Page 3
Copyright Information furnished by SMC Networks, Inc. (SMC) is believed to be accu- rate and reliable. How-ever, no responsibility is assumed by SMC for its use, nor for any infringements of patents or other rights of third parties which may result from its use. No license is granted by implication or otherwise under any patent or patent rights of SMC.
Page 4
LIMITED WARRANTY Limited Warranty Statement: SMC Networks, Inc. (“SMC”) warrants its products to be free from defects in workmanship and materials, under normal use and service, for the applicable warranty term. All SMC products carry a standard 90-day limited warranty from the date of purchase from SMC or its Authorized Reseller.
Page 5
SMC price list. Under the limited lifetime warranty, internal and external power supplies, fans, and cables are covered by a standard one-year warranty from date of purchase. SMC Networks, Inc. 38 Tesla Irvine, CA 92618 Warranty in EMEA and Asia Pacific: For details regarding warranty in EMEA and Asia Pacific, please contact your country sales representative.
Page 6
Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Page 7
EC Conformance Declaration SMC contact for these products in Europe is: SMC Networks Spain S.L., Edificio Conata II, Calle Fructuós Gelabert 6-8, 2o, 4a, 08970 - Sant Joan Despí, Barcelona, Spain. Signed and dated Copy of the Declaration of Conformity can be found in the product section of www.smc-europe.com...
to other system. The user is obligated to ensure the device is operating according to the channel limitations, indoor/outdoor restrictions and license requirements for each European Community country as described in this document. • This device may be operated indoors or outdoors in all countries of the European Community using the 2.4 GHz band: Channels 1 - 13, except where noted below.
Page 9
Important! Before making connections, make sure you have the correct cord set. Check it (read the label on the cable) against the following: Power Cord Set U.S.A. and Canada Denmark Switzerland U.K. Europe Veuillez lire à fond l'information de la sécurité suivante avant d'installer le Switch: AVERTISSEMENT: L'installation et la dépose de ce groupe doivent être confiés à...
Page 10
• La prise secteur doit se trouver à proximité de l'appareil et son accès doit être facile. Vous ne pouvez mettre l'appareil hors circuit qu'en débranchant son cordon électrique au niveau de cette prise. • L'appareil fonctionne à une tension extrêmement basse de sécurité qui est conforme à...
Page 11
Wichtige Sicherheitshinweise (Germany) 1. Bitte lesen Sie diese Hinweise sorgfältig durch. 2. Heben Sie diese Anleitung für den späteren Gebrauch auf. 3. Vor jedem Reinigen ist das Gerät vom Stromnetz zu trennen. Verwenden Sie keine Flüs-sigoder Aerosolreiniger. Am besten eignet sich ein ange- feuchtetes Tuch zur Reinigung.
Page 12
Der arbeitsplatzbezogene Schalldruckpegel nach DIN 45 635 Teil 1000 beträgt 70dB(A) oder weniger. Stromkabel. Dies muss von dem Land, in dem es be-nutzt wird geprüft werden: U.S.A und Canada Danemark Schweiz Europe Der Cord muß das UL gepruft und war das CSA beglaubigt.
1.5. Selecting a Power Supply Method 1.6. Mounting the SMCWHSG44-G on a Wall 1.7. Preparing for Configuration 1.7.1. Connecting the Managing Computer and the SMCWHSG44-G 1.7.2. Changing the TCP/IP Settings of the Managing Computer 1.8. Configuring the SMCWHSG44-G 1.8.1. Entering the Password 1.8.2.
Page 15
1.11. Confirming the Settings of the SMCWHSG44-G and Client Computers 2. Using Web-Based Network Manager 2.1. Overview 2.1.1. Menu Structure 2.1.2. Save, Save & Restart, and Cancel Commands 2.1.3. Home and Refresh Commands 2.2. Status 2.2.1. Associated Wireless Clients 2.2.2. Authenticated Users 2.2.3.
