SMC Networks WGBR14-N - annexe 1 Manual

Draft 11n wireless 4-port gigabit broadband router

Advertisement

Quick Links

Barricade™ N
Draft 11n Wireless 4-port Gigabit Broadband Router
SMCWGBR14-N

Advertisement

Table of Contents
loading

Summary of Contents for SMC Networks WGBR14-N - annexe 1

  • Page 1 Barricade™ N Draft 11n Wireless 4-port Gigabit Broadband Router SMCWGBR14-N...
  • Page 2 SMC price list. As new technologies emerge, older technologies become obsolete and SMC will, at its discretion, replace an older product in its product line with one that incorporates these newer technologies. At that point, the obsolete product is discontinued and is no longer an “Active”...
  • Page 3 RIGHTS, WHICH MAY VARY FROM STATE TO STATE. NOTHING IN THIS WARRANTY SHALL BE TAKEN TO AFFECT YOUR STATUTORY RIGHTS. * SMC will provide warranty service for one year following discontinuance from the active SMC price list. Under the limited lifetime warranty, internal and external power supplies, fans, and cables are covered by a standard one-year warranty from date of purchase.
  • Page 4 Compliances Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
  • Page 5 Directive 1999/5/EC. The official EC-Declaration of Conformity can be found under the corresponding product section on the web http://www.smc.com. [Spanish] Por medio de la presente SMC Networks declara que el Radio LAN device cumple con...
  • Page 6 Produits. [Italian] Con la presente SMC Networks dichiara che questo Radio LAN device è conforme ai requisiti essenziali ed alle altre disposizioni pertinenti stabilite dalla direttiva 1999/5/CE. La Dichiarazione di conformità CE ufficiale è disponibile nella sezione dedicata al rispettivo prodotto sul sito Web http://www.smc.com.
  • Page 7 [Icelandic] Hér með lýsir SMC Networks því yfir að þessi Radio LAN búnaður er í samræmi við grunnkröfur og aðrar viðeigandi kröfur, sem gerðar eru í tilskipun 1999/5/EB. Opinberu EB-samræmisyfirlýsinguna er að finna í viðeigandi hluta um þennan búnað á vefsetrinu http://www.smc.com.
  • Page 8 IJsland, Italië, Luxemburg, Nederland, Noorwegen,Oostenrijk, Portugal, Spanje , Verenigd Koninkrijk, Zweden, Zwitserland. Benodigdheden voor gebruik buiten, zoals gebruiksvergunningen en toegelaten werkkanalen zijn van toepassing in sommige landen. Gelieve uw lokale instantie of SMC Networks te contacteren voor details op huidige beperkingen voor gebruik in buitenlucht. [Spanish] Este aparato es un transmisor inalámbrico de 2.4 GHz, previsto para el uso interior en...
  • Page 9 Ελβετία, Ηνωµένο Βασίλειο, Πορτογαλία, Ελλάδα, Ιρλανδία, Ισλανδία. Σε ορισµένες χώρες επιβάλλονται απαιτήσεις για χρήση σε εξωτερικό χώρο, όπως απαιτήσεις παραχώρησης άδειας και επιτρεπόµενα κανάλια λειτουργίας. Απευθυνθείτε στην τοπική αρµόδια αρχή ή στην SMC Networks για λεπτοµέρειες σχετικά µε τους τρέχοντες περιορισµούς για χρήση σε εξωτερικό χώρο. [Italian] Il presente device è...
  • Page 10 In-Norveġja, Spanja, L-Iżveżja, L-Iżvizzera, Ir-Renju Unit, Il-Portugal, Il-Greċja, L-Irlanda, L-Islanda. Rekwiżiti għal tħaddim fuq barra, bħal ħtiġijiet ta’ liċenzja u kanali permessi għal tħaddim japplikaw f’ċertu pajjiżi. Jekk jogħġbok ikkuntattja lill-awtorità regolarorja lokali jew SMC Networks għal dettalji dwar restrizzjonijiet attwali dwar l-użu fuq barra. [Hungarian] Ez az eszköz egy 2,4 GHz-es vezeték nélküli LAN adó-vevő, amely beltéri és irodai...
  • Page 11 Švedska, Švica, Velika Britanija, Portugalska, Grčija, Irska, Islandija. V nekaterih državah veljajo zahteve za delovanje na prostem, kot so zahteve za dovoljenje in dovoljeni kanali za delovanje. Če potrebujete natančne informacije o trenutnih omejitvah uporabe na prostem, se obrnite na lokalni regulativni organ ali družbo SMC Networks. [Slovak] Toto zariadenie je prijímač...
  • Page 12 Írland, Ísland. Kröfur fyrir notkun utanhúss, svo sem kröfur um leyfi og heimilaðar rásir eiga við í sumum löndum. Hafið samband við reglugerðaryfirvöld á hverjum stað eða SMC Networks til að fá upplýsingar um gildandi takmarkanir á notkun utanhúss. [Norwegian] Denne enheten er en trådløs 2.4 GHz LAN-mottaker som er beregnet for innendørs...
  • Page 13: Table Of Contents

    Table of Contents Getting Started with the SMCWGBR14-N Package Contents Minimum System Requirements Wireless LAN Networking Introduction Features Hardware Overview Back Panel Front Panel Installation Considerations Getting Started Using the Configuration Menu Basic Advanced Tools Status Using the USB2.0 Multi-function Print Server Introduction System Setup Printer Wizard...
  • Page 14: Getting Started With The Smcwgbr14-N

