default Disabled BSSID The identifier MAC address of the Wir
89. rnet This function is used when NAT and firewall security prevent an Internet application from functioning correctly Security The Barricade supports security features that deny Internet access to specified users or filter all requests for specific services the administrator does not want to serve WPA Wi Fi Protected Access and MAC filtering provide security over the wireless network Virtual Private Network VPN The Barricade supports one of the most commonly used VPN protocols PPTP This protocol allows remote users to establish a secure connection to their corporate network If your service provider supports VPNs then these protocols can be used to create an authenticated and encrypted tunnel for passing secure data over the Internet i e a traditionally shared data network The VPN protocols supported by the Barricade are briefly described below z OO s CHAPTER 1 Introduction Package Contents Point to Point Tunneling Protocol Provides a secure tunnel for remote client access to a PPTP security gateway PPTP includes provisions for call origination and flow control required by ISPs PACKAGE CONTENTS The Barricade Wireless Broadband Router package includes Barricade Wireless Broadband Router RJ 45 Category 5 network cable AC power adapter Quick Installation Guide EZ Installation amp Documentation CD Inform your dealer if there are any incorrect missing or damaged parts If possible
90. roadband Router and provide a connection Follow these steps Select between English or Traditional Chinese Click Next to proceed to the next step of the wizard Figure 13 Wizard Step 1 Language Selection Setup Wizard Please select language Language Settings Select Language English v The following items are displayed on the first page of the Setup Wizard Select Language Toggles between English or Traditional Chinese as the interface language Next Proceeds to the next step s AO CHAPTER 4 Initial Configuration Setup Wizard STEP 2 SNTP The Step 2 page of the Wizard configures time zone and SNTP settings SETTINGS Select a time zone according to where the device is operated Click Next after completing the setup Figure 14 Wizard Step 2 Time and SNTP Settings Time Setting Please input SNTP server or sync your host pe SNTP Settings Current Time Mon 24 Aug 2009 15 42 00 Sync with host Time Zone GMT 05 00 Eastern Time SMTP Server ec time nist gov nipO broad mitedu time stdtime qov tw SNTP synchronization hours e The following items are displayed on this page Current Time Receives a time and date stamp from an SNTP server Time Zone Select the time zone that is applicable to your region SNTP Server Enter the address of an SNTP Server to receive time updates SNTP synchronization ho
91. rogram or a work based on it under Section 2 in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following 120 APPENDIX D License Information The GNU General Public License a Accompany it with the complete corresponding machine readable source code which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange or b Accompany it with a written offer valid for at least three years to give any third party for a charge no more than your cost of physically performing source distribution a complete machine readable copy of the corresponding source code to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange or c Accompany it with the information you received as to the offer to distribute corresponding source code This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer in accord with Subsection b above The source code for a work means the preferred form of the work for making modifications to it For an executable work complete source code means all the source code for all modules it contains plus any associated interface definition files plus the scripts used to control compilation and installation of the executable However as a special exce
