SMC Networks Barricade SMCWGBR14-N User Manual

SMC Networks Barricade SMCWGBR14-N User Manual

N draft 11n wireless 4-port gigabit broadband router
Hide thumbs Also See for Barricade SMCWGBR14-N:

Advertisement

Barricade™ N
Draft 11n Wireless 4-port Gigabit Broadband Router
SMCWGBR14-N

Advertisement

Table of Contents
loading

Summary of Contents for SMC Networks Barricade SMCWGBR14-N

  • Page 1 Barricade™ N Draft 11n Wireless 4-port Gigabit Broadband Router SMCWGBR14-N...
  • Page 2 LIMITED WARRANTY Limited Warranty Statement: SMC Networks, Inc. (“SMC”) warrants its products to be free from defects in workmanship and materials, under normal use and service, for the applicable warranty term. All SMC products carry a standard 90-day limited warranty from the date of purchase from SMC or its Authorized Reseller.
  • Page 3 * SMC will provide warranty service for one year following discontinuance from the active SMC price list. Under the limited lifetime warranty, internal and external power supplies, fans, and cables are covered by a standard one-year warranty from date of purchase. SMC Networks, Inc. 20 Mason Irvine, CA 92618...
  • Page 4 Compliances Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
  • Page 5: Table Of Contents

    Table of Contents Getting Started with the SMCWGBR14-N Package Contents Minimum System Requirements Wireless LAN Networking Introduction Features Hardware Overview Back Panel Front Panel Installation Considerations Getting Started Using the Configuration Menu Basic Advanced Tools Status Using the USB2.0 Multi-function Print Server...
  • Page 6: Getting Started With The Smcwgbr14-N

    Getting Started with the SMCWGBR14-N Congratulations on purchasing the SMCWGBR14-N. This manual provides information for setting up and configuring the SMCWGBR14-N. This manual is intended for both home users and professionals. The following conventions are used in this manual: THE NOTE SYMBOL INDICATES ADDITIONAL INFORMATION ON THE TOPIC AT HAND.
  • Page 7: Package Contents

    Package Contents Barricade™ N Broadband Router (SMCWGBR14-N) Yellow RJ-45 Ethernet Cable Power Adapter (12V, 1A) Documentation CD Quick Installation Guide Warranty Information Card Using a power supply with a different voltage than the one included with your product will cause damage and void the warranty for this product.
  • Page 8: Wireless Lan Networking

    BE DONE BY AN AUTHORIZED ADMINISTRATOR. Transmission Rate (Transfer Rate) The SMCWGBR14-N provides various transmission (data) rate options for you to select. In most networking scenarios, the factory default Best (automatic) setting proves the most efficient. This setting allows your SMCWGBR14-N to operate at the maximum transmission (data) rate. When the communication quality drops below a certain level, the SMCWGBR14-N automatically switches to a lower transmission (data) rate.
  • Page 9 channel for each station.
  • Page 10 When a number of wireless stations are connected using a single access point, you have a Basic Service Set (BSS). In the ESS diagram below, communication is done through the access points, which relay data packets to other wireless stations or devices connected to the wired network. Wireless stations can then access resources, such as a printer, on the wired network.
  • Page 11 In an ESS environment, users are able to move from one access point to another without losing the connection. In the diagram below, when the user moves from BSS (1) to BSS (2) the WLAN client devices automatically switches to the channel used in BSS (2). Roaming in an ESS network diagram...
  • Page 12: Introduction

    VoIP calls and surf the Internet. With security being a key consideration, SMCWGBR14-N supports the latest WPA and WPA2 wireless encryption standards, which prevent unauthorized access to wireless networks and ensure data is secure.
  • Page 13 protects against Dos attacks Traffic Control with Virtual Server (max 64 configurable servers) and DMZ UPnP (Universal Plug & Play) and ALGs Support for Internet applications such as Email, FTP, Gaming, Remote Desktop, Net Meeting, Telnet, and more Provides Additional Security of Enable/Disable SSID, Internet Access Control (Services, URL and MAC Filtering) Supports Multiple and Concurrent IPSec, L2TP and PPTP VPN Pass-Through Sessions Flash Memory for Firmware Upgrade, Save/Restore Settings...
  • Page 14: Hardware Overview

    Hardware Overview Back Panel POWER The Power input connector is a single jack socket to supply power to the SMCWGBR14-N. Please use the Power Adapter provided in the SMCWGBR14-N package. RESET Pressing the reset button for 10 seconds restores the router to its original factory default settings.
  • Page 15: Front Panel