    Getting Started with the SMCWGBR14-N Congratulations on purchasing the SMCWGBR14-N. This manual provides information for setting up and configuring the SMCWGBR14-N. This manual is intended for both home users and professionals. The following conventions are used in this manual: THE NOTE SYMBOL INDICATES ADDITIONAL INFORMATION ON THE TOPIC AT HAND.
  • Page 15: Package Contents

    Package Contents Barricade™ N Broadband Router (SMCWGBR14-N) Yellow RJ-45 Ethernet Cable Power Adapter (12V, 1A) Documentation CD Quick Installation Guide Warranty Information Card Using a power supply with a different voltage than the one included with your product will cause damage and void the warranty for this product. Minimum System Requirements Broadband (Cable/xDSL) Internet service and Modem with Ethernet connection.
  • Page 16: Wireless Lan Networking

    Wireless LAN Networking This section provides background information on wireless LAN networking technology. Consult the Glossary for definitions of the terminology used in this section. HE INFORMATION IN THIS SECTION IS FOR YOUR REFERENCE. HANGING NETWORK SETTINGS AND PARTICULARLY SECURITY SETTTINGS SHOULD ONLY BE DONE BY AN AUTHORIZED ADMINISTRATOR.
  • Page 17 channel for each station.
  • Page 18 When a number of wireless stations are connected using a single access point, you have a Basic Service Set (BSS). In the ESS diagram below, communication is done through the access points, which relay data packets to other wireless stations or devices connected to the wired network. Wireless stations can then access resources, such as a printer, on the wired network.
  • Page 19 In an ESS environment, users are able to move from one access point to another without losing the connection. In the diagram below, when the user moves from BSS (1) to BSS (2) the WLAN client devices automatically switches to the channel used in BSS (2). Roaming in an ESS network diagram...
  • Page 20: Introduction

    Introduction The Barricade™ N Draft 11n Gigabit Broadband Router (SMCWGBR14-N) is the perfect all-in-one networking solution for connecting and sharing your high speed cable/xDSL internet connection. Designed for the home and office, this platform independent multi-functional router combines a 4-port 10/100/1000 LAN switch, high speed Wireless-N (draft 802.11n) access point, NAT firewall with Stateful Packet Inspection (SPI), Intelligent stream handling technology, a Multi-function print server and a User friendly web-based management interface in one convenient device.
  • Page 21 protects against Dos attacks Traffic Control with Virtual Server (max 64 configurable servers) and DMZ UPnP (Universal Plug & Play) and ALGs Support for Internet applications such as Email, FTP, Gaming, Remote Desktop, Net Meeting, Telnet, and more Provides Additional Security of Enable/Disable SSID, Internet Access Control (Services, URL and MAC Filtering) Supports Multiple and Concurrent IPSec, L2TP and PPTP VPN Pass-Through Sessions Flash Memory for Firmware Upgrade, Save/Restore Settings...
  • Page 22: Hardware Overview

    Hardware Overview Back Panel POWER The Power input connector is a single jack socket to supply power to the SMCWGBR14-N. Please use the Power Adapter provided in the SMCWGBR14-N package. RESET Pressing the reset button for 10 seconds restores the router to its original factory default settings. WAN (Auto MDI/MDIX) The WAN port is used to connect to an Ethernet Cable or xDSL modem LAN1-4 (Auto MDI/MDIX)
  • Page 23: Front Panel

    Front Panel POWER LED A solid green LED indicates the SMCWGBR14-N is receiving power – normal operation. If the LED is off there is no power to device or failure. LAN1-4 LED A solid orange LED indicates the corresponding LAN port connection is established. The LED blinks when data is transmitted.
  • Page 24 blinking and become solid until the next WPS action or the device is rebooted. If no client joins the LED will stop blinking and switch off after 4 minutes. The USB2.0 port can be used for connecting USB printers. For a list of printers refer to Appendix A. WLAN ON/OFF The WLAN ON/OFF slide switch can be used to turn the wireless AP function ON/OFF...
  • Page 25: Installation Considerations

    Installation Considerations The SMCWGBR14-N lets you access your network, using a wireless connection, from virtually anywhere within its operating range. Keep in mind, however, that the number, thickness and location of walls, ceilings, or other objects that the wireless signals must pass through, may limit the range. Typical ranges vary depending on the types of materials and background RF (radio frequency) noise in your home or business.
  • Page 26: Using The Configuration Menu

    Using the Configuration Menu Whenever you want to configure your SMCWGBR14-N, you can access the Configuration Menu through your PC by opening the Web-browser and typing in the IP Address of the SMCWGBR14-N. The SMCWGBR14-N default IP address is: http://192.168.2.1 Open the Web browser.
  • Page 27: Basic