Page 16
2.4.3.1. Basic 2.4.3.2. Virtual Server Mappings 2.4.4. DHCP Server 2.4.4.1. DHCP Server i. Basic ii. Static DHCP Mappings 2.4.4.2. DHCP Relay 2.4.5. Load Balancing 2.4.6. Zero Client Reconfiguration 2.5. Configuring IEEE 802.11-Related Settings 2.5.1. Wireless 2.5.1.1. Basic 2.5.1.2. Wireless Distribution System 2.5.2.
Page 17
2.8.4. LAN Device Management Appendix A A-1: Default Settings A-2: LED Definitions Appendix B: Troubleshooting B-1: TCP/IP Setting Problems B-2: Wireless Settings Problems B-3: Other Problems Appendix C: Distances and Data Rates Appendix D: Technical Specifications D-1: SMCWHSG44-G D-2: SMCWHS-POS D-3: Keypad Glossary...
The EliteConnect 2.4GHz 802.11g Wireless Hotspot Gateway (SMCWHSG44-G) enables VARs, WISPs and System Integrators to install secure, easy to manage Hotspots as a one-box solution. The features of the SMCWHSG44-G support applications that are well suited for Hotspot environments such as coffee...
RADIUS server for authentication or via the Local Authentication Database. • Local pages or external pages - The SMCWHSG44-G can be configured to use log-on, log-off, authentication success, and authentication failure pages, which are stored internally or stored in an external Web server maintained by the WISP.
Page 20
• Internet Connection Sharing • DNS proxy - The SMCWHSG44-G can forward DNS (Domain Name System) requests from client computers to DNS servers on the Internet. And DNS responses from the DNS servers can be forwarded back to the client computers.
Page 21
Ethernet LAN interface can be blocked. • Configurable MAC Address of the Ethernet WAN Interface - Some ADSL modems work only with Ethernet cards provided by the ISP. If SMCWHSG44-G is used in such an environment, the MAC address of the WAN interface of the Router has to be changed to the MAC address of the ISP-provided Ethernet network card.
Page 22
• SNTP - Support for system time by SNTP (Simple Network Time Protocol). • Dynamic DNS - Support for dynamic DNS services provided by dyndns.org and no-ip.com, so that the SMCWHSG44-G can be associated with a domain name even if it obtains an IP address dynamically by PPP, PPPoE or DHCP.
1.5. Selecting a Power Supply Method The SMCWHSG44-G can be powered by either the supplied AC power adapter or the optional SMCPWR-INJ3 EliteConnect™ Power Injector. The SMCWHSG44-G automatically selects the suitable power depending on your decision. To power the SMCWHSG44-G by the supplied power adapter: 1.
Fig. 5. Connecting Ethernet cables to SMCPWR-INJ3. 5. Check the “ACTIVE” LED: if power is successfully fed into the SMCWHSG44-G, the “ACTIVE” LED will be on (Red light); otherwise, the “ACTIVE” LED will be off. 6. If the electricity current is over the normal condition (Io°÷1.0 A), the “ACTIVE”...
Since the configuration/management protocol is HTTP-based, you have to make sure that the IP address of the managing computer and the IP address of the managed SMCWHSG44-G are in the same IP subnet (the default IP address of the SMCWHSG44-G is 192.168.2.1 and the default subnet mask is 255.255.255.0.) For ease of configuration you can set your computer to...
192.168.2.xxx (the default IP address of the SMCWHSG44-G is 192.168.2.1) and the subnet mask to 255.255.255.0.) It is preferred to set the computer to “obtain an IP address automatically” so the router will give your computer the correct settings automatically.
1.8.2. SETUP WIZARD Step 1: Selecting an Operational Mode • If the Router is to be used with a DSL or cable modem and the IP address assignment for the Ethernet WAN interface is achieved by PPPoE, select Router with a PPPoE-Based DSL/Cable Connection. •...