92. rranty or else saying that you provide a warranty and that users may redistribute the program under these conditions and telling the user how to view a copy of this License Exception if the Program itself is interactive but does not normally print such an announcement your work based on the Program is not required to print an announcement These requirements apply to the modified work as a whole If identifiable sections of that work are not derived from the Program and can be reasonably considered independent and separate works in themselves then this License and its terms do not apply to those sections when you distribute them as separate works But when you distribute the same sections as part of a whole which is a work based on the Program the distribution of the whole must be on the terms of this License whose permissions for other licensees extend to the entire whole and thus to each and every part regardless of who wrote it Thus it is not the intent of this section to claim rights or contest your rights to work written entirely by you rather the intent is to exercise the right to control the distribution of derivative or collective works based on the Program In addition mere aggregation of another work not based on the Program with the Program or with a work based on the Program on a volume of a storage or distribution medium does not bring the other work under the scope of this License You may copy and distribute the P
93. s et aux autres dispositions pertinentes de la directive 1999 5 CE Swedish H rmed intygar Manufacturer att denna Radio LAN device st r verensst mmelse med Svenska de v sentliga egenskapskrav och vriga relevanta best mmelser som framg r av direktiv 1999 5 EG Danish Undertegnede Manufacturer erkl rer herved at f lgende udstyr Radio LAN device Dansk overholder de v sentlige krav og vrige relevante krav i direktiv 1999 5 EF COMPLIANCES German Hiermit erklart Manufacturer dass sich dieser diese dieses Radio LAN device in Deutsch Ubereinstimmung mit den grundlegenden Anforderungen und den anderen relevanten Vorschriften der Richtlinie 1999 5 EG befindet BMWi Hiermit erkl rt Manufacturer die bereinstimmung des Ger tes Radio LAN device mit den grundlegenden Anforderungen und den anderen relevanten Festlegungen der Richtlinie 1999 5 EG Wien Greek ue THV Tapouoa Manufacturer OnAwvel oT radio LAN device OCUUUOPQWVETAI TpOO TIO EAAnVIKh OUOIWOEIO ATIAITNOEIO KAI TIO AOITTED OYXETIKEO OIATAGEIO THO o nyiao 1999 5 eK Hungarian Alulirott Manufacturer nyilatkozom hogy a Radio LAN device megfelel a vonatkozo Magyar alapvet6 k vetelm nyeknek s az 1999 5 EC ir nyelv egy b eldirasainak Italian Con la presente Manufacturer dichiara che questo Radio LAN device conforme ai Italiano requisiti essenziali ed alle altre disposizioni pertinenti stabilite dalla direttiva 1999 5 CE Latvian Ar So Manufacturer deklar
94. s or disables MAC IP Port Filtering Default Disable Default Policy When MAC IP Port Filtering is enabled the default policy will be enabled If you set the default policy to Dropped all incoming packets that don t match the rules will be dropped If the policy is set to Accepted all incoming packets that don t match the rules are accepted Default Dropped MAC Address Specifies the MAC address to block or allow traffic from Destination IP Address Specifies the destination IP address to block or allow traffic from te 2 6 ae CHAPTER 8 Firewall Configuration MAC IP Port Filtering Source IP Address Specifies the source IP address to block or allow traffic from Protocol Specifies the destination port type TCP UDP or ICMP Default None Destination Port Range Specifies the range of destination port to block traffic from the specified LAN IP address from reaching Source Port Range Specifies the range of source port to block traffic from the specified LAN IP address from reaching Action Specifies if traffic should be accepted or dropped Default Accept Comment Enter a useful comment to help identify the filtering rules CURRENT FILTER The Current Filter Table displays the configured IP addresses and ports that are permitted or denied access to and from the ADSL Router RULES gt UM Select Selects a table entry MAC A
95. save mode having to activate their radios to receive the multicast data which saves battery life Figure 40 Multicast to Unicast Converter Multicast to Unicast Converter Multicast to LInicast Enable Disable The following items are displayed in this section on this page Multicast to Unicast Enables multicast traffic streams to be converted to unicast traffic before delivery to wireless clients Default Disabled 83 CHAPTER 7 Wireless Configuration Wireless Distribution System WDS WIRELESS DISTRIBUTION SYSTEM WDS The radio interface can be configured to operate in a mode that allows it to forward traffic directly to other Wireless Gateway Router units This feature can be used to extend the range of the wireless network to reach remote clients or to link disconnected network segments to an Internet connection To set up links between units you must configure the Wireless Distribution System WDS forwarding table by specifying the wireless MAC address of all units to which you want to forward traffic NotTE All units in a WDS wireless network must be configured with the same SSID and use the same radio channel Also each WDS link must be configured with the same encryption key on both units in the link Up to four WDS links can be specified for each unit in the WDS network The following figures illustrate an example WDS network Figure 41 shows the manual set up of MAC addresses for units in