    Basic The Basic tab provides the following configuration options: INTERNET, WIRELESS and NETWORK SETTINGS. Basic_Internet Setup Wizard If you are new to networking and have never configured a router before, click on Setup Wizard and the router will guide you through a few simple steps to get your network up and running. Manual Configure If you consider yourself an advanced user and have configured a router before, click Manual Configure to input all the settings manually.
  • Page 28 Basic_Wireless The wireless section is used to configure the wireless settings for your router. Note that changes made in this section may also need to be duplicated on wireless clients that you want to connect to your wireless network. To protect your privacy, use the wireless security mode to configure the wireless security features.
  • Page 29 Enable Wireless This option allows you to enable/disable the wireless AP function. The wireless can also be turned ON/OFF by the slide switch on the back panel. When the wireless is enabled, the following parameters are in effect. Wireless Network Name When you are browsing for available wireless networks, this is the name that will appear in the list (unless Visibility Status is set to Invisible, see below).
  • Page 30 A method of encrypting data for wireless communication intended to provide the same level of privacy as a wired network. WEP is not as secure as WPA encryption. To gain access to a WEP network, you must know the key. The key is a string of characters that you create. When using WEP, you must determine the level of encryption.
  • Page 31 Example: Wireless Networking technology enables ubiquitous communication WPA-Enterprise This option works with a RADIUS Server to authenticate wireless clients. Wireless clients should have established the necessary credentials before attempting to authenticate to the Server through this Gateway. Furthermore, it may be necessary to configure the RADIUS Server to allow this Gateway to authenticate users.
  • Page 32 Basic_Network Settings Use this section to configure the internal network settings of your router. The IP Address that is configured here is the IP Address that you use to access the Web-based management interface. If you change the IP Address here, you may need to adjust your PC’s network settings to access the network again.
  • Page 33 IP Address The IP address of your router on the local area network. Your local area network settings are based on the address assigned here. For example, 192.168.2.1. Subnet Mask The subnet mask of your router on the local area network. Local Domain Name This entry is optional.
  • Page 34 RIP Password RIP Version 2 supports the use of a password to limit access to routers through the RIP protocol. If the ISP or other LAN router requires a RIP password, enter the password here. DHCP Server Settings DHCP stands for Dynamic Host Configuration Protocol. The DHCP section is where you configure the built-in DHCP Server to assign IP addresses to the computers and other devices on your local area network (LAN).
  • Page 35 DHCP Lease Time The amount of time that a computer may have an IP address before it is required to renew the lease. The lease functions just as a lease on an apartment would. The initial lease designates the amount of time before the lease expires. If the tenant wishes to retain the address when the lease is expired then a new lease is established.
  • Page 36 Windows 98 Go to the Start menu, select Run, type in winipcfg, and hit Enter. A Windows Me popup window will be displayed. Select the appropriate adapter from the pull-down menu and you will see the Adapter Address. This is the MAC address of the device.
  • Page 38: Advanced