1.8.3.1. Router with a PPPoE-Based DSL/Cable Connection Fig. 12. TCP/IP Settings for Router with a PPPoE-Based If the SMCWHSG44-G is set to be in Router with a PPPoE-Based DSL/Cable Connection mode, two IP addresses are needed-one for the Ethernet LAN interface and the other for the WAN interface.
1.8.3.2. Router with a DHCP-Based DSL/Cable Connection Fig. 13. TCP/IP settings for Router with a DHCP-Based If the SMCWHSG44-G is set to be in 'Router with a DHCP-Based DSL/Cable Connection 'mode, two IP addresses are needed-one for the Ethernet LAN interface and the other for the WAN interface.
address is 192.168.2.1 and the default subnet mask is 255.255.255.0. In most cases, these default settings need no change. As for the WAN IP address, it must be manually set. Consult your ISP for the correct IP address, Default gateway, Subnet mask, Primary DNS server, and Secondary DNS server settings.
255.255.255.0. Fig. 17. DHCP Relay Settings. When the functionality is chosen to “DHCP Relay”, the SMCWHSG44-G will not assign any IP address to the clients. It forwards the received DHCP requests from the clients to the designate DHCP server. The only setting for DHCP relay is DHCP server IP address.
Web redirection is tried. A user, who fails in the first phase or uses a computer that does not support IEEE 802.1x, is given a second chance. In this way, the SMCWHSG44-G can serve both IEEE 802.1x-enabled and IEEE 802.1x-disabled wireless users.
3. Disable - Disable all Web-Redirection mechanisms. 1.8.6.2. Local Authentication Sever The SMCWHSG44-G supports local Authentication Sever capabilities for Hotspot venues where standard RADIUS or a Billing server(s) are difficult to implement. The local Authentication Server contains a built-in database for 2,000 user entries.
Page 35
• Amount of Money Per Unit: defines the money to be charged per unit. • Unit of Session time (min): defines the time frame (by min) for the user to access the Internet. Default is '1' min. For example: x number of minutes = 1 Unit of Session Time •...
Y cable (both the control keypad and the Y cable can be found in the package of the SMCWHS-POS printer.) 2. Connect the Y cable to the COM port of the SMCWHSG44-G. 3. Open the web browser of the SMCWHSG44-G (see section 1.7).
If you want to do IEEE 802.1x-based user authentication, go to the Wireless\ Security section, and then change the Security mode setting to an IEEE 802.1x-related option according to your needs. The SMCWHSG44-G supports IEEE 802.1x EAP-MD5 and EAP-TLS authentication methods. Click Save...
1.8.6.5 Configuring RADIUS Settings The RADIUS client on the SMCWHSG44-G works in conjunction with the Web redirection component and IEEE 802.1x component for wireless user authen- tication. The Web redirection and IEEE 802.1x components are responsible for acquiring user credential information, and the RADIUS client communi- cates with a back-end RADIUS server using the user credential information.
(as WAN 1) of the SMCWHSG44-G and another modem is connected to the LAN 1 port (as WAN 2) of the SMCWHSG44-G. Two APs are connected to the LAN 2 port and LAN 3 port, respectively. Finally, a RADIUS server is con- nected to the LAN 4 port of the SMCWHSG44-G.
IP addresses of the client computers and the IP address of the Router are in the same IP subnet. If the SMCWHSG44-G is to be used in a Hotspot, the client computers must be set to obtain IP addresses automatically by DHCP.
1.11. Confirming the Settings of the SMCWHSG44-G and Client Computers To make sure you have correctly set up the SMCWHSG44-G for Web redirec- tion-based authentication or not, follow the procedure below: 1. Establish a wireless link from the wireless client computer or PDA to an AP that is controlled by the SMCWHSG44-G or to the SMCWHSG44-G itself.
Page 42
7. If the user name or password is invalid, you will be prompted to try again or cancel the authentication process. Fig. 33. Authentication Failure. NOTE: If IEEE 802.1x capability of the SMCWHSG44-G is enabled, the user of an IEEE 802.1x-compliant wireless client computer is authenticated by IEEE 802.1x rather than by Web redirection.