96. section WIRELESS NETWORK The Wireless Network section on the Wireless Settings Advanced page includes basic radio parameters such as the working mode and operating channel Figure 35 Advanced Settings Wireless Network Advanced Wireless settings B The Advance Wireless Setting page is available to make detailed changes to the wireless configuration It includes tems that are not available from the Basic Wireless Settings page such as OTIM Tx Power WMM and more Wireless Network Wireless OnfOft Turn Off Network Mode 11g n mixed mode Frequency Channel AutoSelect The following items are displayed in this section on this page Wireless On Off Enables or Disable the radio Default Enable Network Mode Defines the radio operating mode Default 11g n Mixed 11b g mixed Both 802 11b and 802 11g clients can communicate with the Wireless Broadband Router up to 108 Mbps but data transmission rates may be slowed to compensate for 802 11b clients Any 802 11n clients will also be able to communicate with the Wireless Broadband Router but they will be limited to 802 11g protocols and data transmission rates 11b only All 802 11b 802 11g and 802 11n clients will be able to communicate with the Wireless Broadband Router but the 802 11g and 802 11n clients will be limited to 802 11b protocols and data transmission rates up to 11 Mbps 70 CHAPTER 7 Wireless Configuration Advanced Se
97. selected For WEP enter 5 alphanumeric characters or 10 hexadecimal digits for 64 bit keys or 13 alphanumeric characters or 26 hexadecimal digits for 128 bit keys For TKIP or AES enter a password key phrase of between 8 to 63 ASCII characters which can include spaces or specify exactly 64 hexadecimal digits AP MAC Address The MAC address of the other Wireless Broadband Router in the WDS link ey CHAPTER 7 Wireless Configuration Wi Fi Protected Setup WPS WI FI PROTECTED SETUP WPS Wi Fi Protected Setup WPS is designed to ease installation and activation of security features in wireless networks WPS has two basic modes of operation Push button Configuration PBC and Personal Identification Number PIN The WPS PIN setup is optional to the PBC setup and provides more security The WPS button on the Wireless Broadband Router can be pressed at any time to allow a single device to easily join the network The WPS Settings page includes configuration options for setting WPS device PIN codes and activating the virtual WPS button Click on Wireless Settings followed by WPS Figure 44 Enabling WPS Wi Fi Protected Setup Wi Fi Protected Setup or WPS is an easy way of securely connecting to the system Both PIN and PBC methods are available WPS Configuration WPS Enables WPS locks security settings and refreshes WPS configuration information Default Enabled 88 CHAPTER 7
98. setting allows you to manually change the MAC address of the Wireless Broadband Router s WAN interface to match the PC s MAC address provided to your ISP for registration You can enter the registered MAC address manually by typing it in the boxes provided Otherwise connect only the PC with the registered MAC address to the Wireless Broadband Router then click the Clone your PC s MAC Address Default Disable PPTP Enables the Point to Point Tunneling Protocol PPTP for implementing virtual private networks The service is provided in many European countries Figure 26 PPTP Configuration WAN Connection Type PPTP PPTP Mode Serer IF Address Mode IF Address 192 168 1 1 subnet Mask Default Gateway Operation Mode DNS Setting Option Primary ONS Server secondary DNS Server MAC Clone Enabled Server IP Sets a PPTP server IP Address Default pptp_server User Name Sets the PPTP user name for the WAN port Default pptp_user Range 1 32 characters 59 CHAPTER 6 Internet Settings WAN Setting Password Sets a PPTP password for the WAN port Default pptp_password Range 1 32 characters Verify Password Prompts you to re enter your chosen password Address Mode Sets a PPTP network mode Default Static IP Address Sets the static IP address Default 0 0 0 0 available when PPTP Network Mode is set to static IP Subnet Mask Sets the static IP subnet m