    Front Panel POWER LED A solid green LED indicates the SMCWGBR14-N is receiving power – normal operation. If the LED is off there is no power to device or failure. LAN1-4 LED A solid orange LED indicates the corresponding LAN port connection is established. The LED blinks when data is transmitted.
  • Page 16 blinking and become solid until the next WPS action or the device is rebooted. If no client joins the LED will stop blinking and switch off after 4 minutes. The USB2.0 port can be used for connecting USB printers. For a list of printers refer to Appendix A. WLAN ON/OFF The WLAN ON/OFF slide switch can be used to turn the wireless AP function ON/OFF...
  • Page 17: Installation Considerations

    Installation Considerations The SMCWGBR14-N lets you access your network, using a wireless connection, from virtually anywhere within its operating range. Keep in mind, however, that the number, thickness and location of walls, ceilings, or other objects that the wireless signals must pass through, may limit the range.
  • Page 18: Using The Configuration Menu

    Using the Configuration Menu Whenever you want to configure your SMCWGBR14-N, you can access the Configuration Menu through your PC by opening the Web-browser and typing in the IP Address of the SMCWGBR14-N. The SMCWGBR14-N default IP address is: http://192.168.2.1 Open the Web browser.
  • Page 19: Basic

    Basic The Basic tab provides the following configuration options: INTERNET, WIRELESS and NETWORK SETTINGS. Basic_Internet Setup Wizard If you are new to networking and have never configured a router before, click on Setup Wizard and the router will guide you through a few simple steps to get your network up and running. Manual Configure If you consider yourself an advanced user and have configured a router before, click Manual Configure to input all the settings manually.
  • Page 20 Basic_Wireless The wireless section is used to configure the wireless settings for your router. Note that changes made in this section may also need to be duplicated on wireless clients that you want to connect to your wireless network. To protect your privacy, use the wireless security mode to configure the wireless security features.
  • Page 21 Enable Wireless This option allows you to enable/disable the wireless AP function. The wireless can also be turned ON/OFF by the slide switch on the back panel. When the wireless is enabled, the following parameters are in effect. Wireless Network Name When you are browsing for available wireless networks, this is the name that will appear in the list (unless Visibility Status is set to Invisible, see below).
  • Page 22 A method of encrypting data for wireless communication intended to provide the same level of privacy as a wired network. WEP is not as secure as WPA encryption. To gain access to a WEP network, you must know the key. The key is a string of characters that you create. When using WEP, you must determine the level of encryption.
  • Page 23 Example: Wireless Networking technology enables ubiquitous communication WPA-Enterprise This option works with a RADIUS Server to authenticate wireless clients. Wireless clients should have established the necessary credentials before attempting to authenticate to the Server through this Gateway. Furthermore, it may be necessary to configure the RADIUS Server to allow this Gateway to authenticate users.
  • Page 24 Basic_Network Settings Use this section to configure the internal network settings of your router. The IP Address that is configured here is the IP Address that you use to access the Web-based management interface. If you change the IP Address here, you may need to adjust your PC’s network settings to access the network again.
  • Page 25 IP Address The IP address of your router on the local area network. Your local area network settings are based on the address assigned here. For example, 192.168.2.1. Subnet Mask The subnet mask of your router on the local area network. Local Domain Name This entry is optional.
  • Page 26 RIP Password RIP Version 2 supports the use of a password to limit access to routers through the RIP protocol. If the ISP or other LAN router requires a RIP password, enter the password here. DHCP Server Settings DHCP stands for Dynamic Host Configuration Protocol. The DHCP section is where you configure the built-in DHCP Server to assign IP addresses to the computers and other devices on your local area network (LAN).
  • Page 27 DHCP Lease Time The amount of time that a computer may have an IP address before it is required to renew the lease. The lease functions just as a lease on an apartment would. The initial lease designates the amount of time before the lease expires. If the tenant wishes to retain the address when the lease is expired then a new lease is established.
  • Page 28 Windows 98 Go to the Start menu, select Run, type in winipcfg, and hit Enter. A Windows Me popup window will be displayed. Select the appropriate adapter from the pull-down menu and you will see the Adapter Address. This is the MAC address of the device.
  • Page 30: Advanced