• SETUP WIZARD. Basic Steps for you to quickly set up the Wireless Hotspot Gateway. • SYSTEM. Global operations. • Operational Mode. Operational mode of the SMCWHSG44-G based on the type of the Internet connection provided by the ISP. • Password Settings. For gaining rights to change or view the settings and status of the Router.
Page 44
• Load Balancing. Settings for the WAN ports load-balancing policy by Port or IP address range. • Zero Client Reconfiguration. Settings for wireless clients to associate to SMCWHSG44-G without any network setting modifications. • Wireless. IEEE 802.11-related settings. • Communication. Settings for the IEEE 802.11b/g interface of the SMCWHSG44-G to work properly with wireless clients.
SMCWHSG44-G. Authenticated users can also be terminated in this table. • Account Table. Manually generates new users, or is automatically populated with accounts after entering amount of time required via the keypad. • Session list. Display the status of session traffic •...
2.2.2. Authenticated Users Fig. 38. Authenticated Users. On this page, the status information of each authenticated user, including its current idle time, user name, IP address, MAC address, and status, is shown. In addition, you can click the Detail link in the Statistics column to see more detailed statistics information, such as Input packets, Output packets, Input bytes, and Output bytes.
On this page, all the registered users in local user database are shown. An activated user is identified by its MAC address, login time and the 'Active' display under the 'Status' column. 2.2.4. Session List Fig. 42. Latest Outgoing User Traffic Sessions. Fig.
2.3. SYSTEM 2.3.1. Specifying Operational Mode On this page, you can specify the operational mode for the Router. Currently, 5 modes are available: • Router with a PPPoE-based DSL/Cable Connection. In this mode, the Router assumes that a DSL or cable modem is connected to its Ethernet WAN interface.
On this page, you can change the user name and password of the administra- tor. The administrator can view and modify the configuration of the SMCWHSG44-G. The new password must be typed twice for confirmation. 2.3.3. Managing Firmware Fig. 47. Firmware Management Protocol Setting.
1. Click Back Up. 2. You'll be prompted to open or save the configuration file. Click Save. 3. The configuration file is named by the SMCWHSG44-G _backup.hex. Don't change the con-figuration file name in the Save As dialog box. Select a folder in which the configuration file is to be stored.
2.3.3.3. Upgrading Firmware by TFTP When using TFTP as the firmware management protocol, you can configure settings for the SMCWHSG44-G's TFTP client to communicate with a TFTP server. If the TFTP client does not get a response from the TFTP server within a period specified by the Timeout setting, it will resend the previous request.
NOTE: Make sure the Accept read requests check box of TFTP Server is selected. NOTE: The LAN IP address of the SMCWHSG44-G and the IP address of the TFTP server must be in the same IP subnet for TFTP to work.
Page 53
Ethernet cable. 3. Configure the IP address of the computer so that the computer and the SMCWHSG44-G are in the same IP subnet. On the computer, run the TFTP Server utility. And specify the folder in which the configuration backup file resides.
And you should specify the Time zone according to where you are. 2.4. Configuring TCP/IP Related Settings 2.4.1. Address The addressing settings depend on the operational mode of the SMCWHSG44-G. Each operational mode requires different addressing settings. 2.4.1.1. Router with a PPPoE-Based DSL/Cable Connection Fig.
Fig. 58. TCP/IP Settings for Router with a DHCP-Based DSL/Cable Connection Mode. If the SMCWHSG44-G was set to be in Router with a DHCP-Based DSL/Cable Connection mode, two IP addresses are needed-one for the Ethernet LAN interface and the other for the WAN interface. The LAN IP address must be set manually to a private IP address, say 192.168.0.xxx.
As for the WAN IP address, it is obtained by DHCP from the ISP. The Trigger mode setting affects the behavior of the DHCP client of the Router. In Auto mode, you don't have to worry about the DHCP process; the device takes care of everything.
IP address response will also be forwarded by the DNS Proxy. The benefit is to allow the wireless clients to point the DNS to the IP address of the SMCWHSG44-G, no remote DNS IP address is required to be set on the wireless clients.