99. specific information on how to install the Wireless Broadband Router and its physical and performance related characteristics It also gives information on how to operate and use the management functions of the Wireless Broadband Router This guide is for users with a basic working knowledge of computers You should be familiar with Windows operating system concepts The following conventions are used throughout this guide to show information NoTE Emphasizes important information or calls your attention to related features or instructions CAUTION Alerts you to a potential hazard that could cause loss of data or damage the system or equipment WARNING Alerts you to a potential hazard that could cause personal injury As part of the Wireless Broadband Router s software there is an online web based help that describes all management related features This section summarizes the changes in each revision of this guide SEPTEMBER 2009 REVISION This is the first revision of this guide 10 SECTION I CONTENTS WARRANTY AND PRODUCT REGISTRATION COMPLIANCES ABOUT THIS GUIDE CONTENTS FIGURES TABLES GETTING STARTED INTRODUCTION Key Hardware Features Description of Capabilities Applications Package Contents Hardware Description LED Indicators Ethernet WAN Port Ethernet LAN Ports Power Connector Reset Button WPS Button NETWORK PLANNING Internet Gateway Router LAN Access Point Wireless Bridge
100. t can include spaces or Hexadecimal format Range 8 63 ASCII characters or exactly 64 Hexadecimal digits Key Renewal Interval Sets the time period for automatically changing data encryption keys and redistributing them to all connected clients Default 3600 seconds WPA ENTERPRISE Wi Fi Protected Access WPA was introduced as an interim solution for the Mope vulnerability of WEP pending the adoption of a more robust wireless security standard WPA2 includes the complete wireless security standard but also offers backward compatibility with WPA Both WPA and WPA2 provide an enterprise and personal mode of operation For enterprise deployment WPA and WPA2 use IEEE 802 1X for user authentication and require a RADIUS authentication server to be configured on the wired network Data encryption keys are automatically generated and distributed to all clients connected to the network 72 CHAPTER 7 Wireless Configuration WLAN Security Figure 33 Security Mode WPA security Mode WPA WFA Algorithms CTKIP AES CITKIPAES Key Renewal Interval 3600 seconds FMK Cache Period 10 minute Pre Authentication Disable Enable IP Address Port shared Secret session Timeout Idle Timeout Security Mode Configures the WPA and WPAZ2 security modes used by clients When using WPA or WPA2 be sure there is a RADIUS server in the connected wired network and that the RADIUS settings are configu
101. terception and evesdropping A popular local area data communications network which accepts transmission from computers and terminals File Transfer Protocol A TCP IP protocol used for file transfer Hypertext Transfer Protocol HTTP is a standard used to transmit and receive all data over the World Wide Web A wireless standard that supports wireless communications in the 2 4 GHz band using Direct Sequence Spread Spectrum DSSS The standard provides for data rates of 1 2 5 5 and 11 Mbps A wireless standard that supports wireless communications in the 2 4 GHz band using Orthogonal Frequency Division Multiplexing OFDM The standard provides for data rates of 6 9 12 18 24 36 48 54 Mbps IEEE 802 11g is also backward compatible with IEEE 802 11b An integrated wireless and wired LAN is called an infrastructure configuration Local Area Network A group of interconnected computers and support devices The physical layer address used to uniquely identify network nodes Network Time Protocol NTP provides the mechanisms to synchronize time across the network The time servers operate in a hierarchical master Slave configuration in order to synchronize local clocks within the subnet and to national time standards via wire or radio A security option which broadcasts a beacon signal including the access point s configured SSID Wireless clients can read the SSID from the 124 ODFM SSID SESSION KEY SHARED