    Advanced The Advanced tab provides the following configuration options: Virtual Server, Special Applications, Gaming, StreamEngine, Routing, Access Control, WEB Filter, MAC Address Filter, Firewall, Inbound Filter, Advanced Wireless and Advanced Network. Advanced_Virtual Server The Virtual Server option gives Internet users access to services on your LAN. This feature is useful for hosting online services such as FTP, Web, or game servers.
  • Page 39 Example: You are hosting a Web Server on a PC that has LAN IP Address of 192.168.2.50 and your ISP is blocking Port 80. 1. Name the Virtual Server (for example: Web Server) 2. Enter the IP Address of the machine on your LAN (for example: 192.168.2.50 3.
  • Page 40 5. Select the Protocol (for example TCP). 6. Ensure the schedule is set to Always 7. Click Save to add the settings to the Virtual Servers List 8. Repeat these steps for each Virtual Server Rule you wish to add. After the list is complete, click Save Settings at the top of the page.
  • Page 41 Add/Edit Virtual Server In this section you can add an entry to the Virtual Servers List below or edit an existing entry. Enable Entries in the list can be either active (enabled) or inactive (disabled). Save Saves the new or edited virtual server entry in the following list. When finished updating the virtual server entries, you must still click the Save Settings button at the top of the page to make the changes effective and permanent.
  • Page 42 Advanced_Special Applications An application rule is used to open single or multiple ports on your router when the router senses data sent to the Internet on a "trigger" port or port range. An application rule applies to all computers on your internal network. Parameters for an Application Rule Example: You need to configure your router to allow a software application running on any...
  • Page 43 Application Instead of entering a name for the Special Application rule, you can select from this list of common applications, and the remaining configuration values will be filled in accordingly. Trigger Port Range Enter the outgoing port range used by your application (for example 6500-6700).
  • Page 44 Advanced_Gaming Multiple connections are required by some applications, such as internet games, video conferencing, Internet telephony, and others. These applications have difficulties working through NAT (Network Address Translation). This section is used to open multiple ports or a range of ports in your router and redirect data through those ports to a single PC on your network.
  • Page 45 Example: Suppose you are hosting an online game server that is running on a PC with a private IP Address of 192.168.2.50. This game requires that you open multiple ports (6159-6180, 99) on the router so Internet users can connect. Port Forwarding Fields Name Give the rule a name that is meaningful to you, for example Game Server.
  • Page 46 Game Rules List The section shows the currently defined game rules. A game rule can be changed by clicking the Edit icon, or deleted by clicking the Delete icon. When you click the Edit icon, the item is highlighted, and the "Edit Game Rule" section is activated for editing.
  • Page 47 Advanced_StreamEngine The StreamEngine feature helps improve your network gaming performance by prioritizing the data flows of network applications.
  • Page 49 StreamEngine Setup Enable StreamEngine Enable this option for better performance and experience with online games and other interactive applications, such as VoIP. Automatic Classification This option is enabled by default so that your router will automatically determine which programs should have network priority. Dynamic Fragmentation This option should be enabled when you have a slow Internet uplink.
  • Page 50 reported slightly lower than before on such connections, but gives much better results. Detected xDSL or Frame Relay Network When Connection Type is set to Auto-detect, the automatically detected connection type is displayed here. StreamEngine Rules A StreamEngine Rule identifies a specific message flow and assigns a priority to that flow.
  • Page 51 Enable Each entry in StreamEngine Rules List can be active (enabled) or inactive (disabled) Save Saves the new or edited StreamEngine Rule in the following list. When finished updating the StreamEngine rules, you must still click the Save Settings button at the top of the page to make the changes effective and permanent.
  • Page 52 Advanced_Routing Add/Edit Route Adds a new route to the IP routing table or edits an existing route. Enable: Specifies whether the entry will be enabled or disabled. Destination IP: The IP address of packets that will take this route. Netmask: One bits in the mask specify which bits of the IP address must match.
  • Page 53 Gateway: Specifies the next hop to be taken if this route is used. A gateway of 0.0.0.0 implies there is no next hop, and the IP address matched is directly connected to the router on the interface specified: LAN or WAN. Interface: Specifies the interface -- LAN or WAN -- that the IP packet must use to transit out of the router, when this route is used.
  • Page 54 Advanced_Access Control The Access Control section allows you to control access in and out of devices on your network. Use this feature as Parental Controls to only grant access to approved sites, limit web access based on time or dates, and/or block access from applications such as peer-to-peer utilities or games.
  • Page 55 when will the control be in effect, and how is the control implemented. You can define multiple policies. The Policy Wizard starts when you click the button below and also when you edit an existing policy. Add Policy Click this button to start creating a new access control policy. Policy Table This section shows the currently defined access control policies.
  • Page 56 Advanced_WEB Filter This section is where you add the Web sites to be used for Access Control. The Web sites listed here are used when the Web Filter option is enabled in Access Control. The Web Filter section is one of two means by which you can specify the web sites you want to allow.
  • Page 57 my.yahoo.com, you need to enable access to yahoo.com, yimg.com, and doubleclick.net. Add/Edit Web Site This is where you can add Web sites to the Allowed Web Site List or change entries in the Allowed Web Site List. Enable Entries in the Allowed Web Site List can be activated or deactivated with this checkbox.
  • Page 58 Advanced_MAC Address Filter The MAC address filter section can be used to filter network access by machines based on the unique MAC addresses of their network adapter(s). It is most useful to prevent unauthorized wireless devices from connecting to your network. A MAC address is a unique ID assigned by the manufacturer of the network adapter.
  • Page 59 "only deny listed machines" is selected, any computer with a MAC address listed in the MAC Address List is refused access to the network. Filter Wireless Clients When this is selected, the MAC address filters will be applied to wireless network clients.
  • Page 60 Advanced_Firewall The router provides a tight firewall by virtue of the way NAT works. Unless you configure the router to the contrary, the NAT does not respond to unsolicited incoming requests on any port, thereby making your LAN invisible to Internet cyber attackers. However, some network applications cannot run with a tight firewall.
  • Page 61 Firewall Settings Enable SPI SPI ("stateful packet inspection" also known as "dynamic packet filtering") helps to prevent cyber attacks by tracking more state per session. It validates that the...
  • Page 62 traffic passing through that session conforms to the protocol. When the protocol is TCP, SPI checks that packet sequence numbers are within the valid range for the session, discarding those packets that do not have valid sequence numbers. Whether SPI is enabled or not, the router always tracks TCP connection states and ensures that each TCP packet's flags are valid for the current state.
  • Page 63 the router, you can expose one computer to the Internet and run the application on that computer. When a LAN host is configured as a DMZ host, it becomes the destination for all incoming packets that do not match some other incoming session or rule. If any other ingress rule is in place, that will be used instead of sending packets to the DMZ host;...
  • Page 64 DMZ IP Address Specify the LAN IP address of the LAN computer that you want to have unrestricted Internet communication. If this computer obtains its address Automatically using DHCP, then you may want to make a static reservation on Basic → Network Settings page so that the IP address of the DMZ computer does not change.
  • Page 65 To achieve multiple VPN pass-through in this case, the IPSec ALG must be enabled. RTSP Allows applications that use Real Time Streaming Protocol to receive streaming media from the internet. QuickTime and Real Player are some of the common applications using this protocol. Windows/MSN Messenger Supports use on LAN computers of Microsoft Windows Messenger (the Internet messaging client that ships with Microsoft Windows) and MSN Messenger.
  • Page 66 Advanced_Inbound Filter When you use the Virtual Server, Gaming, or Remote Administration features to open specific ports to traffic from the Internet, you could be increasing the exposure of your LAN to cyber attacks from the Internet. In these cases, you can use Inbound Filters to limit that exposure by specifying the IP addresses of internet hosts that you trust to access your LAN through the ports that you have opened.
  • Page 67 Add/Edit Inbound Filter Rule Here you can add entries to the Inbound Filter Rules List below, or edit existing entries. Name Enter a name for the rule that is meaningful to you. Action The rule can either Allow or Deny messages. Source IP Range Define the ranges of Internet addresses this rule applies to.
  • Page 68 ranges can be entered. The Enable checkbox allows you to turn on or off specific entries in the list of ranges. Save Saves the new or edited Inbound Filter Rule in the following list. When finished updating the Inbound Filter Rules List, you must still click the Save Settings button at the top of the page to make the changes effective and permanent.
  • Page 69 Advanced_Advanced Wireless Transmit Power Normally the wireless transmitter operates at 100% power. In some circumstances, however, there might be a need to isolate specific frequencies to a smaller area. By reducing the power of the radio, you can prevent transmissions from reaching beyond your corporate/home office or designated wireless area.
  • Page 70 Fragmentation Threshold This setting should remain at its default value of 2346. Setting the Fragmentation value too low may result in poor performance. DTIM Interval A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast messages.
  • Page 71 Advanced_Network UPnP UPnP is short for Universal Plug and Play, which is a networking architecture that provides compatibility among networking equipment, software, and peripherals. This router has optional UPnP capability, and can work with other UPnP devices and software. Enable UPnP If you need to use the UPnP functionality, you can enable it here.
  • Page 72 If you leave this option unchecked, you are causing the router to ignore ping commands for the public WAN IP address of the router. WAN Port Speed Normally, this is set to "auto". If you have trouble connecting to the WAN, try the other settings.
  • Page 73 WISH Enable WISH Enable this option if you want to allow WISH to prioritize your traffic. Priority Classifiers HTTP Allows the router to recognize HTTP transfers for many common audio and video streams and prioritize them above other traffic. Such streams are frequently used by digital media players.
  • Page 74 Windows Media Center Enables the router to recognize certain audio and video streams generated by a Windows Media Center PC and to prioritize these above other traffic. Such streams are used by systems known as Windows Media Extenders, such as the Xbox 360. Automatic When enabled, this option causes the router to automatically attempt to prioritize traffic streams that it doesn't otherwise recognize, based on the...
  • Page 75 Host 1 IP Range The rule applies to a flow of messages for which one computer's IP address falls within the range set here. Host 1 Port Range The rule applies to a flow of messages for which host 1's port number is within the range set here.
  • Page 76 Advanced_Wi-Fi PROTECTED SETUP Wi-Fi Protected Setup Enable Enable the Wi-Fi Protected Setup feature. Lock Wireless Security Settings Locking the wireless security settings prevents the settings from being changed by any new external registrar using its PIN. Devices can still be added to the wireless network using Wi-Fi Protected Setup.
  • Page 77 PIN Settings A PIN is a unique number that can be used to add the router to an existing network or to create a new network. The default PIN is printed on the bottom of the router. For extra security, a new PIN can be generated. You can restore the default PIN at any time.
  • Page 78: Tools