    Advanced The Advanced tab provides the following configuration options: Virtual Server, Special Applications, Gaming, StreamEngine, Routing, Access Control, WEB Filter, MAC Address Filter, Firewall, Inbound Filter, Advanced Wireless and Advanced Network. Advanced_Virtual Server The Virtual Server option gives Internet users access to services on your LAN. This feature is useful for hosting online services such as FTP, Web, or game servers.
  • Page 31 Example: You are hosting a Web Server on a PC that has LAN IP Address of 192.168.2.50 and your ISP is blocking Port 80. 1. Name the Virtual Server (for example: Web Server) 2. Enter the IP Address of the machine on your LAN (for example: 192.168.2.50 3.
  • Page 32 5. Select the Protocol (for example TCP). 6. Ensure the schedule is set to Always 7. Click Save to add the settings to the Virtual Servers List 8. Repeat these steps for each Virtual Server Rule you wish to add. After the list is complete, click Save Settings at the top of the page.
  • Page 33 Add/Edit Virtual Server In this section you can add an entry to the Virtual Servers List below or edit an existing entry. Enable Entries in the list can be either active (enabled) or inactive (disabled). Save Saves the new or edited virtual server entry in the following list. When finished updating the virtual server entries, you must still click the Save Settings button at the top of the page to make the changes effective and permanent.
  • Page 34 Advanced_Special Applications An application rule is used to open single or multiple ports on your router when the router senses data sent to the Internet on a "trigger" port or port range. An application rule applies to all computers on your internal network. Parameters for an Application Rule Example: You need to configure your router to allow a software application running on any...
  • Page 35 Application Instead of entering a name for the Special Application rule, you can select from this list of common applications, and the remaining configuration values will be filled in accordingly. Trigger Port Range Enter the outgoing port range used by your application (for example 6500-6700).
  • Page 36 Advanced_Gaming Multiple connections are required by some applications, such as internet games, video conferencing, Internet telephony, and others. These applications have difficulties working through NAT (Network Address Translation). This section is used to open multiple ports or a range of ports in your router and redirect data through those ports to a single PC on your network.
  • Page 37 Example: Suppose you are hosting an online game server that is running on a PC with a private IP Address of 192.168.2.50. This game requires that you open multiple ports (6159-6180, 99) on the router so Internet users can connect. Port Forwarding Fields Name Give the rule a name that is meaningful to you, for example Game Server.
  • Page 38 Game Rules List The section shows the currently defined game rules. A game rule can be changed by clicking the Edit icon, or deleted by clicking the Delete icon. When you click the Edit icon, the item is highlighted, and the "Edit Game Rule" section is activated for editing.
  • Page 39 Advanced_StreamEngine The StreamEngine feature helps improve your network gaming performance by prioritizing the data flows of network applications.
  • Page 41 StreamEngine Setup Enable StreamEngine Enable this option for better performance and experience with online games and other interactive applications, such as VoIP. Automatic Classification This option is enabled by default so that your router will automatically determine which programs should have network priority. Dynamic Fragmentation This option should be enabled when you have a slow Internet uplink.
  • Page 42 reported slightly lower than before on such connections, but gives much better results. Detected xDSL or Frame Relay Network When Connection Type is set to Auto-detect, the automatically detected connection type is displayed here. StreamEngine Rules A StreamEngine Rule identifies a specific message flow and assigns a priority to that flow.
  • Page 43 Enable Each entry in StreamEngine Rules List can be active (enabled) or inactive (disabled) Save Saves the new or edited StreamEngine Rule in the following list. When finished updating the StreamEngine rules, you must still click the Save Settings button at the top of the page to make the changes effective and permanent.
  • Page 44 Advanced_Routing Add/Edit Route Adds a new route to the IP routing table or edits an existing route. Enable: Specifies whether the entry will be enabled or disabled. Destination IP: The IP address of packets that will take this route. Netmask: One bits in the mask specify which bits of the IP address must match.
  • Page 45 Gateway: Specifies the next hop to be taken if this route is used. A gateway of 0.0.0.0 implies there is no next hop, and the IP address matched is directly connected to the router on the interface specified: LAN or WAN. Interface: Specifies the interface -- LAN or WAN -- that the IP packet must use to transit out of the router, when this route is used.
  • Page 46 Advanced_Access Control The Access Control section allows you to control access in and out of devices on your network. Use this feature as Parental Controls to only grant access to approved sites, limit web access based on time or dates, and/or block access from applications such as peer-to-peer utilities or games.
  • Page 47 when will the control be in effect, and how is the control implemented. You can define multiple policies. The Policy Wizard starts when you click the button below and also when you edit an existing policy. Add Policy Click this button to start creating a new access control policy. Policy Table This section shows the currently defined access control policies.
  • Page 48 Advanced_WEB Filter This section is where you add the Web sites to be used for Access Control. The Web sites listed here are used when the Web Filter option is enabled in Access Control. The Web Filter section is one of two means by which you can specify the web sites you want to allow.
  • Page 49 my.yahoo.com, you need to enable access to yahoo.com, yimg.com, and doubleclick.net. Add/Edit Web Site This is where you can add Web sites to the Allowed Web Site List or change entries in the Allowed Web Site List. Enable Entries in the Allowed Web Site List can be activated or deactivated with this checkbox.