102. the WDS network Figure 42 shows the basic configuration required on each unit in the WDS network Figure 41 Manual WDS MAC Address Configuration Internet Service Provider AS es Cable DSL ee i WDS Link gt Modem Na lt T call ol z7 Sly E We Ds y MAC 00 22 2D 62 EA 44 7 k MAC 00 22 2D 62 EA 11 5N a on ee z WDS MAC List 5 pi 00 22 2D 62 EA 22 k s 00 22 2D 62 EA 33 00 22 2D 62 EA 44 MAC 00 22 2D 62 EA 22 WDS MAC List 00 22 2D 62 EA 11 Se MAC 00 22 2D 62 EA 33 WDS MAC List 00 22 2D 62 EA 11 64 CHAPTER 7 Wireless Configuration Wireless Distribution System WDS Figure 42 WDS Configuration Example Internet Service Provider Be Se Cable DSL WDS Link ee gt Modem q 7 S B wk o va ols WPS s l Operation Mode Gateway i h k Operation Mode Gateway 1 E ang ae a a e ee LAN IP Address 192 168 2 4 ae DHCP Server Enable ress 100 2 LAN IP Address 192 168 2 1 Operation Mode Bridge WDS Mode Repeater _ _ _ lt Operation Mode Bridge DHCP Server Disable a a i ee WDS Mode Lazy LAN IP Address 192 168 2 2 DHCP Server Disable LAN IP Address 192 168 2 3 A WDS link between two units can be configured in any of the following Operation Mode combinations 1 Both units in a link are configured as Gateway Mode 2 One unit in a link is configured in Gateway Mode and the other in Br
103. ther the unit is in Gateway or Bridge Mode See Operation Mode on page 54 53 CHAPTER 5 Operation Mode Operation Mode OPERATION MODE The Operation Mode Configuration page allows you to set up the mode Suitable for your network environment Figure 22 Operation Mode Gateway Operation Mode The Operation Mode Configuration section allows you to select Bridge or Gateway mode as suited to your network environment Operation Mode Configuration Operation Mode Connects a wired LAN and wireless clients to an Internet access device such as a cable or DSL modem Bridge Mode An access point mode that extends a wired LAN to wireless clients Gateway Mode Normal gateway mode that connects a wired LAN and wireless clients to an Internet access device such as a cable or DSL modem This is the factory set default mode 54 WAN SETTING DHCP INTERNET SETTINGS The Internet Settings pages allow you to manage basic system configuration settings It includes the following sections WAN Setting on page 55 DHCP on page 55 Static IP on page 57 PPPOE on page 58 PPTP on page 59 LAN Setting on page 61 Advanced Routing on page 63 Note In Bridge mode the Wireless Broadband Router s Internet Settings options are significantly reduced with only LAN Settings and the Client List being available to the user The WAN Setting p
104. time 20 microseconds is required if the access point has to support 802 11b clients Default Enabled TX Burst A performance enhancement that transmits a number of data packets at the same time when the feature is Supported by compatible clients Default Enabled 80 CHAPTER 7 Wireless Configuration Advanced Settings Packet Aggregate A performance enhancement that combines data packets together when the feature is supported by compatible clients Default Enabled WI FI MULTIMEDIA The Wireless Broadband Router implements Quality of Service QoS using the Wi Fi Multimedia WMM standard Using WMM the access point is able to prioritize traffic and optimize performance when multiple applications compete for wireless network bandwidth at the same time WMM employs techniques that are a subset of the developing IEEE 802 11e QoS standard and it enables access points to interoperate with both WMM enabled clients and other devices that may lack any WMM functionality WMM defines four access categories ACs voice video best effort and background These categories correspond to traffic priority levels and are mapped to IEEE 802 1D priority tags see Table 3 The direct mapping of the four ACs to 802 1D priorities is specifically intended to facilitate interoperability with other wired network QoS policies While the four ACs are specified for specific types of traffic WMM allows the priority levels to be configured
105. tion prior to the sending station starting communications The access point sends RTS frames to a receiving station to negotiate the sending of a data frame After receiving an RTS frame the station sends a CTS clear to send frame to notify the sending station that it can start sending data If the RTS threshold is set to 0 the access point always sends RTS Signals If set to 2347 the access point never sends RTS signals If set to any other value and the packet size equals or exceeds the RTS threshold the RTS CTS Request to Send Clear to Send mechanism will be enabled The access points contending for the medium may not be aware of each other The RTS CTS mechanism can solve this Hidden Node Problem Range 1 2347 bytes Default 2347 bytes Short Preamble Sets the length of the signal preamble that is used at the start of a data transmission Use a short preamble 96 microseconds to increase data throughput when it is supported by all connected 802 11g clients Use a long preamble 192 microseconds to ensure all 802 11b clients can connect to the network Default Disabled Short Slot Sets the basic unit of time the access point uses for calculating waiting times before data is transmitted A short slot time 9 microseconds can increase data throughput on the access point but requires that all clients can support a short slot time that is 802 11g compliant clients must support a short slot time A long slot
