SMC Networks EliteConnect SMCWHSG44-G User Manual

2.4ghz 802.11g wireless hotspot gateway
Hide thumbs Also See for EliteConnect SMCWHSG44-G:
Table of Contents

Advertisement

Quick Links

S M C W H S G 4 4 - G

Advertisement

Table of Contents
loading

Summary of Contents for SMC Networks EliteConnect SMCWHSG44-G

  • Page 1 S M C W H S G 4 4 - G...
  • Page 3 Copyright Information furnished by SMC Networks, Inc. (SMC) is believed to be accu- rate and reliable. How-ever, no responsibility is assumed by SMC for its use, nor for any infringements of patents or other rights of third parties which may result from its use. No license is granted by implication or otherwise under any patent or patent rights of SMC.
  • Page 4 LIMITED WARRANTY Limited Warranty Statement: SMC Networks, Inc. (“SMC”) warrants its products to be free from defects in workmanship and materials, under normal use and service, for the applicable warranty term. All SMC products carry a standard 90-day limited warranty from the date of purchase from SMC or its Authorized Reseller.
  • Page 5 SMC price list. Under the limited lifetime warranty, internal and external power supplies, fans, and cables are covered by a standard one-year warranty from date of purchase. SMC Networks, Inc. 38 Tesla Irvine, CA 92618 Warranty in EMEA and Asia Pacific: For details regarding warranty in EMEA and Asia Pacific, please contact your country sales representative.
  • Page 6 Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
  • Page 7 EC Conformance Declaration SMC contact for these products in Europe is: SMC Networks Spain S.L., Edificio Conata II, Calle Fructuós Gelabert 6-8, 2o, 4a, 08970 - Sant Joan Despí, Barcelona, Spain. Signed and dated Copy of the Declaration of Conformity can be found in the product section of www.smc-europe.com...
  • Page 8: Safety Compliance

    to other system. The user is obligated to ensure the device is operating according to the channel limitations, indoor/outdoor restrictions and license requirements for each European Community country as described in this document. • This device may be operated indoors or outdoors in all countries of the European Community using the 2.4 GHz band: Channels 1 - 13, except where noted below.
  • Page 9 Important! Before making connections, make sure you have the correct cord set. Check it (read the label on the cable) against the following: Power Cord Set U.S.A. and Canada Denmark Switzerland U.K. Europe Veuillez lire à fond l'information de la sécurité suivante avant d'installer le Switch: AVERTISSEMENT: L'installation et la dépose de ce groupe doivent être confiés à...
  • Page 10 • La prise secteur doit se trouver à proximité de l'appareil et son accès doit être facile. Vous ne pouvez mettre l'appareil hors circuit qu'en débranchant son cordon électrique au niveau de cette prise. • L'appareil fonctionne à une tension extrêmement basse de sécurité qui est conforme à...
  • Page 11 Wichtige Sicherheitshinweise (Germany) 1. Bitte lesen Sie diese Hinweise sorgfältig durch. 2. Heben Sie diese Anleitung für den späteren Gebrauch auf. 3. Vor jedem Reinigen ist das Gerät vom Stromnetz zu trennen. Verwenden Sie keine Flüs-sigoder Aerosolreiniger. Am besten eignet sich ein ange- feuchtetes Tuch zur Reinigung.
  • Page 12 Der arbeitsplatzbezogene Schalldruckpegel nach DIN 45 635 Teil 1000 beträgt 70dB(A) oder weniger. Stromkabel. Dies muss von dem Land, in dem es be-nutzt wird geprüft werden: U.S.A und Canada Danemark Schweiz Europe Der Cord muß das UL gepruft und war das CSA beglaubigt.
  • Page 14: Table Of Contents

    1.5. Selecting a Power Supply Method 1.6. Mounting the SMCWHSG44-G on a Wall 1.7. Preparing for Configuration 1.7.1. Connecting the Managing Computer and the SMCWHSG44-G 1.7.2. Changing the TCP/IP Settings of the Managing Computer 1.8. Configuring the SMCWHSG44-G 1.8.1. Entering the Password 1.8.2.
  • Page 15 1.11. Confirming the Settings of the SMCWHSG44-G and Client Computers 2. Using Web-Based Network Manager 2.1. Overview 2.1.1. Menu Structure 2.1.2. Save, Save & Restart, and Cancel Commands 2.1.3. Home and Refresh Commands 2.2. Status 2.2.1. Associated Wireless Clients 2.2.2. Authenticated Users 2.2.3.
  • Page 16 2.4.3.1. Basic 2.4.3.2. Virtual Server Mappings 2.4.4. DHCP Server 2.4.4.1. DHCP Server i. Basic ii. Static DHCP Mappings 2.4.4.2. DHCP Relay 2.4.5. Load Balancing 2.4.6. Zero Client Reconfiguration 2.5. Configuring IEEE 802.11-Related Settings 2.5.1. Wireless 2.5.1.1. Basic 2.5.1.2. Wireless Distribution System 2.5.2.
  • Page 17 2.8.4. LAN Device Management Appendix A A-1: Default Settings A-2: LED Definitions Appendix B: Troubleshooting B-1: TCP/IP Setting Problems B-2: Wireless Settings Problems B-3: Other Problems Appendix C: Distances and Data Rates Appendix D: Technical Specifications D-1: SMCWHSG44-G D-2: SMCWHS-POS D-3: Keypad Glossary...
  • Page 18: Introduction

