SMC Networks EZ Connect SMCWEB-N User Manual

SMC Networks EZ Connect SMCWEB-N User Manual

N draft 11n wireless access point/ethernet client
Hide thumbs Also See for EZ Connect SMCWEB-N:

Advertisement

EZ Connect N
Draft 11n Wireless Access Point/Ethernet Client
SMCWEB-N

Advertisement

Table of Contents
loading

Summary of Contents for SMC Networks EZ Connect SMCWEB-N

  • Page 1 EZ Connect N Draft 11n Wireless Access Point/Ethernet Client SMCWEB-N...
  • Page 2 The Limited Lifetime warranty covers a product during the Life of that Product, which is defined as the period of time during which the product is an “Active” SMC product. A product is considered to be “Active” while it is listed on the current SMC price list. As new technologies emerge, older technologies become obsolete and SMC will, at its discretion, replace an older product in its product line with one that incorporates these newer technologies.
  • Page 3 SALE, INSTALLATION, MAINTENANCE, USE, PERFORMANCE, FAILURE, OR INTERRUPTION OF ITS PRODUCTS, EVEN IF SMC OR ITS AUTHORIZED RESELLER HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OF IMPLIED WARRANTIES OR THE LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES FOR CONSUMER PRODUCTS, SO THE ABOVE LIMITATIONS AND EXCLUSIONS MAY NOT APPLY TO YOU.
  • Page 4 • EN 301 489-17 • EN 60950-1 A copy of the CE Declaration of Conformity is available for download at: http://www.smc.com Intended for indoor use in the following countries: AT, BE, CZ, CY, DK, EE, FI, FR, DE, GR, HU, IS, IE, IT, LV, LT, LU, MT, NL, NO, PL, PT, SI, SK, ES,...
  • Page 5: Table Of Contents

    Table of Contents Getting Started with the SMCWEB-N Package Contents Minimum System Requirements Wireless LAN Networking Introduction Features Hardware Overview Back/Side Panel Front Panel LED’s Installation Considerations Getting Started Using the Configuration Menu in AP Mode Basic Advanced Tools Status Using the Configuration Menu in Client Mode Basic Advanced...
  • Page 6: Getting Started With The Smcweb-N

    Getting Started with the SMCWEB-N Congratulations on purchasing the SMCWEB-N! This manual provides information for setting up and configuring the SMCWEB-N. This manual is intended for both home users and professionals. Package Contents • EZ Connect™ N Wireless Access Point/Ethernet Client (SMCWEB-N) •...
  • Page 7: Wireless Lan Networking

    Wireless LAN Networking The following figure provides an example of a wireless network with an AP. The wireless network is the part in the blue circle. In this wireless network, devices A and B are called wireless client. The wireless clients use the access point (AP) to interact with other devices (such as the printer) or with Internet.
  • Page 8: Introduction

    Finally, configuration is made simple and straightforward with the Installation Wizard, intuitive web-based management interface and slide switch for easily selecting operating mode. Features Wi-Fi Compliant with IEEE 802.11n (draft) and IEEEE 802.11b/g Standards 2.412 to 2.462GHz frequency band operation...
  • Page 9: Hardware Overview

    WPS button for 4 seconds. When a client joins the network successfully the LED will stop blinking and become solid until the next WPS action or the device is rebooted. If no client joins the LED will stop blinking and switch off after 4 minutes.
  • Page 10: Front Panel Led's

    After pressing the WPS button for 4 seconds the WPS LED will blink continually. When a client joins the network successfully the LED will stop blinking and become solid until the next WPS action or the device is rebooted. If no client joins the LED will stop blinking and switch off after 4 minutes.
  • Page 11: Installation Considerations

    Getting Started For a typical wireless setup please do the following: 1. Select desired operation mode using the slide switch on the back panel. AP mode configures the SMCWEB-N to function as a wireless access point. Client mode configures the SMCWEB-N to function as an Ethernet to wireless bridge. Client mode is used for connecting Ethernet devices such as a game console, digital media player or Network Attached Storage.
  • Page 12: Using The Configuration Menu In Ap Mode