106. tiplies the number of Access Points present within the RF footprint of a single physical access device With Virtual AP technology WLAN users within the device s footprint can associate with what appears to be different access points and their associated network services All the services are delivered using a single radio channel enabling Virtual AP technology to optimize the use of limited WLAN radio spectrum WPA employs 802 1X as its basic framework for user authentication and dynamic key management to provide an enhanced security solution for 802 11 wireless networks 125 GLOSSARY WEP WPA PSK Wired Equivalent Privacy WEP is based on the use of security keys and the popular RC4 encryption algorithm Wireless devices without a valid WEP key will be excluded from network traffic WPA Pre shared Key WPA PSK can be used for small office networks with a limited number of users that may not need a high level of security WPA PSK provides a simple security implementation that uses just a pre shared password for network access 126 SIMIC Networks SMCWBR14S N4
107. tting allows you to manually change the MAC address of the Wireless Broadband Router s WAN interface to match the PC s MAC address provided to your ISP for registration You can enter the registered MAC address manually by typing it in the boxes provided Otherwise connect only the PC with the registered MAC 44 CHAPTER 4 Initial Configuration Setup Wizard address to the Wireless Broadband Router then click the Clone your PC s MAC Address Default Disable STEP 3 WAN Enables the Point to Point Tunneling Protocol PPTP for implementing SETTINGS PPTP virtual private networks The service is provided in many European countries Figure 18 Wizard Step 3 WAN Settings PPTP Setup Wizard E i Sener IP User Name Address Mode F Address Subnet Mask 255 255 255 0 Default Gateway 92 168 1 25 Keep Alive Mode Redial Period senconds DNS Setting Option MAC Clone Operation Mode The following items are displayed on this page Server IP Sets the PPTP server IP Address Default pptp_server User Name Sets the PPTP user name for the WAN port Default pptp_user Range 1 32 characters Password Sets a PPTP password for the WAN port Default pptp_password Range 1 32 characters Verify Password Prompts you to re enter your chosen password Address Mode Sets a PPTP network mode Default Static IP Address Sets the static IP address Default 0 0 0 0 available
108. ttings 11g only Both 802 11g and 802 11n clients will be able to communicate with the Wireless Broadband Router but the 802 11n clients will be limited to 802 11g protocols and data transmission rates up to 54 Mbps Any 802 11b clients will not be able to communicate with the Wireless Broadband Router 11in only Only 802 11n clients will be able to communicate with the Wireless Broadband Router up to 150 Mbps 11g n mixed Both 802 11g and 802 11n clients can communicate with the Wireless Broadband Router up to 150 Mbps but data transmission rates may be slowed to compensate for 802 11g clients 11b g n Mixed All 802 11b g n clients can communicate with the Wireless Broadband Router up to 150 Mbps but data transmission rates may be slowed to compensate for 802 11b g clients Frequency Channel The radio channel that the Wireless Broadband Router uses to communicate with wireless clients When multiple access points are deployed in the same area set the channel on neighboring access points at least five channels apart to avoid interference with each other For example you can deploy up to three access points in the same area using channels 1 6 11 Note that wireless clients automatically set the channel to the same as that used by the Wireless Broadband Router to which it is linked Selecting Auto Select enables the Wireless Broadband Router to automatically select an unoccupied radio channel Default AutoSelect