  • Page 50 Advanced_MAC Address Filter The MAC address filter section can be used to filter network access by machines based on the unique MAC addresses of their network adapter(s). It is most useful to prevent unauthorized wireless devices from connecting to your network. A MAC address is a unique ID assigned by the manufacturer of the network adapter.
  • Page 51 "only deny listed machines" is selected, any computer with a MAC address listed in the MAC Address List is refused access to the network. Filter Wireless Clients When this is selected, the MAC address filters will be applied to wireless network clients.
  • Page 52 Advanced_Firewall The router provides a tight firewall by virtue of the way NAT works. Unless you configure the router to the contrary, the NAT does not respond to unsolicited incoming requests on any port, thereby making your LAN invisible to Internet cyber attackers. However, some network applications cannot run with a tight firewall.
  • Page 53 Firewall Settings Enable SPI SPI ("stateful packet inspection" also known as "dynamic packet filtering") helps to prevent cyber attacks by tracking more state per session. It validates that the...
  • Page 54 traffic passing through that session conforms to the protocol. When the protocol is TCP, SPI checks that packet sequence numbers are within the valid range for the session, discarding those packets that do not have valid sequence numbers. Whether SPI is enabled or not, the router always tracks TCP connection states and ensures that each TCP packet's flags are valid for the current state.
  • Page 55 the router, you can expose one computer to the Internet and run the application on that computer. When a LAN host is configured as a DMZ host, it becomes the destination for all incoming packets that do not match some other incoming session or rule. If any other ingress rule is in place, that will be used instead of sending packets to the DMZ host;...
  • Page 56 DMZ IP Address Specify the LAN IP address of the LAN computer that you want to have unrestricted Internet communication. If this computer obtains its address Automatically using DHCP, then you may want to make a static reservation on Basic → Network Settings page so that the IP address of the DMZ computer does not change.
  • Page 57 To achieve multiple VPN pass-through in this case, the IPSec ALG must be enabled. RTSP Allows applications that use Real Time Streaming Protocol to receive streaming media from the internet. QuickTime and Real Player are some of the common applications using this protocol. Windows/MSN Messenger Supports use on LAN computers of Microsoft Windows Messenger (the Internet messaging client that ships with Microsoft Windows) and MSN Messenger.
  • Page 58 Advanced_Inbound Filter When you use the Virtual Server, Gaming, or Remote Administration features to open specific ports to traffic from the Internet, you could be increasing the exposure of your LAN to cyber attacks from the Internet. In these cases, you can use Inbound Filters to limit that exposure by specifying the IP addresses of internet hosts that you trust to access your LAN through the ports that you have opened.
  • Page 59 Add/Edit Inbound Filter Rule Here you can add entries to the Inbound Filter Rules List below, or edit existing entries. Name Enter a name for the rule that is meaningful to you. Action The rule can either Allow or Deny messages. Source IP Range Define the ranges of Internet addresses this rule applies to.
  • Page 60 ranges can be entered. The Enable checkbox allows you to turn on or off specific entries in the list of ranges. Save Saves the new or edited Inbound Filter Rule in the following list. When finished updating the Inbound Filter Rules List, you must still click the Save Settings button at the top of the page to make the changes effective and permanent.
  • Page 61 Advanced_Advanced Wireless Transmit Power Normally the wireless transmitter operates at 100% power. In some circumstances, however, there might be a need to isolate specific frequencies to a smaller area. By reducing the power of the radio, you can prevent transmissions from reaching beyond your corporate/home office or designated wireless area.
  • Page 62 DTIM Interval A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast messages. When the wireless router has buffered broadcast or multicast messages for associated clients, it sends the next DTIM with a DTIM Interval value.
  • Page 63 Advanced_Network UPnP UPnP is short for Universal Plug and Play, which is a networking architecture that provides compatibility among networking equipment, software, and peripherals. This router has optional UPnP capability, and can work with other UPnP devices and software. Enable UPnP If you need to use the UPnP functionality, you can enable it here.
  • Page 64 If you leave this option unchecked, you are causing the router to ignore ping commands for the public WAN IP address of the router. WAN Port Speed Normally, this is set to "auto". If you have trouble connecting to the WAN, try the other settings.
  • Page 65 WISH Enable WISH Enable this option if you want to allow WISH to prioritize your traffic. Priority Classifiers HTTP Allows the router to recognize HTTP transfers for many common audio and video streams and prioritize them above other traffic. Such streams are frequently used by digital media players.
  • Page 66 Windows Media Center Enables the router to recognize certain audio and video streams generated by a Windows Media Center PC and to prioritize these above other traffic. Such streams are used by systems known as Windows Media Extenders, such as the Xbox 360. Automatic When enabled, this option causes the router to automatically attempt to prioritize traffic streams that it doesn't otherwise recognize, based on the...
  • Page 67 Host 1 IP Range The rule applies to a flow of messages for which one computer's IP address falls within the range set here. Host 1 Port Range The rule applies to a flow of messages for which host 1's port number is within the range set here.
  • Page 68 Advanced_Wi-Fi PROTECTED SETUP Wi-Fi Protected Setup Enable Enable the Wi-Fi Protected Setup feature. Lock Wireless Security Settings Locking the wireless security settings prevents the settings from being changed by any new external registrar using its PIN. Devices can still be added to the wireless network using Wi-Fi Protected Setup.
  • Page 69 PIN Settings A PIN is a unique number that can be used to add the router to an existing network or to create a new network. The default PIN is printed on the bottom of the router. For extra security, a new PIN can be generated. You can restore the default PIN at any time.
  • Page 70: Tools