    Using the Configuration Menu in AP Mode Whenever you want to configure your SMCWEB-N, you can access the Configuration Menu through your PC by opening the Web-browser and typing in the IP Address of the SMCWEB-N. The SMCWEB-N’s default IP Address is http://192.168.2.2. Open the Web browser.
  • Page 13: Basic

    Basic The Basic tab provides the following configuration options: Wireless Settings and Network Settings. Basic_ Wireless Settings The wireless section is used to configure the wireless settings for your access point. Note that changes made in this section may also need to be duplicated on wireless clients that you want to connect to your wireless network.
  • Page 14 Enable Wireless This option turns off and on the wireless connection feature of the access point. When you set this option, the following parameters are in effect. Wireless Network Name When you are browsing for available wireless networks, this is the name that will appear in the list (unless Visibility Status is set to invisible, see below).
  • Page 15 Example: 64-bit hexadecimal keys are exactly 10 characters in length. (12345678FA is a valid string of 10 characters for 64-bit encryption.) 128-bit hexadecimal keys are exactly 26 characters in length. (456FBCDF123400122225271730 is a valid string of 26 characters for 128-bit encryption.) 64-bit ASCII keys are up to 5 characters in length (DMODE is a valid string of 5 characters for 64-bit encryption.) 128-bit ASCII keys are up to 13 characters in length (2002HALOSWIN1 is a valid string of 13 characters for...
  • Page 16 Optional Backup RADIUS Server This option enables configuration of an optional second RADIUS server. A second RADIUS server can be used as backup for the primary RADIUS server. The second RADIUS server is consulted only when the primary server is not available or not responding. The fields Second RADIUS Server IP Address, RADIUS Server Port, Second RADIUS server Shared Secret, Second MAC Address Authentication provide the corresponding parameters for the second RADIUS Server...
  • Page 17 Basic_Network Settings Access Point Settings These are the settings of the LAN (Local Area Network) interface for the access point. The access point's local network (LAN) settings are configured based on the IP Address and Subnet Mask assigned in this section. The IP address is also used to access this Web-based management interface.
  • Page 18 DHCP Server Settings DHCP stands for Dynamic Host Configuration Protocol. The DHCP section is where you configure the built-in DHCP Server to assign IP addresses to the computers and other devices on your local area network (LAN). Enable DHCP Server Once your access point is properly configured and this option is enabled, the DHCP Server will manage the IP addresses and other network configuration information for computers and other devices connected to your Local Area Network.
  • Page 19 Primary WINS Server IP address Configure the IP address of the preferred WINS server. WINS Servers store information regarding network hosts, allowing hosts to 'register' themselves as well as discover other available hosts, e.g. for use in Network Neighbourhood. Secondary WINS Server IP address Configure the IP address of the backup WINS server, if any.
  • Page 20 Go to your Start menu, select Programs, select Accessories, and select Command Windows 2000 Prompt. At the command prompt type Windows XP address displayed for the adapter connecting to the access point is the MAC address. Go to the Apple Menu, select System Preferences, select Network, and select the Mac OS X Ethernet Adapter connecting to the access point.
  • Page 21: Advanced