The SMCWHSG44-G provides the Host Address Resolution to provide the local DNS server capability. The Host Address Resolution (local DNS server) function of SMCWHSG44-G will respond to the DNS request of wireless clients and reply the requested destination IP address. The benefits for local DNS server is that there is no Internet traffic (request going out through WAN port) required for local queries, hence it lowers the Internet traffic.
2.4.3.2. Virtual Server Mappings The SMCWHSG44-G enables you to expose internal servers on the intranet through NAT to the Internet for public use. The exposed internal servers are called virtual servers because from the perspective of hosts on the Internet, these servers are invisible in terms of TCP/IP.
Basic Fig. 65. Basic DHCP server settings. The SMCWHSG44-G can automatically assign IP addresses to client comput- ers by DHCP. In this section of the management page, you can specify the Default gateway, Subnet mask, Primary DNS server, and Secondary DNS server settings that will be sent to a client at its request.
WAN interface. Fig. 68. Load Balancing Mechanism. In addition, the SMCWHSG44-G can also set the load balancing policy by Port or IP range, so that the traffic of specified Port or IP range will be...
Fig. 70. Zero Client Reconfiguration Settings. The SMCWHSG44-G provides the 'Zero Client Reconfiguration' function to allow the wireless clients that associate to the SMCWHSG44-G the ability to not make any network setting modifications. This feature is useful in case users already have static IP information or IP addressing set for another network.
Traditionally, access points are connected by Ethernet. By Wireless Distribution System (WDS), APs can communicate with one another wirelessly. For example, in Fig. 72, the SMCWHSG44-G acts as an access point for the notebook computers and it forwards packets sent from the notebook computers to the AP/bridge through WDS.
Page 64
In this way, the SMCWHSG44-G plays a role of “AP repeater.” NOTE: The SMCWHSG44-G can have up to 6 WDS links to other wireless AP/bridge. Fig. 73. Wireless Distribution System Settings. To enable a WDS link: 1. Specify the MAC address of the AP or wireless bridge at the other end of the WDS link.
Hotspot. When the Wireless client isolation setting is set to This AP Only, wireless clients (STAs) associated to this SMCWHSG44-G, which acts as an AP, cannot see each other, and wireless-to-wireless traffic between the STAs is blocked.
Page 66
AP protocol to share their STA association information to block wireless traffic among all the STAs. There are up to 7 security modes: supported by the SMCWHSG44-G (based on WEP, WPA or Authentication Algorithm) • Open System. No authentication, no data encryption.
• IEEE 802.1x EAP with Dynamic TKIP (WPA). This is a full WPA mode, in which both the TKIP and IEEE 802.1x dynamic key exchange mechanisms are enabled. The SMCWHSG44-G is highly secure in this mode. In the above security modes, a back-end RADIUS (Remote Authentication Dial-In User Service) server is needed if IEEE 802.1x functionality is enabled.
With MAC-Address-Based Access Control, you can specify the wireless clients (STAs or Bridge Slaves) that are permitted or not permitted to asso- ciate with the SMCWHSG44-G. When the table type is set to inclusive, entries in the table are permitted to associate and all other users are blocked.
Page 69
Fig. 80. IEEE 802.1x and RADIUS. The SMCWHSG44-G supports IEEE 802.1x and can be configured to commu- nicate with two RA-DIUS servers. When the primary RADIUS server fails to respond, the SMCWHSG44-G will try to communicate with the secondary RADIUS server.
2.6. Configuring Authentication Settings The SMCWHSG44-G supports both IEEE 802.1x-based and Web redirection-based user authentication. Here is a brief description of how Web redirection works: When an unauthen- ticated wireless user is trying to access a Web page, a logon page is shown instead of the requested page, so that the user can type his/her user name and password for authentication.