    Tools The Tools tab provides the following configuration options: Admin, Time, Syslog, Email Settings, System, Firmware, Dynamic DNS, Windows Connect Now, System Check & Schedules. Tools_Admin The Admin option is used to set a password for access to the Web-based management. By default there is no password configured.
  • Page 71 Admin Password Enter a password for the user "admin", who will have full access to the Web-based management interface. User Password Enter a password for the user "user", who will have read-only access to the Web-based management interface. Gateway Name The name of the router can be changed here.
  • Page 72 Enable Remote Management Enabling Remote Management allows you to manage the router from anywhere on the Internet. Disabling Remote Management allows you to manage the router only from computers on your LAN. Remote Admin Port The port that you will use to address the management interface from the Internet. For example, if you specify port 1080 here, then, to access the router from the Internet, you would use a URL of the form: http://my.domain.com:1080/.
  • Page 73 Tools_Time The Time Configuration option allows you to configure, update, and maintain the correct time on the router's internal system clock. From this section you can set the time zone that you are in and set the Time Server. Daylight saving can also be configured to automatically adjust the time when needed.
  • Page 74 Time Zone Select your local time zone from pull down menu. Enable Daylight Saving Check this option if your location observes daylight saving time. Daylight Saving Offset Select the time offset, if your location observes daylight saving time. DST Start and DST End Select the starting and ending times for the change to and from daylight saving time.
  • Page 75 Tools_Syslog This section allows you to archive your log files to a Syslog Server. Enable Logging to Syslog Server Enable this option if you have a syslog server currently running on the LAN and wish to send log messages to it. Syslog Server IP Address Enter the LAN IP address of the Syslog Server.
  • Page 76 Tools_Email Settings The Email feature can be used to send the system log files, router alert messages, and firmware update notification to your email address. Enable Enable Email Notification When this option is enabled, router activity logs or firmware upgrade notifications can be emailed to a designated email address, and the following parameters are displayed.
  • Page 77 Account Name Enter your account for sending email. Password Enter the password associated with the account. Verify Password Re-type the password associated with the account. Email Log When Full or on Schedule On Log Full Select this option if you want logs to be sent by email when the log is full. On Schedule Select this option if you want logs to be sent by email according to a schedule.
  • Page 78 Tools_System This section allows you to manage the router's configuration settings, reboot the router, and restore the router to the factory default settings. Restoring the unit to the factory default settings will erase all settings, including any rules that you've created. Save Settings To Local Hard Drive This option allows you to save the router's configuration to a file on your computer.
  • Page 79 Tools_Firmware The Firmware Upgrade section can be used to update to the latest firmware code to improve functionality and performance. To check for the latest firmware, click the Check Online Now button. If you would like to be notified when new firmware is released, place a checkmark in the box next to Email Notification of Newer Firmware Version.
  • Page 80 Firmware Upgrade Firmware upgrade cannot be performed from a wireless device. To perform an upgrade, ensure that you are using a PC that is connected the router by wire. Some firmware upgrades reset the configuration options to the factory defaults. Before performing an upgrade, be sure to save the current configuration from the Tools ->...
  • Page 81 Tools_Dynamic DNS The Dynamic DNS feature allows you to host a server (Web, FTP, Game Server, etc.) using a domain name that you have purchased (www.whateveryournameis.com) with your dynamically assigned IP address. Most broadband Internet Service Providers assign dynamic (changing) IP addresses. When you use a Dynamic DNS service provider, your friends can enter your host name to connect to your server, no matter what your IP address Enable Dynamic DNS Enable this option only if you have purchased your own domain name and registered...
  • Page 82 Password or Key Enter the password or key provided by your service provider. If the Dynamic DNS provider supplies only a key, enter that key in all three fields. Verify Password or Key Re-type the password or key provided by your service provider. If the Dynamic DNS provider supplies only a key, enter that key in all three fields.
  • Page 83 Tools_System Check Ping Test "Ping" is an Internet utility function that sends a series of short messages to a target computer and reports the results. You can use it to test whether a computer is running, and to get an idea of the quality of the connection to that computer, based on the speed of the responses.
  • Page 84 Ping Result Please wait, resolving www.whitehouse.gov..Resolved to 205.161.7.102. Response from 205.161.7.102 received in 7 milliseconds. Response from 205.161.7.102 received in 6 milliseconds. Response from 205.161.7.102 received in 7 milliseconds. User stopped ping.
  • Page 85 Tools_Schedules Schedules can be created for use with enforcing rules. For example, if you want to restrict web access to Mon-Fri from 3pm to 8pm, you could create a schedule selecting Mon, Tue, Wed, Thu, and Fri and enter a Start Time of 3pm and End Time of 8pm. Add/Edit Schedule Rule In this section you can add entries to the Schedule Rules List below or edit existing entries.
  • Page 86 Start Time If you don't use the All Day option, then you enter the time here. The start time is entered in two fields. The first box is for the hour and the second box is for the minute. Email events are normally triggered only by the start time. End Time The end time is entered in the same format as the start time.
  • Page 87 Enable Raw Port Printing Causes the router to support TCP raw (also known as Port 9100). Printers are identified by port numbers (9100 being the customary starting port number). This option must be enabled for the Print Wizard to function. Enable LPD/LPR Printing Causes the router to support the LPD/LPR protocol.
  • Page 88 Scan Area Size: You can select from the following list of preset scan sizes. Please note that you can also dynamically adjust the scan size by clicking and dragging the dotted box that appears on the image on the right. •...
  • Page 89: Status