    Advanced The Advanced tab provides the following configuration options: MAC Address Filter, Advanced Wireless, WISH, Wi-Fi Protected Setup Advanced_ MAC Address Filter The MAC address filter section can be used to filter network access by machines based on the unique MAC addresses of their network adapter(s).
  • Page 22 Advanced_Advanced Wireless Transmit Power Normally the wireless transmitter operates at 100% power. In some circumstances, however, there might be a need to isolate specific frequencies to a smaller area. By reducing the power of the radio, you can prevent transmissions from reaching beyond your corporate/home office or designated wireless area. Beacon Period Beacons are packets sent by a wireless access point to synchronize wireless devices.
  • Page 23 DTIM Interval A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast messages. When the wireless access point has buffered broadcast or multicast messages for associated clients, it sends the next DTIM with a DTIM Interval value. Wireless clients detect the beacons and awaken to receive the broadcast and multicast messages.
  • Page 24 Advanced_ WISH WISH is short for Wireless Intelligent Stream Handling, a technology developed to enhance your experience of using a wireless network by prioritizing the traffic of different applications. WISH Enable WISH Enable this option if you want to allow WISH to prioritize your traffic.
  • Page 25 Priority Classifiers HTTP Allows the access point to recognize HTTP transfers for many common audio and video streams and prioritize them above other traffic. Such streams are frequently used by digital media players. Windows Media Center Enables the access point to recognize certain audio and video streams generated by a Windows Media Center PC and to prioritize these above other traffic.
  • Page 26 Save/Update Record the changes you have made into the following list. Clear Re-initialize this area of the screen, discarding any changes you have made. WISH Rules This section lists the defined WISH Rules. Click the Enable checkbox at the left to directly activate or de-activate the entry.
  • Page 27 Advanced_ Wi-Fi Protected Setup Wi-Fi Protected Setup Enable Enable the Wi-Fi Protected Setup feature. Lock Wireless Security Settings Locking the wireless security settings prevents the settings from being changed by any new external registrar using its PIN. Devices can still be added to the wireless network using Wi-Fi Protected Setup. It is still possible to change wireless network settings with Wizard, or an existing external WLAN Manager Registrar.
  • Page 28 Current PIN Shows the current value of the access point's PIN. Reset PIN to Default Restore the default PIN of the access point. Generate New PIN Create a random number that is a valid PIN. This becomes the access point's PIN. You can then copy this PIN to the user interface of the registrar.
  • Page 29: Tools

    Tools The Tools tab provides the following configuration options: Admin, Time, System, Firmware Tools_Admin The Admin option is used to set a password for access to the Web-based management. By default there is no password configured. It is highly recommended that you create a password to keep your new access point secure.
  • Page 30 Inactivity Time Out If the router does not detect any administrative activity during this number of minutes, it logs the adminstrator off. Admin Password Enter a password for the user "admin", who will have full access to the Web-based management interface. User Password Enter a password for the user "user", who will have read-only access to the Web-based management interface.
  • Page 31 Time Configuration Current Time Displays the time currently maintained by the access point. If this is not correct, use the following options to configure the time correctly. Time Zone Select your local time zone from pull down menu. Enable Daylight Saving Check this option if your location observes daylight saving time.
  • Page 32 Tools_System This section allows you to manage the access point's configuration settings, reboot the access point, and restore the access point to the factory default settings. Restoring the unit to the factory default settings will erase all settings, including any rules that you've created. Save To Local Hard Drive This option allows you to save the access point's configuration to a file on your computer.
  • Page 33 Tools_Firmware Use the Firmware section to install the latest firmware to improve functionality and performance. To upgrade the firmware, follow these steps: Click the button to locate the upgrade file on your computer. Browse Once you have found the file to be used, click the This can take a minute or more.
  • Page 34: Status