109. urs Specify the interval between SNTP server updates 41 CHAPTER 4 Initial Configuration Setup Wizard STEP 3 WAN The Step 3 page of the Wizard specifies the Internet connection SETTINGS DHCP parameters for the Wireless Broadband Router s WAN port Click Next after completing the setup By default the access point WAN port is configured with DHCP enabled The options are Static IP DHCP cable modem PPPoE ADSL and PPTP Each option changes the parameters that are displayed on the page Figure 15 Wizard Step 3 WAN Settings DHCP This section allows you to configure the connection type and other related WAN parameters suitable to your environment WAN Connection Type DHCP Auto config DHCP Mode Hostname SMCWBR14S N4 DNS Setting Option Primary DNS Server Secondary DNS Server MAC Clone Enabled Disable The following items are displayed on this page WAN Connection Type Select the connection type for the WAN port from the drop down list Default DHCP Hostname Specifies the host name of the DHCP client Default SMCWBR14S N4 Primary DNS Server The IP address of the Primary Domain Name Server A DNS maps numerical IP addresses to domain names and can be used to identify network hosts by familiar names instead of the IP addresses To specify a DNS server type the IP addresses in the text field provided
110. uter IP address to be assigned automatically from an Internet service provider ISP through an ADSL modem using Point to Point Protocol over Ethernet PPPoE Figure 25 PPPoE Configuration Wide Area Network WAN Settings This section allows you to configure the connection type and other related WAN parameters suitable to your environment WAN Connection Type PPPoE ADSL yt PPPoEMode Verify Password KeepAlive Operation Mode Keep Alive Mode Redial Period senconds Qn demand Mode Idle Time minutes MAC Clone En abled MAC Address Filly MAC PPPoE User Name Sets the PPPoE user name for the WAN port Default pppoe_user Range 1 32 characters PPPoE Password Sets a PPPoE password for the WAN port Default pppoe_password Range 1 32 characters Verify Password Prompts you to re enter your chosen password Operation Mode Selects the operation mode as Keep Alive On Demand or Manual Default Keep Alive Keep Alive Mode The Wireless Broadband Router will periodically check your Internet connection and automatically re establish your connection when disconnected Default 60 seconds 58 CHAPTER 6 Internet Settings WAN Setting u On Demand Mode The maximum length of inactive time the unit will stay connected to the DSL service provider before disconnecting Default 5 minutes MAC Clone Some ISPs limit Internet connections to a specified MAC address of one PC This
111. will not be allowed to associate with the access point Default Enabled APSD When WMM is enabled Automatic Power Save Delivery APSD can also be enabled APSD is an efficient power management method that enables client devices sending WMM packets to enter a low power sleep state between receiving and transmitting data Default Disabled WMM Parameters Click the WMM Configuration button to set detailed WMM parameters Figure 39 WMM Configuration WMM Parameters of Access Point Aifsn CWMin CWM Txop ACM AckPolicy AC_BE 3 L AC_BK LJ AC_VI oO d AC_VO WMM Parameters of Station _ Alfsn CWMin CVV Max Txop ACM o o o E Ty sa a o ay pa e o The following items are displayed in the WMM Configuration window AIFSN Arbitration Inter Frame Space The minimum amount of wait time before the next data transmission attempt Specify the AIFS value in the range 0 15 microseconds e CWMin Minimum Contention Window The initial upper limit of the random backoff wait time before wireless medium access can be attempted The initial wait time is a random value between zero and 29 CHAPTER 7 Wireless Configuration Advanced Settings the CWMin value Specify the CWMin value in the range 0 15 microseconds Note that the CWMin value must be equal or less than the CWMax value CWMax Maximum Contention Window The maximum upper limit of the random backoff wait time bef
112. wireless network is defined by its Service Set Identifier SSID or network name Wireless clients that want to connect to a network must set their SSID to the same SSID of the network service 30 CHAPTER 2 Network Planning Wireless Bridge Figure 5 Operating as an Access Point JS b Server n pi IP 192 168 2 x N Desktop A IP 192 168 2 x Notebook PC IP 192 168 2 x Wireless AP Router _ 2 WIRELESS BRIDGE The IEEE 802 11 standard defines a Wireless Distribution System WDS for bridge connections between access points The Wireless Broadband Router can use WDS to forward traffic on links between units Up to four WDS links can be specified for the Wireless Broadband Router The WDS feature enables two basic functions to be configured in the wireless network Either a repeater function that extends the range of the wireless network or a bridge function that connects a remote LAN segment to an Internet connection Figure 6 Operating as a Wireless Bridge Internet Service Provider AU aAA o Cables ER 7 WDS L Link 2 Modem _ q z a Gateway Router Gateway Router Bridge Mode Se Gateway Mode gt gt 5 7 Q Desktop PCs T i e PCs nwr _ aad gi CHAPTER 2 Network Planning Wireless Bridge Figure 7 Operating as a Wireless Repeater Internet Service Provider AU wee ee ee ee eee e