    Status The Status tab provides the following configuration options: Device Info, Wireless, Routing, Logs, Statistics and Active Sessions. Status_Device info All of your Internet and network connection details are displayed on the Device Info page. The firmware version is also displayed here. Some browsers have limitations that make it impossible to update the WAN status display when the status changes.
  • Page 90 Depending on the type of WAN connection, you can take one of the following sets of actions: DHCP Connection Clicking the DHCP Release button unassigns the router's IP address. The router will not respond to IP messages from the WAN side until you click the DHCP Renew button or power-up the router again.
  • Page 91 PPPoE, PPTP, L2TP Connection Depending on whether the WAN connection is currently established, you can click either the Connect to attempt to establish the WAN connection or the Disconnect to break the WAN connection. BigPond Connection Depending on whether you are currently logged in to BigPond, you can click either the BigPond Login to attempt to establish the WAN connection or the BigPond Logout to break the WAN connection.
  • Page 92 Status_Wireless The wireless section allows you to view the wireless clients that are connected to your wireless router. MAC Address The Ethernet ID (MAC address) of the wireless client. IP Address The LAN-side IP address of the client. Mode The transmission standard being used by the client. Values are 11a, 11b, or 11g for 802.11a, 802.11b, or 802.11g respectively.
  • Page 93 Status_Routing The routing section displays all of the routing details configured for your router. A value of 0.0.0.0 for gateway means there is no next hop, and the IP address is directly connected to the router on the interface specified: LAN or WAN. A value of 0.0.0.0 in both the destination IP and netmask means that this is the default route.
  • Page 94 Status_Logs The router automatically logs (records) events of possible interest in its internal memory. If there is not enough internal memory for all events, logs of older events are deleted, but logs of the latest events are retained. The Logs option allows you to view the router logs. You can define what types of events you want to view and the level of events to view.
  • Page 95 View Levels Select the level of events that you want to view. • Critical • Warning • Informational Apply Log Settings Now Click this button after changing Log Options to make them effective and permanent. Refresh Clicking this button refreshes the display of log entries. There may be new events since the last time you accessed the log.
  • Page 96 Status_Statistics The Statistics page displays all of the LAN, WAN, and Wireless packet transmit and receive statistics. Sent The number of packets sent from the router. Received The number of packets received by the router. TX Packets Dropped The number of packets that were dropped while being sent, due to errors, collisions, or router resource limitations.
  • Page 97 Collisions The number of packets that were dropped due to Ethernet collisions (two or more devices attempting to use an Ethernet circuit at the same time). Errors The number of transmission failures that cause loss of a packet. A noisy radio-frequency environment can cause a high error rate on the wireless LAN.
  • Page 98 Status_Active Sessions The Active Sessions page displays full details of active sessions through your router. A session is a conversation between a progam or application on a LAN-side computer and a program or application on a WAN-side computer. Internal The IP address and port number of the LAN-side application. Protocol The communications protocol used for the conversation.
  • Page 99 The port number of the LAN-side application as viewed by the WAN-side application. Priority The preference given to outbound packets of this conversation by the StreamEngine logic. Smaller numbers represent higher priority. State State for sessions that use the TCP protocol. •...
  • Page 100 20 seconds Reset or closed TCP connections. The connection does not close instantly so that lingering packets can pass or the connection can be re-established. 120 seconds Opening or closing TCP connections. 7800 seconds Established TCP connections. Status_WISH Sessions The WISH Sessions page displays full details of active local wireless sessions through your router when WISH has been enabled.
  • Page 101 Protocol The communications protocol used for the conversation. State State for sessions that use the TCP protocol. • NO: None -- This entry is used as a placeholder for a future connection that may occur. • SS: SYN Sent -- One of the systems is attempting to start a connection. •...
  • Page 102 Status_Print Server Shows the status of the printer attached to the router. Raw TCP Port Printing Shows the "IP Address" and "TCP Port" values that you need to enter when you configure your computer to use the printer in TCP Raw mode. LPD/LPR Printing Shows the "IP Address"...
  • Page 103: Using The Usb2.0 Multi-Function Print Server