    Status The Status tab provides the following configuration options: Device Info, Wireless, Logs, Statistics and WISH Sessions. Status_Device info All of your network connection details are displayed on the Device Info page. The firmware version is also displayed here.
  • Page 35 Wireless LAN This area of the screen reflects configuration settings from the Advanced → WISH page. The MAC Address is the factory-assigned identifier of the wireless card. LAN Computers This area of the screen continually updates to show all DHCP enabled computers and devices connected to the LAN side of your access point.
  • Page 36 Status_Wireless The wireless section allows you to view the wireless clients that are connected to your wireless access point. MAC Address The Ethernet ID (MAC address) of the wireless client. IP Address The LAN-side IP address of the client. Mode The transmission standard being used by the client.
  • Page 37 Status_Logs The access point automatically logs (records) events of possible interest in its internal memory. If there is not enough internal memory for all events, logs of older events are deleted, but logs of the latest events are retained. The Logs option allows you to define the level of events to view.
  • Page 38 Refresh Clicking this button refreshes the display of log entries. There may be new events since the last time you accessed the log. Clear Clicking this button erases all log entries. Save Log Select this option to save the access point log to a file on your computer. Status_Statistics The Statistics page displays all of the LAN, WAN, and Wireless packet transmit and receive statistics.
  • Page 39 TX Packets Dropped The number of packets that were dropped while being sent, due to errors, collisions, or access point resource limitations. RX Packets Dropped The number of packets that were dropped while being received, due to errors, collisions, or access point resource limitations.
  • Page 40 State State for sessions that use the TCP protocol. • NO: None -- This entry is used as a placeholder for a future connection that may occur. • SS: SYN Sent -- One of the systems is attempting to start a connection. •...
  • Page 41: Using The Configuration Menu In Client Mode

    Using the Configuration Menu in Client Mode Whenever you want to configure your SMCWEB-N, you can access the Configuration Menu through your PC by opening the Web-browser and typing in the IP Address of the SMCWEB-N. The SMCWEB-N’s default IP Address is http://192.168.2.2. Open the Web browser.
  • Page 42: Basic

    Basic The Basic tab provides the following configuration options: Wizard, Wireless, Network Settings Basic_Wizard If you want to connect a new wireless network, click on and the bridge will guide you through a few steps to Setup Wizard get your network up and running.
  • Page 43 Basic_ Wireless The wireless section is used to configure the wireless settings for your bridge. Note that some options in this section must agree with options selected for your wireless access point or wireless router. To protect your privacy, use the wireless security mode to configure the wireless security features. This device supports three wireless security modes including: WEP, WPA-Personal, and WPA-Enterprise.
  • Page 44 Enable Wireless This option turns off and on the wireless connection feature of the bridge. When you set this option, the following parameters are in effect. Wireless Network Name This is the name of the wireless access point that this station will associate to. Leave this field blank to associate to any access point.
  • Page 45 64-bit ASCII keys are up to 5 characters in length (DMODE is a valid string of 5 characters for 64-bit encryption.) 128-bit ASCII keys are up to 13 characters in length (2002HALOSWIN1 is a valid string of 13 characters for 128-bit encryption.) Note that, if you enter fewer characters in the WEP key than required, the remainder of the key is automatically padded with zeros.
  • Page 46 EAP User Certificate: The user certificate file. It is mandatory for EAP-TLS, but optional for PEAP and EAP-TTLS. If it is not uploaded for PEAP and EAP-TTLS, the bridge may establish a relatively unsecure system. We support .p12 and .pfx formats with a maximum size of 8192 bytes. EAP Root Certificate: The root certificate file.
  • Page 47: Advanced

    Default Gateway This is the IP address of the gateway or router that connects you to the internet. Advanced The Advanced tab provides the following configuration options: Protected Setup Advanced_Advanced Wireless MAC Cloning Mode This feature controls the MAC Address of the Bridge as seen by other devices (wired or wireless). If set to Ethernet Client, the MAC Address from the first Ethernet client that transmits data through the Bridge will be used.
  • Page 48 Transmit Power Normally the wireless transmitter operates at 100% power. In some circumstances, however, there might be a need to isolate specific frequencies to a smaller area. By reducing the power of the radio, you can prevent transmissions from reaching beyond your corporate/home office or designated wireless area. RTS Threshold When an excessive number of wireless packet collisions are occurring, wireless performance can be improved by using the RTS/CTS (Request to Send/Clear to Send) handshake protocol.
  • Page 49 Advanced_Wish WISH is short for Wireless Intelligent Stream Handling, a technology developed to enhance your experience of using a wireless network by prioritizing the traffic of different applications. WISH Enable WISH Enable this option if you want to allow WISH to prioritize your traffic.
  • Page 50 Priority Classifiers HTTP Allows the router to recognize HTTP transfers for many common audio and video streams and prioritize them above other traffic. Such streams are frequently used by digital media players. Windows Media Center Enables the router to recognize certain audio and video streams generated by a Windows Media Center PC and to prioritize these above other traffic.
  • Page 51 Advanced_ Wi-Fi Protected Setup PIN Settings A PIN is a unique number that can be used to add the SMCWEB-N to an existing network or to create a new network. The default PIN is printed on the bottom of the unit. For extra security, a new PIN can be generated. You can restore the default PIN at any time.
  • Page 52 has an LED, and the LED will start flashing if the button is pressed. The LED on the router will turn solid ON if the device has been successfully added to the network. If something goes wrong during configuration, the flashing pattern of the LED changes.
  • Page 53: Tools