    The EliteConnect 2.4GHz 802.11g Wireless Hotspot Gateway (SMCWHSG44-G) enables VARs, WISPs and System Integrators to install secure, easy to manage Hotspots as a one-box solution. The features of the SMCWHSG44-G support applications that are well suited for Hotspot environments such as coffee...
  • Page 19: Overview

    RADIUS server for authentication or via the Local Authentication Database. • Local pages or external pages - The SMCWHSG44-G can be configured to use log-on, log-off, authentication success, and authentication failure pages, which are stored internally or stored in an external Web server maintained by the WISP.
  • Page 20 • Internet Connection Sharing • DNS proxy - The SMCWHSG44-G can forward DNS (Domain Name System) requests from client computers to DNS servers on the Internet. And DNS responses from the DNS servers can be forwarded back to the client computers.
  • Page 21 Ethernet LAN interface can be blocked. • Configurable MAC Address of the Ethernet WAN Interface - Some ADSL modems work only with Ethernet cards provided by the ISP. If SMCWHSG44-G is used in such an environment, the MAC address of the WAN interface of the Router has to be changed to the MAC address of the ISP-provided Ethernet network card.
  • Page 22 • SNTP - Support for system time by SNTP (Simple Network Time Protocol). • Dynamic DNS - Support for dynamic DNS services provided by dyndns.org and no-ip.com, so that the SMCWHSG44-G can be associated with a domain name even if it obtains an IP address dynamically by PPP, PPPoE or DHCP.
  • Page 23: Package Checklist

    • 2 dBi Dipole Antenna 1.3. LED Definition • PWR : Power • ALIVE : Blinks when the SMCWHSG44-G is working normally. • RF : IEEE 802.11b/g interface activity • WAN/LAN : Ethernet WAN/LAN interface activity 1.4. Rear Panel • +12V DC : AC/DC power jack (12VDC input) •...
  • Page 24: Selecting A Power Supply Method

    1.5. Selecting a Power Supply Method The SMCWHSG44-G can be powered by either the supplied AC power adapter or the optional SMCPWR-INJ3 EliteConnect™ Power Injector. The SMCWHSG44-G automatically selects the suitable power depending on your decision. To power the SMCWHSG44-G by the supplied power adapter: 1.
  • Page 25: Mounting The Smcwhsg44-G On A Wall

    Fig. 5. Connecting Ethernet cables to SMCPWR-INJ3. 5. Check the “ACTIVE” LED: if power is successfully fed into the SMCWHSG44-G, the “ACTIVE” LED will be on (Red light); otherwise, the “ACTIVE” LED will be off. 6. If the electricity current is over the normal condition (Io°÷1.0 A), the “ACTIVE”...
  • Page 26: Preparing For Configuration

    Since the configuration/management protocol is HTTP-based, you have to make sure that the IP address of the managing computer and the IP address of the managed SMCWHSG44-G are in the same IP subnet (the default IP address of the SMCWHSG44-G is 192.168.2.1 and the default subnet mask is 255.255.255.0.) For ease of configuration you can set your computer to...
  • Page 27: Configuring The Smcwhsg44-G

    192.168.2.xxx (the default IP address of the SMCWHSG44-G is 192.168.2.1) and the subnet mask to 255.255.255.0.) It is preferred to set the computer to “obtain an IP address automatically” so the router will give your computer the correct settings automatically.
  • Page 28: Setup Wizard Step 1: Selecting An Operational Mode

    1.8.2. SETUP WIZARD Step 1: Selecting an Operational Mode • If the Router is to be used with a DSL or cable modem and the IP address assignment for the Ethernet WAN interface is achieved by PPPoE, select Router with a PPPoE-Based DSL/Cable Connection. •...
  • Page 29: Setup Wizard Step 2: Configuring Tcp/Ip Settings