    Using the USB2.0 Multi-function Print Server Introduction The SMCWGBR14-N Multi-Functional (MFP) Print Server allows networked PCs to access and share the networked printer or All-In-One printer using the USB port on your SMCWGBR14-N. For supported MFP devices, both printing and scanning features can be accessed from any PC on the network.
  • Page 104: Printer Wizard

    The Print Server provides a Printer Setup Wizard that makes this process extremely simple to set up the PC for network printing. From the SMCWGBR14-N home page (LOGIN page), select the Printer Icon to start the installation of your printer. Review the 3 simple steps, and press Next.
  • Page 105 Step 1 of the Printer Setup Wizard requires you to verify the printer to install. Press Next to install this printer. Note: the printer must be powered on to be visible in this setup page. Step 2 is to launch the Printer Setup Wizard application. This application executes on your PC, finds and loads the correct print driver and then configures the driver for network printing.
  • Page 106 Since the Print Setup Wizard application runs on the PC, the Security Warning popup boxes shown below will be displayed. Select RUN in both instances. The Wizard will execute showing progress with the following popup. Once the printer driver is installed, the Printer Setup Wizard will ask if you would like to make this printer the default printer.
  • Page 107 The Printer Setup Wizard application also creates a shortcut to the SMCWGBR14-N web page on your PC desktop. This shortcut can be used to quickly access the SMCWGBR14-N web page in the future, especially to use the scan function on the MFP.
  • Page 108: Scanning Webpage

    Server, you can access the scan feature now without loading any driver software. From the SMCWGBR14-N home page (LOGIN), select the Scan Icon. The following Scan page will be displayed. Follow the numbered steps to quickly obtain a scan image.
  • Page 109 Step 1 Press Preview Scan to initiate a quick scan to check the position and alignment of the scan document. Note: Preview Scan is unavailable when using Automatic Document Feeder.
  • Page 110 Step 2 is to select your final scan parameters. Select Full Bed, Letter, Executive, A4, or use the mouse to Size: select a custom scan area. Select a desired resolution from Low to Highest. Resolution: Select either Color or Black & White. Color: Select the desired file format.
  • Page 111 Step 4 is saving the image. To save the image, move the mouse over the image area and right click to bring up options for saving the image to your PC. The image will be saved in the file format selected in Step 2.
  • Page 112: Appendix A: Printer Compatibility List

    Appendix A: Printer compatibility list The following printer models have been tested for compatibility with the SMCWGBR14-N: Hewlett Packard Printer Models Tested MODEL NUMBER SCANNING SUPPORTED DJ3650 DJ3915 DJ5150 DJ5440 DJ5650 DJ6122 DJ822 DJ840 DJ F380 Inkjet1200D LJ1012 LJ1022 LJ1320...
  • Page 113 Stylus C86 Stylus C88 Stylus CX3810 Stylus CX4800 Stylus CX6400 Stylus RX600 Stylus R220 Stylus R300 Stylus R800 Photo 820 SAMSUNG Printer Models Tested MODEL NUMBER SCANNING SUPPORTED ML1740 Lexmark and Dell printer models not recommended for use with the SMCWGBR14-N.
  • Page 114: Glossary