    Tools The Tools tab provides the following configuration options: Admin, Time, Syslog, Email Settings, System, Firmware, Dynamic DNS, Windows Connect Now, System Check & Schedules. Tools_Admin The Admin option is used to set a password for access to the Web-based management. By default there is no password configured.
  • Page 79 Admin Password Enter a password for the user "admin", who will have full access to the Web-based management interface. User Password Enter a password for the user "user", who will have read-only access to the Web-based management interface. Gateway Name The name of the router can be changed here.
  • Page 80 Enable Remote Management Enabling Remote Management allows you to manage the router from anywhere on the Internet. Disabling Remote Management allows you to manage the router only from computers on your LAN. Remote Admin Port The port that you will use to address the management interface from the Internet. For example, if you specify port 1080 here, then, to access the router from the Internet, you would use a URL of the form: http://my.domain.com:1080/.
  • Page 81 Tools_Time The Time Configuration option allows you to configure, update, and maintain the correct time on the router's internal system clock. From this section you can set the time zone that you are in and set the Time Server. Daylight saving can also be configured to automatically adjust the time when needed.
  • Page 82 Time Zone Select your local time zone from pull down menu. Enable Daylight Saving Check this option if your location observes daylight saving time. Daylight Saving Offset Select the time offset, if your location observes daylight saving time. DST Start and DST End Select the starting and ending times for the change to and from daylight saving time.
  • Page 83 Tools_Syslog This section allows you to archive your log files to a Syslog Server. Enable Logging to Syslog Server Enable this option if you have a syslog server currently running on the LAN and wish to send log messages to it. Syslog Server IP Address Enter the LAN IP address of the Syslog Server.
  • Page 84 Tools_Email Settings The Email feature can be used to send the system log files, router alert messages, and firmware update notification to your email address. Enable Enable Email Notification When this option is enabled, router activity logs or firmware upgrade notifications can be emailed to a designated email address, and the following parameters are displayed.
  • Page 85 Account Name Enter your account for sending email. Password Enter the password associated with the account. Verify Password Re-type the password associated with the account. Email Log When Full or on Schedule On Log Full Select this option if you want logs to be sent by email when the log is full. On Schedule Select this option if you want logs to be sent by email according to a schedule.
  • Page 86 Tools_System This section allows you to manage the router's configuration settings, reboot the router, and restore the router to the factory default settings. Restoring the unit to the factory default settings will erase all settings, including any rules that you've created. Save Settings To Local Hard Drive This option allows you to save the router's configuration to a file on your computer.
  • Page 87 Tools_Firmware The Firmware Upgrade section can be used to update to the latest firmware code to improve functionality and performance. To check for the latest firmware, click the Check Online Now button. If you would like to be notified when new firmware is released, place a checkmark in the box next to Email Notification of Newer Firmware Version.
  • Page 88 Firmware Upgrade Firmware upgrade cannot be performed from a wireless device. To perform an upgrade, ensure that you are using a PC that is connected the router by wire. Some firmware upgrades reset the configuration options to the factory defaults. Before performing an upgrade, be sure to save the current configuration from the Tools ->...
  • Page 89 Tools_Dynamic DNS The Dynamic DNS feature allows you to host a server (Web, FTP, Game Server, etc.) using a domain name that you have purchased (www.whateveryournameis.com) with your dynamically assigned IP address. Most broadband Internet Service Providers assign dynamic (changing) IP addresses. When you use a Dynamic DNS service provider, your friends can enter your host name to connect to your server, no matter what your IP address Enable Dynamic DNS Enable this option only if you have purchased your own domain name and registered...
  • Page 90 Password or Key Enter the password or key provided by your service provider. If the Dynamic DNS provider supplies only a key, enter that key in all three fields. Verify Password or Key Re-type the password or key provided by your service provider. If the Dynamic DNS provider supplies only a key, enter that key in all three fields.
  • Page 91 Tools_System Check Ping Test "Ping" is an Internet utility function that sends a series of short messages to a target computer and reports the results. You can use it to test whether a computer is running, and to get an idea of the quality of the connection to that computer, based on the speed of the responses.
  • Page 92 Ping Result Please wait, resolving www.whitehouse.gov..Resolved to 205.161.7.102. Response from 205.161.7.102 received in 7 milliseconds. Response from 205.161.7.102 received in 6 milliseconds. Response from 205.161.7.102 received in 7 milliseconds. User stopped ping.
  • Page 93 Tools_Schedules Schedules can be created for use with enforcing rules. For example, if you want to restrict web access to Mon-Fri from 3pm to 8pm, you could create a schedule selecting Mon, Tue, Wed, Thu, and Fri and enter a Start Time of 3pm and End Time of 8pm. Add/Edit Schedule Rule In this section you can add entries to the Schedule Rules List below or edit existing entries.
  • Page 94 Start Time If you don't use the All Day option, then you enter the time here. The start time is entered in two fields. The first box is for the hour and the second box is for the minute. Email events are normally triggered only by the start time. End Time The end time is entered in the same format as the start time.
  • Page 95 Enable Raw Port Printing Causes the router to support TCP raw (also known as Port 9100). Printers are identified by port numbers (9100 being the customary starting port number). This option must be enabled for the Print Wizard to function. Enable LPD/LPR Printing Causes the router to support the LPD/LPR protocol.
  • Page 96 Scan Area Size: You can select from the following list of preset scan sizes. Please note that you can also dynamically adjust the scan size by clicking and dragging the dotted box that appears on the image on the right. •...
  • Page 97: Status