2.6.1. AAA 2.6.1.1. Basic Fig. 83. Web-Redirection Enabled with Authentication. There are three modes for Web redirection-Enabled with Authentication, Enabled without Authentication, and Disabled. In Enabled with Authentication mode, you have two options. Radius Authenticaion or Local Authentication built into the SMCWHS44-G. Currently for Radius Authentication EAP-MD5, PAP, and CHAP are supported.
Page 72
NOTE: Because your customized versions of authentication pages have to contain references to the SMCWHSG44-G's LAN IP address (192.168.2.1 by default). If the LAN IP address of the Wireless Hotspot Gateway is changed, you must remember to change the IP address references in your customized pages.
There are occasions on which you want some computers to be able to freely access the Internet without being authenticated first. For example, you may want your wired desktop computers connected with the SMCWHSG44-G to be uncontrolled while providing wireless Internet access service for your customers with wireless laptop computers.
2.6.1.3. Walled Garden Fig. 89. Walled Garden Settings. IP addresses or URLs in the walled garden can be accessed without authen- tication. This feature is useful for WISPs to do advertisement. For example, a WISP can set up a Web server to contain advertisement information for users who have not subscribed to its wireless Internet service.
RADIUS server after failing to communicate with the primary RA-DIUS server. The SMCWHSG44-G and its RADIUS server(s) share a secret key so that they can authenticate each other. In addition to its IP address, the SMCWHSG44-G can identify itself by an NAS (Network Access Server) iden- tifier.
2.6.3. Authentication Session Control Fig. 92. Authentication Session Control Settings. Authentication session control settings are for controlling the lifetimes of user authentication sessions. The Idle timeout setting specifies how long a user can be idle without generating any traffic before being terminated. The Session timeout setting specifies the maximum session lifetime.
Page 77
Fig. 94. Authentication Success Page Customization Settings. Fig. 95. Authentication Failure Page Customization Settings. In addition to the Text alignment, HTML title, and Contents setting, two more settings are provided for specifying the size of the Log-Off window (Windows width and Window height). Fig.
Fig. 97. Advertisement Links Settings. Fig. 98. Advertisement Links in Action. 2.7. DDNS Fig. 99. Dynamic DNS Settings. With the help of dynamic DNS (DDNS) services provided by dyndns.org or no-ip.com, you can make your device automatically register the IP address it obtains dynamically by PPPoE or DHCP with the DDNS servers.
2.8. Configuring Advanced Settings 2.8.1. Filters and Firewall 2.8.1.1. Packet Filters You can specify rules for the firewall component of the Router to check outgoing packets. Packets that meet the rules can be permitted or denied. The protocol field, source IP address field, destination IP address field, and destination port field of a packet's IP header are inspected to see if it meets a rule.
To set a rule for packet filtering: 1. Specify the protocol type, source IP address, source IP mask, destination IP address, destination IP mask, and destination port for the rule. Then specify in the Action setting how to deal with a packet that meets the rule. 2.
2.8.1.4. URL Filters Fig. 103. URL Filters Settings. The SMCWHSG44-G is capable of blocking HTTP traffic from the intranet to specified unwelcome Web sites. To block HTTP traffic to an unwelcome Web site: 1. Specify the URL (ex. www.xxx.com) of the unwelcome Web site.
Router. 2.8.2.3. System Log System events can be logged to the on-board RAM of the SMCWHSG44-G (Local log) or sent in the form of SNMP trap (Remote log by SNMP trap) or BSD Syslog (Remote log by BSD Syslog) to a remote SNMP trap monitoring server or remote Syslog server, respectively.
3. Select the corresponding check box next to the IP address text box. 2.8.3. Access Rules The SMCWHSG44-G provides the 'Access Rules' to permit/deny the wireless users access in specified date/time frame. To specify the SMCWHSG44-G access rule with the date/time frame: 1.
2.8.4. LAN Device Management Fig. 110. LAN Device Management Settings. LAN device management is for the SMCWHSG44-G to pass management requests from the Internet through its built-in NAT server to devices on the private network. As a result, network devices (such as access points) behind the NAT server can be managed from the Internet.