    Glossary Access Control List ACL. This is a database of network devices that are allowed to access resources on the network. Access Point AP. Device that allows wireless clients to connect to it and access the network ActiveX A Microsoft specification for the interaction of software components. Ad-hoc network Peer-to-Peer network between wireless clients Address Resolution Protocol...
  • Page 115 American Standard Code for Information Interchange. This system of characters is most commonly used for text files Attenuation The loss in strength of digital and analog signals. The loss is greater when the signal is being transmitted over long distances. Authentication To provide credentials, like a Password, in order to verify that the person or device is really who they are claiming to be...
  • Page 116 A time during processes when something causes the process to slowdown or stop all together Broadband A wide band of frequencies available for transmitting data Broadcast Transmitting data in all directions at once Browser A program that allows you to access resources on the web and provides them to you graphically Cable modem A device that allows you to connect a computer up to a coaxial cable and receive Internet...
  • Page 117 The second layer of the OSI model. Controls the movement of data on the physical link of a network Database Organizes information so that it can be managed updated, as well as easily accessed by users or applications. DB-25 A 25 ping male connector for attaching External modems or RS-232 serial devices DB-9 A 9 pin connector for RS-232 connections Decibels related to dipole antenna...
  • Page 118 "Demilitarized Zone". A computer that logically sits in a "no-mans land" between the LAN and the WAN. The DMZ computer trades some of the protection of the router's security mechanisms for the convenience of being directly addressable from the Internet. Domain Name System: Translates Domain Names to IP addresses Domain name A name that is associated with an IP address...
  • Page 119 A way of sending data through light impulses over glass or plastic wire or fiber File server A computer on a network that stores data so that the other computers on the network can all access it File sharing Allowing data from computers on a network to be accessed by other computers on the network with different levels of access rights Firewall A device that protects resources of the Local Area Network from unauthorized users outside of...
  • Page 120 A standard that provides consistency of voice and video transmissions and compatibility for videoconferencing devices Half-duplex Data cannot be transmitted and received at the same time Hashing Transforming a string of characters into a shorter string with a predefined length Hexadecimal Characters 0-9 and A-F The action of data packets being transmitted from one router to another...
  • Page 121 Infrastructure In terms of a wireless network, this is when wireless clients use an Access Point to gain access to the network Internet A system of worldwide networks which use TCP/IP to allow for resources to be accessed from computers around the world Internet Explorer A World Wide Web browser created and provided by Microsoft Internet Protocol...
  • Page 122 Java A programming language used to create programs and applets for web pages Kbps Kilobits per second Kbyte Kilobyte Local Area Network Latency The amount of time that it takes a packet to get from the one point to another on a network. Also referred to as delay Light Emitting Diode Legacy...
  • Page 123 MDIX Medium Dependent Interface Crossover, is an Ethernet port for a connection to a crossover cable Management Information Base is a set of objects that can be managed by using SNMP Modem A device that Modulates digital signals from a computer to an analog signal in order to transmit the signal over phone lines.
  • Page 124 Network Time Protocol Used to synchronize the time of all the computers in a network Network Interface Card Network Time Protocol OFDM Orthogonal Frequency-Division Multiplexing is the modulation technique for both 802.11a and 802.11g Open Systems Interconnection is the reference model for how data should travel between two devices on a network OSPF Open Shortest Path First is a routing protocol that is used more than RIP in larger scale...
  • Page 125 Port A logical channel endpoint in a network. A computer might have only one physical channel (its Ethernet channel) but can have multiple ports (logical channels) each identified by a number. Point-to-Point Protocol is used for two computers to communicate with each over a serial interface, like a phone line PPPoE Point-to-Point Protocol over Ethernet is used to connect multiple computers to a remote server...
  • Page 126 RJ-45 The most commonly used connection method for Ethernet RS-232C The interface for serial communication between computers and other related devices Algorithm used for encryption and authentication Server A computer on a network that provides services and resources to other computers on the network Session key An encryption and decryption key that is generated for every communication session between...
  • Page 127 Secure Shell is a command line interface that allows for secure connections to remote computers SSID Service Set Identifier is a name for a wireless network Stateful inspection A feature of a firewall that monitors outgoing and incoming traffic to make sure that only valid responses to outgoing requests are allowed to pass though the firewall Subnet mask Determines what portion of an IP address designates the Network and which part designates...
  • Page 128 Universal Plug and Play A standard that allows network devices to discover each other and configure themselves to be a part of the network Upgrade To install a more recent version of a software or firmware product Upload To send a request from one computer to another and have a file transmitted from the requesting computer to the other UPnP Universal Plug and Play...
  • Page 129 Windows Connect Now. A Microsoft method for configuring and bootstrapping wireless networking hardware (access points) and wireless clients, including PCs and other devices. Wireless Distribution System. A system that enables the interconnection of access points wirelessly. Web browser A utility that allows you to view content and interact with all of the information on the World Wide Web Wired Equivalent Privacy is security for wireless networks that is supposed to be comparable to that of a wired network...
  • Page 130 Yagi antenna A directional antenna used to concentrate wireless signals on a specific location 802.11 A family of specifications for wireless local area networks (WLANs) developed by a working group of the Institute of Electrical and Electronics Engineers (IEEE).
  • Page 131 SMCWGBR14-N SMCWBR11-G...

Table of Contents