    Tools The Tools tab provides the following configuration options: Tools_Admin The Admin option is used to set a password for access to the Web-based management. By default there is no password configured. It is highly recommended that you create a password to keep your new bridge secure. Admin Password Enter a password for the user admin, who will have full access to the Web-based management interface.
  • Page 54 Bridge Name The name of the bridge can be changed here. Web Idle Timeout The maximum number of minutes that the web administration can be inactive before the administrator is automatically logged out. Tools_System This section allows you to manage the bridge's configuration settings, reboot the bridge, and restore the bridge to the factory default settings.
  • Page 55 Reboot The Device This restarts the bridge. Useful for restarting when you are not near the device. Tools_Firmware The Firmware section can be used to update to the latest firmware to improve functionality and performance. To upgrade the firmware, follow these steps: Click the Browse button to locate the upgrade file on your computer.
  • Page 56 Firmware Upgrade Note: Firmware upgrade cannot be performed from a wireless device. To perform an upgrade, ensure that you are using a PC that is connected to the bridge by wire. Note: Some firmware upgrades reset the configuration options to the factory defaults. Before performing an upgrade, be sure to save the current configuration from the Tools →...
  • Page 57: Status

    Status The Status tab provides the following configuration options: Device Info, Wireless, Logs, Statistics, WISH Sessions Status_Device Info All of your network connection details are displayed on the Device Info page. The firmware version is also displayed here.
  • Page 58 Status_Wireless The wireless section allows you to view all the access points that can be heard by your wireless bridge. MAC Address The Ethernet ID (MAC address) of the access point. SSID The network name that is used by this access point Channel The wireless channel that this access point is operating on.
  • Page 59 Status_Logs The bridge automatically logs (records) events of possible interest in its internal memory. If there is not enough internal memory for all events, logs of older events are deleted, but logs of the latest events are retained. The Logs option allows you to view the bridge logs.
  • Page 60 Apply Log Settings Now Click this button after changing Log Options to make them effective and permanent. Refresh Clicking this button refreshes the display of log entries. There may be new events since the last time you accessed the log. Clear Clicking this button erases all log entries.
  • Page 61 TX Packets Dropped The number of packets that were dropped while being sent, due to errors, collisions, or router resource limitations. RX Packets Dropped The number of packets that were dropped while being received, due to errors, collisions, or router resource limitations.
  • Page 62 Originator The IP address and, where appropriate, port number of the computer that originated a network connection. Target The IP address and, where appropriate, port number of the computer to which a network connection has been made. Protocol The communications protocol used for the conversation. State State for sessions that use the TCP protocol.
  • Page 63: Glossary