Page 85
and Device Port. In other words, this request is passed through the built-in NAT server of the Router and routed to the corresponding man-aged LAN device. For example, Fig. 111 illustrates a LAN device management scenario based on the settings values in Fig. 110. AP1 can be managed from the management server by using a Web browser and a URL “http://61.16.31.110:60001”.
There are several LED indicators on the housing of a Router. They are defined as follows: • PWR : Power • ALV : Alive. Blinks when the SMCWHSG44-G is working normally. • RF : IEEE 802.11b/g interface activity • WAN/LAN : Ethernet WAN/LAN interface activity Appendix B: Troubleshooting Check the following first: •...
Internet by the host's domain name (e.g. http://www.smc.com), it first sends a DNS request to a DNS server on the Internet. The DNS request travels first to the SMCWHSG44-G, then the SMCWHSG44-G relays this request to the default gateway of the SMCWHSG44-G through a modem. Finally, this request is forwarded by the default gateway to the DNS server on the Internet.
Page 89
SMCWHSG44-G may be really down or there are other communication problems on the network backbone. • The DNS server(s) of the SMCWHSG44-G do not respond to ping from the client computer. • Solve the preceding problems first.
• Check the operating mode of the WLAN NIC. • Is the SSID of the WLAN NIC identical to that of the prospective SMCWHSG44-G? • Check the SSID setting of the WLAN NIC and of the SMCWHSG44-G. • Is the Security functionality of the prospective SMCWHSG44-G enabled? •...
Appendix C: Distances and Data Rates Important Notice: Maximum distances posted below are actual tested dis- tance thresholds. However, there are many variables such as barrier compo- sition and construction and local environmental interference that may impact your actual distances and cause you to experience distance thresh- olds far lower than those we post below.
Electromagnetic Compatibility • FCC Class B • Industry Canada • CE • ETS 300.328; ETS 300 826 Power Supply • Input: 100VAC 60Hz • Output: 12VDC, 1A Dimensions (without antenna) • 8. x 5.5 x 1.25 in • 21.6 x 14 x 3.2 cm Weight •...
Glossary 10BASE-T IEEE 802.3 specification for 10 Mbps Ethernet over two pairs of Category 3 or better UTP cable. 100BASE-TX IEEE 802.3u specification for 100 Mbps Fast Ethernet over two pairs of Category 5 or better UTP cable. Access Point A networking device that seamlessly connects wired and wireless networks.
Page 95
Dynamic Host Configuration Protocol (DHCP) Provides a framework for passing configuration information to hosts on a TCP/IP network. DHCP is based on the Bootstrap Protocol (BOOTP), adding the capability of automatic allocation of reusable network addresses and additional configuration options. Encryption Data passing between the access point and clients can use encryption to protect from interception and eavesdropping.
Page 96
Infrastructure An integrated wireless and wired LAN is called an infrastructure configuration. Inter Access Point Protocol (IAPP) A protocol that specifies the wireless signaling required to ensure the suc- cessful handover of wireless clients roaming between different 802.11f-com- pliant access points. Local Area Network (LAN) A group of interconnected computer and support devices.
Page 97
Service Set Identifier (SSID) An identifier that is attached to packets sent over the wireless LAN and functions as a password for joining a particular radio cell; i.e., Basic Service Set (BSS). Session Key Session keys are unique to each client, and are used to authenticate a client connection, and correlate traffic passing between a specific client and the access point.
Page 98
802.11 wireless networks. Wired Equivalent Privacy (WEP) WEP is based on the use of security keys and the popular RC4 encryption algorithm. Wireless de-vices without a valid WEP key will be excluded from network traffic. WPA Pre-shared Key (PSK) PSK can be used for small office networks that may not have the resources to configure and maintain a RADIUS server, WPA provides a simple operating mode that uses just a pre-shared password for network access.
Need help?
Do you have a question about the EliteConnect SMCWHSG44-G and is the answer not in the manual?
Questions and answers