    1.8.3.1. Router with a PPPoE-Based DSL/Cable Connection Fig. 12. TCP/IP Settings for Router with a PPPoE-Based If the SMCWHSG44-G is set to be in Router with a PPPoE-Based DSL/Cable Connection mode, two IP addresses are needed-one for the Ethernet LAN interface and the other for the WAN interface.
  • Page 30: Router With A Dhcp-Based Dsl/Cable Connection

    1.8.3.2. Router with a DHCP-Based DSL/Cable Connection Fig. 13. TCP/IP settings for Router with a DHCP-Based If the SMCWHSG44-G is set to be in 'Router with a DHCP-Based DSL/Cable Connection 'mode, two IP addresses are needed-one for the Ethernet LAN interface and the other for the WAN interface.
  • Page 31: Router With Multiple Dsl/Cable Connections

    address is 192.168.2.1 and the default subnet mask is 255.255.255.0. In most cases, these default settings need no change. As for the WAN IP address, it must be manually set. Consult your ISP for the correct IP address, Default gateway, Subnet mask, Primary DNS server, and Secondary DNS server settings.
  • Page 32: Setup Wizard Step 3: Configuring Dhcp Server Settings

    255.255.255.0. Fig. 17. DHCP Relay Settings. When the functionality is chosen to “DHCP Relay”, the SMCWHSG44-G will not assign any IP address to the clients. It forwards the received DHCP requests from the clients to the designate DHCP server. The only setting for DHCP relay is DHCP server IP address.
  • Page 33: Configuring User Authentication Settings

    Web redirection is tried. A user, who fails in the first phase or uses a computer that does not support IEEE 802.1x, is given a second chance. In this way, the SMCWHSG44-G can serve both IEEE 802.1x-enabled and IEEE 802.1x-disabled wireless users.
  • Page 34: Local Authentication Sever

    3. Disable - Disable all Web-Redirection mechanisms. 1.8.6.2. Local Authentication Sever The SMCWHSG44-G supports local Authentication Sever capabilities for Hotspot venues where standard RADIUS or a Billing server(s) are difficult to implement. The local Authentication Server contains a built-in database for 2,000 user entries.
  • Page 35 • Amount of Money Per Unit: defines the money to be charged per unit. • Unit of Session time (min): defines the time frame (by min) for the user to access the Internet. Default is '1' min. For example: x number of minutes = 1 Unit of Session Time •...
  • Page 36: How To Setup The Mini-Pos Ticket Printer

    Y cable (both the control keypad and the Y cable can be found in the package of the SMCWHS-POS printer.) 2. Connect the Y cable to the COM port of the SMCWHSG44-G. 3. Open the web browser of the SMCWHSG44-G (see section 1.7).
  • Page 37: Ieee 802.1X

    If you want to do IEEE 802.1x-based user authentication, go to the Wireless\ Security section, and then change the Security mode setting to an IEEE 802.1x-related option according to your needs. The SMCWHSG44-G supports IEEE 802.1x EAP-MD5 and EAP-TLS authentication methods. Click Save...
  • Page 38: Configuring Radius Settings

    1.8.6.5 Configuring RADIUS Settings The RADIUS client on the SMCWHSG44-G works in conjunction with the Web redirection component and IEEE 802.1x component for wireless user authen- tication. The Web redirection and IEEE 802.1x components are responsible for acquiring user credential information, and the RADIUS client communi- cates with a back-end RADIUS server using the user credential information.
  • Page 39: Deploying The Smcwhsg44-G

    (as WAN 1) of the SMCWHSG44-G and another modem is connected to the LAN 1 port (as WAN 2) of the SMCWHSG44-G. Two APs are connected to the LAN 2 port and LAN 3 port, respectively. Finally, a RADIUS server is con- nected to the LAN 4 port of the SMCWHSG44-G.
  • Page 40: Configuring Ieee 802.11-Related Settings

    IP addresses of the client computers and the IP address of the Router are in the same IP subnet. If the SMCWHSG44-G is to be used in a Hotspot, the client computers must be set to obtain IP addresses automatically by DHCP.
  • Page 41: Confirming The Settings Of The Smcwhsg44-G And Client Computers

    1.11. Confirming the Settings of the SMCWHSG44-G and Client Computers To make sure you have correctly set up the SMCWHSG44-G for Web redirec- tion-based authentication or not, follow the procedure below: 1. Establish a wireless link from the wireless client computer or PDA to an AP that is controlled by the SMCWHSG44-G or to the SMCWHSG44-G itself.
  • Page 42 7. If the user name or password is invalid, you will be prompted to try again or cancel the authentication process. Fig. 33. Authentication Failure. NOTE: If IEEE 802.1x capability of the SMCWHSG44-G is enabled, the user of an IEEE 802.1x-compliant wireless client computer is authenticated by IEEE 802.1x rather than by Web redirection.
  • Page 43: Using Web-Based Network Manager