    Glossary 802.11 A family of specifications for wireless local area networks (WLANs) developed by a working group of the Institute of Electrical and Electronics Engineers (IEEE). Access Control List ACL. This is a database of network devices that are allowed to access resources on the network. Access Point AP.
  • Page 64 Authentication To provide credentials, like a Password, in order to verify that the person or device is really who they are claiming to be Automatic Private IP Addressing APIPA. An IP address that that a Windows computer will assign itself when it is configured to obtain an IP address automatically but no DHCP server is available on the network Backward Compatible The ability for new devices to communicate and interact with older legacy devices to guarantee interoperability...
  • Page 65 A newer version of the PC Card or PCMCIA interface. It supports a 32-bit data path, DMA, and consumes less voltage CAT 5 Category 5. Used for 10/100 Mbps or 1Gbps Ethernet connections Client A program or user that requests data from a server Collision When do two devices on the same Ethernet network try and transmit data at the exact same time.
  • Page 66 DMZ: A single computer or group of computers that can be accessed by both users on the Internet as well as users on the Local Network, but that is not protected by the same security as the Local Network. DHCP Dynamic Host Configuration Protocol: Used to automatically assign IP addresses from a predefined pool of addresses to computers or devices that request them Digital certificate:...
  • Page 67 Fiber optic A way of sending data through light impulses over glass or plastic wire or fiber File server A computer on a network that stores data so that the other computers on the network can all access it File sharing Allowing data from computers on a network to be accessed by other computers on the network with different levels of access rights Firewall...
  • Page 68 Transforming a string of characters into a shorter string with a predefined length Hexadecimal Characters 0-9 and A-F The action of data packets being transmitted from one router to another Host Computer on a network HTTP Hypertext Transfer Protocol is used to transfer files from HTTP servers (web servers) to HTTP clients (web browsers) HTTPS HTTP over SSL is used to encrypt and decrypt HTTP transmissions...
  • Page 69 An ISP provides access to the Internet to individuals or companies Intranet A private network Intrusion Detection A type of security that scans a network to detect attacks coming from inside and outside of the network Internet Protocol IP address A 32-bit number, when talking about Internet Protocol Version 4, that identifies each computer that transmits data on the Internet or on an Intranet IPsec...
  • Page 70 A group of computers in a building that usually access files from a server LPR/LPD "Line Printer Requestor"/"Line Printer Daemon". A TCP/IP protocol for transmitting streams of printer data. MAC address A unique hardware ID assigned to every Ethernet adapter by the manufacturer. Mbps Megabits per second Medium Dependent Interface is an Ethernet port for a connection to a straight-through cable...
  • Page 71 Network Layer The third layer of the OSI model which handles the routing of traffic on a network Network Time Protocol Used to synchronize the time of all the computers in a network Network Interface Card Network Time Protocol OFDM Orthogonal Frequency-Division Multiplexing is the modulation technique for both 802.11a and 802.11g Open Systems Interconnection is the reference model for how data should travel between two devices on a network...
  • Page 72 PPPoE Point-to-Point Protocol over Ethernet is used to connect multiple computers to a remote server over Ethernet PPTP Point-to-Point Tunneling Protocol is used for creating VPN tunnels over the Internet between two networks Preamble Used to synchronize communication timing between devices on a network Quality of Service RADIUS Remote Authentication Dial-In User Service allows for remote users to dial into a central server and be...
  • Page 73 Simple Mail Transfer Protocol Used for sending and receiving email Simple Network Management Protocol Governs the management and monitoring of network devices Session Initiation Protocol. A standard protocol for initiating a user session that involves multimedia content, such as voice or chat. SMTP Simple Mail Transfer Protocol SNMP...
  • Page 74 The amount of data that can be transferred in a given time period Traceroute A utility displays the routes between you computer and specific destination User Datagram Protocol Unicast Communication between a single sender and receiver Universal Plug and Play A standard that allows network devices to discover each other and configure themselves to be a part of the network Upgrade...
  • Page 75 Wide Area Network Windows Connect Now. A Microsoft method for configuring and bootstrapping wireless networking hardware (access points) and wireless clients, including PCs and other devices. Wireless Distribution System. A system that enables the interconnection of access points wirelessly. Web browser A utility that allows you to view content and interact with all of the information on the World Wide Web Wired Equivalent Privacy is security for wireless networks that is supposed to be comparable to that of a wired network...
  • Page 76 SMCWEB-N SMCWBR11-G...

This manual is also suitable for:

Web-n

Table of Contents