    Status The Status tab provides the following configuration options: Device Info, Wireless, Routing, Logs, Statistics and Active Sessions. Status_Device info All of your Internet and network connection details are displayed on the Device Info page. The firmware version is also displayed here. Some browsers have limitations that make it impossible to update the WAN status display when the status changes.
  • Page 98 Depending on the type of WAN connection, you can take one of the following sets of actions: DHCP Connection Clicking the DHCP Release button unassigns the router's IP address. The router will not respond to IP messages from the WAN side until you click the DHCP Renew button or power-up the router again.
  • Page 99 PPPoE, PPTP, L2TP Connection Depending on whether the WAN connection is currently established, you can click either the Connect to attempt to establish the WAN connection or the Disconnect to break the WAN connection. BigPond Connection Depending on whether you are currently logged in to BigPond, you can click either the BigPond Login to attempt to establish the WAN connection or the BigPond Logout to break the WAN connection.
  • Page 100 Status_Wireless The wireless section allows you to view the wireless clients that are connected to your wireless router. MAC Address The Ethernet ID (MAC address) of the wireless client. IP Address The LAN-side IP address of the client. Mode The transmission standard being used by the client. Values are 11a, 11b, or 11g for 802.11a, 802.11b, or 802.11g respectively.
  • Page 101 Status_Routing The routing section displays all of the routing details configured for your router. A value of 0.0.0.0 for gateway means there is no next hop, and the IP address is directly connected to the router on the interface specified: LAN or WAN. A value of 0.0.0.0 in both the destination IP and netmask means that this is the default route.
  • Page 102 Status_Logs The router automatically logs (records) events of possible interest in its internal memory. If there is not enough internal memory for all events, logs of older events are deleted, but logs of the latest events are retained. The Logs option allows you to view the router logs. You can define what types of events you want to view and the level of events to view.
  • Page 103 View Levels Select the level of events that you want to view. • Critical • Warning • Informational Apply Log Settings Now Click this button after changing Log Options to make them effective and permanent. Refresh Clicking this button refreshes the display of log entries. There may be new events since the last time you accessed the log.
  • Page 104 Status_Statistics The Statistics page displays all of the LAN, WAN, and Wireless packet transmit and receive statistics. Sent The number of packets sent from the router. Received The number of packets received by the router. TX Packets Dropped The number of packets that were dropped while being sent, due to errors, collisions, or router resource limitations.
  • Page 105 Collisions The number of packets that were dropped due to Ethernet collisions (two or more devices attempting to use an Ethernet circuit at the same time). Errors The number of transmission failures that cause loss of a packet. A noisy radio-frequency environment can cause a high error rate on the wireless LAN.
  • Page 106 Status_Active Sessions The Active Sessions page displays full details of active sessions through your router. A session is a conversation between a progam or application on a LAN-side computer and a program or application on a WAN-side computer. Internal The IP address and port number of the LAN-side application. Protocol The communications protocol used for the conversation.
  • Page 107 The port number of the LAN-side application as viewed by the WAN-side application. Priority The preference given to outbound packets of this conversation by the StreamEngine logic. Smaller numbers represent higher priority. State State for sessions that use the TCP protocol. •...
  • Page 108 20 seconds Reset or closed TCP connections. The connection does not close instantly so that lingering packets can pass or the connection can be re-established. 120 seconds Opening or closing TCP connections. 7800 seconds Established TCP connections. Status_WISH Sessions The WISH Sessions page displays full details of active local wireless sessions through your router when WISH has been enabled.
  • Page 109 Protocol The communications protocol used for the conversation. State State for sessions that use the TCP protocol. • NO: None -- This entry is used as a placeholder for a future connection that may occur. • SS: SYN Sent -- One of the systems is attempting to start a connection. •...
  • Page 110 Status_Print Server Shows the status of the printer attached to the router. Raw TCP Port Printing Shows the "IP Address" and "TCP Port" values that you need to enter when you configure your computer to use the printer in TCP Raw mode. LPD/LPR Printing Shows the "IP Address"...
  • Page 111: Using The Usb2.0 Multi-Function Print Server