113. wires to the pins Figure 60 RJ 45 Connector 116 APPENDIX C Cables and Pinouts 10 100BASE TX Pin Assignments 10 100BASE TX PIN ASSIGNMENTS Use unshielded twisted pair UTP or shielded twisted pair STP cable for RJ 45 connections 100 ohm Category 3 or better cable for 10 Mbps connections Also be sure that the length of any twisted pair connection does not exceed 100 meters 328 feet The RJ 45 port on the access point supports automatic MDI MDI X operation so you can use straight through or crossover cables for all network connections to PCs switches or hubs In straight through cable pins 1 2 3 and 6 at one end of the cable are connected straight through to pins 1 2 3 and 6 at the other end of the cable Table 5 10 100BASE TX MDI and MDI X Port Pinouts PIN MDI Signal Name MDI X Signal Name 1 Transmit Data plus TD Receive Data plus RD 2 Transmit Data minus TD Receive Data minus RD 3 Receive Data plus RD Transmit Data plus TD 6 Receive Data minus RD Transmit Data minus TD 4 5 7 8 Not used Not used a The and signs represent the polarity of the wires that make up each wire pair STRAIGHT THROUGH WIRING If the twisted pair cable is to join two ports and only one of the ports has an internal crossover MDI X the two pairs of wires must be straight through When auto negotiation is enabled for any RJ 45 port on this Switch you can use either stra
114. y in other circumstances It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims this section has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system it is up to the author donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice 12L APPENDIX D License Information The GNU General Public License 10 11 This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License If the distribution and or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries so that distribution is permitted only in or among countries not thus excluded In such case this License incorporates the limitation as if written in the body of this License The Free Software Foundation may publish revised and or new versions of the General Public License from time to time Such new versions will be similar in s
115. ystem Security on page 96 Content Filtering on page 97 MAC IP PORT FILTERING MAC IP Port filtering restricts connection parameters to limit the risk of intrusion and defends against a wide array of common hacker attacks MAC IP Port filtering allows the unit to permit deny or proxy traffic through its MAC addresses IP addresses and ports The Wireless Broadband Router allows you define a sequential list of permit or deny filtering rules up to 32 This device tests ingress packets against the filter rules one by one A packet will be accepted as soon as it matches a permit rule or dropped as soon as it matches a deny rule If no rules match the packet is either accepted or dropped depending on the default policy setting s Gi CHAPTER 8 Firewall Configuration MAC IP Port Filtering Figure 47 MAC IP Port Filtering MAC P Port Filtering Settings This section allows you to configure the firewall to filter based on MAC IP or portto protect your network from viruses and other malicious activity on the Internet Basic Settings MACIP Port Filtering Default Policy Describes how packets not matching any rules will be handled Dropped MACIP Port Filter Settings WAC address The maximum rule countis 32 Current MACIPPort filtering rules in system No MAC address DIP SIP Protocol DPR SPR Action Comment Others would be dropped Delete Selected Reset MAC IP Port Filtering Enable
Download Pdf Manuals
Related Search
Related Contents
Cables Direct AD-121 LA400DC Owner`s Manual OM, 324 L X-series, 324 LD X-series, 2008-04 CASPER Provider User`s Guide Manual del Usuario Versión 1.00 (2012/08/15 – 16:33) Epson B-500DN Network Installation Guide 1 Au Chef de file du Projet ART2 Chambre de Commerce et d V7 Laser Toner for select HP and CANON printer - replaces C4092A QNAP SS-EC1279U-SAS-RP storage server INV10120700 / INV20120700 / INV30120700 Copyright © All rights reserved.
Failed to retrieve file