    Using the USB2.0 Multi-function Print Server Introduction The SMCWGBR14-N Multi-Functional (MFP) Print Server allows networked PCs to access and share the networked printer or All-In-One printer using the USB port on your SMCWGBR14-N. For supported MFP devices, both printing and scanning features can be accessed from any PC on the network.
  • Page 112: Printer Wizard

    Printer Wizard The Print Server provides a Printer Setup Wizard that makes this process extremely simple to set up the PC for network printing. From the SMCWGBR14-N home page (LOGIN page), select the Printer Icon to start the installation of your printer. Review the 3 simple steps, and press Next.
  • Page 113 Step 1 of the Printer Setup Wizard requires you to verify the printer to install. Press Next to install this printer. Note: the printer must be powered on to be visible in this setup page. Step 2 is to launch the Printer Setup Wizard application. This application executes on your PC, finds and loads the correct print driver and then configures the driver for network printing.
  • Page 114 Since the Print Setup Wizard application runs on the PC, the Security Warning popup boxes shown below will be displayed. Select RUN in both instances. The Wizard will execute showing progress with the following popup. Once the printer driver is installed, the Printer Setup Wizard will ask if you would like to make this printer the default printer.
  • Page 115 The Printer Setup Wizard application also creates a shortcut to the SMCWGBR14-N web page on your PC desktop. This shortcut can be used to quickly access the SMCWGBR14-N web page in the future, especially to use the scan function on the MFP. Finally, the Printer Setup Wizard application will ask if you would like to print a test page.
  • Page 116: Scanning Webpage

    Scanning Webpage If you have connected a supported Multifunctional (MFP) device to the Print Server, you can access the scan feature now without loading any driver software. From the SMCWGBR14-N home page (LOGIN), select the Scan Icon. The following Scan page will be displayed. Follow the numbered steps to quickly obtain a scan image.
  • Page 117 Step 1 Press Preview Scan to initiate a quick scan to check the position and alignment of the scan document. Note: Preview Scan is unavailable when using Automatic Document Feeder.
  • Page 118 Step 2 is to select your final scan parameters. Select Full Bed, Letter, Executive, A4, or use the mouse to Size: select a custom scan area. Select a desired resolution from Low to Highest. Resolution: Select either Color or Black & White. Color: Select the desired file format.
  • Page 119 Step 4 is saving the image. To save the image, move the mouse over the image area and right click to bring up options for saving the image to your PC. The image will be saved in the file format selected in Step 2.
  • Page 120: Appendix A: Printer Compatibility List

    Appendix A: Printer compatibility list The following printer models have been tested for compatibility with the SMCWGBR14-N: Hewlett Packard Printer Models Tested MODEL NUMBER SCANNING SUPPORTED DJ3650 DJ3915 DJ5150 DJ5440 DJ5650 DJ6122 DJ822 DJ840 DJ F380 Inkjet1200D LJ1012 LJ1022 LJ1320 LJ3015 OJd135 (2002) OJk60 (2002)
  • Page 121 Brother Printer Models Tested MODEL NUMBER SCANNING SUPPORTED DCP 1400 HL1440 HL5140 MFC3220 MFC420 MFC4800 Canon Printer Models Tested MODEL NUMBER SCANNING SUPPORTED i350 i475 i560 i860 i960 IP1600 MP390 MP450 MP730 Epson Printer Models Tested MODEL NUMBER SCANNING SUPPORTED Stylus 1280 Stylus C84 Stylus C86...
  • Page 122: Glossary

    Glossary Access Control List ACL. This is a database of network devices that are allowed to access resources on the network. Access Point AP. Device that allows wireless clients to connect to it and access the network ActiveX A Microsoft specification for the interaction of software components. Ad-hoc network Peer-to-Peer network between wireless clients Address Resolution Protocol...
  • Page 123 American Standard Code for Information Interchange. This system of characters is most commonly used for text files Attenuation The loss in strength of digital and analog signals. The loss is greater when the signal is being transmitted over long distances. Authentication To provide credentials, like a Password, in order to verify that the person or device is really who they are claiming to be...
  • Page 124 A time during processes when something causes the process to slowdown or stop all together Broadband A wide band of frequencies available for transmitting data Broadcast Transmitting data in all directions at once Browser A program that allows you to access resources on the web and provides them to you graphically Cable modem A device that allows you to connect a computer up to a coaxial cable and receive Internet...
  • Page 125 The second layer of the OSI model. Controls the movement of data on the physical link of a network Database Organizes information so that it can be managed updated, as well as easily accessed by users or applications. DB-25 A 25 ping male connector for attaching External modems or RS-232 serial devices DB-9 A 9 pin connector for RS-232 connections Decibels related to dipole antenna...
  • Page 126 "Demilitarized Zone". A computer that logically sits in a "no-mans land" between the LAN and the WAN. The DMZ computer trades some of the protection of the router's security mechanisms for the convenience of being directly addressable from the Internet. Domain Name System: Translates Domain Names to IP addresses Domain name A name that is associated with an IP address...
  • Page 127 A way of sending data through light impulses over glass or plastic wire or fiber File server A computer on a network that stores data so that the other computers on the network can all access it File sharing Allowing data from computers on a network to be accessed by other computers on the network with different levels of access rights Firewall A device that protects resources of the Local Area Network from unauthorized users outside of...
  • Page 128 A standard that provides consistency of voice and video transmissions and compatibility for videoconferencing devices Half-duplex Data cannot be transmitted and received at the same time Hashing Transforming a string of characters into a shorter string with a predefined length Hexadecimal Characters 0-9 and A-F The action of data packets being transmitted from one router to another...
  • Page 129 Infrastructure In terms of a wireless network, this is when wireless clients use an Access Point to gain access to the network Internet A system of worldwide networks which use TCP/IP to allow for resources to be accessed from computers around the world Internet Explorer A World Wide Web browser created and provided by Microsoft Internet Protocol...
  • Page 130 Java A programming language used to create programs and applets for web pages Kbps Kilobits per second Kbyte Kilobyte Local Area Network Latency The amount of time that it takes a packet to get from the one point to another on a network. Also referred to as delay Light Emitting Diode Legacy...
  • Page 131 MDIX Medium Dependent Interface Crossover, is an Ethernet port for a connection to a crossover cable Management Information Base is a set of objects that can be managed by using SNMP Modem A device that Modulates digital signals from a computer to an analog signal in order to transmit the signal over phone lines.
  • Page 132 Network Time Protocol Used to synchronize the time of all the computers in a network Network Interface Card Network Time Protocol OFDM Orthogonal Frequency-Division Multiplexing is the modulation technique for both 802.11a and 802.11g Open Systems Interconnection is the reference model for how data should travel between two devices on a network OSPF Open Shortest Path First is a routing protocol that is used more than RIP in larger scale...
  • Page 133 Port A logical channel endpoint in a network. A computer might have only one physical channel (its Ethernet channel) but can have multiple ports (logical channels) each identified by a number. Point-to-Point Protocol is used for two computers to communicate with each over a serial interface, like a phone line PPPoE Point-to-Point Protocol over Ethernet is used to connect multiple computers to a remote server...
  • Page 134 RJ-45 The most commonly used connection method for Ethernet RS-232C The interface for serial communication between computers and other related devices Algorithm used for encryption and authentication Server A computer on a network that provides services and resources to other computers on the network Session key An encryption and decryption key that is generated for every communication session between...
  • Page 135 Secure Shell is a command line interface that allows for secure connections to remote computers SSID Service Set Identifier is a name for a wireless network Stateful inspection A feature of a firewall that monitors outgoing and incoming traffic to make sure that only valid responses to outgoing requests are allowed to pass though the firewall Subnet mask Determines what portion of an IP address designates the Network and which part designates...
  • Page 136 Universal Plug and Play A standard that allows network devices to discover each other and configure themselves to be a part of the network Upgrade To install a more recent version of a software or firmware product Upload To send a request from one computer to another and have a file transmitted from the requesting computer to the other UPnP Universal Plug and Play...
  • Page 137 Windows Connect Now. A Microsoft method for configuring and bootstrapping wireless networking hardware (access points) and wireless clients, including PCs and other devices. Wireless Distribution System. A system that enables the interconnection of access points wirelessly. Web browser A utility that allows you to view content and interact with all of the information on the World Wide Web Wired Equivalent Privacy is security for wireless networks that is supposed to be comparable to that of a wired network...
  • Page 138 Yagi antenna A directional antenna used to concentrate wireless signals on a specific location 802.11 A family of specifications for wireless local area networks (WLANs) developed by a working group of the Institute of Electrical and Electronics Engineers (IEEE).
  • Page 139 SMCWGBR14-N SMCWBR11-G...

This manual is also suitable for:

Barricade smcwgbr14-n

Table of Contents