    • SETUP WIZARD. Basic Steps for you to quickly set up the Wireless Hotspot Gateway. • SYSTEM. Global operations. • Operational Mode. Operational mode of the SMCWHSG44-G based on the type of the Internet connection provided by the ISP. • Password Settings. For gaining rights to change or view the settings and status of the Router.
  • Page 44 • Load Balancing. Settings for the WAN ports load-balancing policy by Port or IP address range. • Zero Client Reconfiguration. Settings for wireless clients to associate to SMCWHSG44-G without any network setting modifications. • Wireless. IEEE 802.11-related settings. • Communication. Settings for the IEEE 802.11b/g interface of the SMCWHSG44-G to work properly with wireless clients.
  • Page 45: Save, Save & Restart, And Cancel Commands

    SMCWHSG44-G. Authenticated users can also be terminated in this table. • Account Table. Manually generates new users, or is automatically populated with accounts after entering amount of time required via the keypad. • Session list. Display the status of session traffic •...
  • Page 46: Authenticated Users

    2.2.2. Authenticated Users Fig. 38. Authenticated Users. On this page, the status information of each authenticated user, including its current idle time, user name, IP address, MAC address, and status, is shown. In addition, you can click the Detail link in the Statistics column to see more detailed statistics information, such as Input packets, Output packets, Input bytes, and Output bytes.
  • Page 47: Session List

    On this page, all the registered users in local user database are shown. An activated user is identified by its MAC address, login time and the 'Active' display under the 'Status' column. 2.2.4. Session List Fig. 42. Latest Outgoing User Traffic Sessions. Fig.
  • Page 48: System

    2.3. SYSTEM 2.3.1. Specifying Operational Mode On this page, you can specify the operational mode for the Router. Currently, 5 modes are available: • Router with a PPPoE-based DSL/Cable Connection. In this mode, the Router assumes that a DSL or cable modem is connected to its Ethernet WAN interface.
  • Page 49: Changing Password

    On this page, you can change the user name and password of the administra- tor. The administrator can view and modify the configuration of the SMCWHSG44-G. The new password must be typed twice for confirmation. 2.3.3. Managing Firmware Fig. 47. Firmware Management Protocol Setting.
  • Page 50: Upgrading Firmware By Http

    1. Click Back Up. 2. You'll be prompted to open or save the configuration file. Click Save. 3. The configuration file is named by the SMCWHSG44-G _backup.hex. Don't change the con-figuration file name in the Save As dialog box. Select a folder in which the configuration file is to be stored.
  • Page 51: Upgrading Firmware By Tftp

    2.3.3.3. Upgrading Firmware by TFTP When using TFTP as the firmware management protocol, you can configure settings for the SMCWHSG44-G's TFTP client to communicate with a TFTP server. If the TFTP client does not get a response from the TFTP server within a period specified by the Timeout setting, it will resend the previous request.
  • Page 52: Backing Up And Restoring Configuration Settings By Tftp

    NOTE: Make sure the Accept read requests check box of TFTP Server is selected. NOTE: The LAN IP address of the SMCWHSG44-G and the IP address of the TFTP server must be in the same IP subnet for TFTP to work.
  • Page 53 Ethernet cable. 3. Configure the IP address of the computer so that the computer and the SMCWHSG44-G are in the same IP subnet. On the computer, run the TFTP Server utility. And specify the folder in which the configuration backup file resides.
  • Page 54: Resetting Configuration To Factory Defaults

    And you should specify the Time zone according to where you are. 2.4. Configuring TCP/IP Related Settings 2.4.1. Address The addressing settings depend on the operational mode of the SMCWHSG44-G. Each operational mode requires different addressing settings. 2.4.1.1. Router with a PPPoE-Based DSL/Cable Connection Fig.
  • Page 55: Router With A Dhcp-Based Dsl/Cable Connection

    Fig. 58. TCP/IP Settings for Router with a DHCP-Based DSL/Cable Connection Mode. If the SMCWHSG44-G was set to be in Router with a DHCP-Based DSL/Cable Connection mode, two IP addresses are needed-one for the Ethernet LAN interface and the other for the WAN interface. The LAN IP address must be set manually to a private IP address, say 192.168.0.xxx.
  • Page 56: Router With A Static-Ip Dsl/Cable Connection

    As for the WAN IP address, it is obtained by DHCP from the ISP. The Trigger mode setting affects the behavior of the DHCP client of the Router. In Auto mode, you don't have to worry about the DHCP process; the device takes care of everything.
  • Page 57: Router With Multiple Dsl/Cable Connections

    IP address response will also be forwarded by the DNS Proxy. The benefit is to allow the wireless clients to point the DNS to the IP address of the SMCWHSG44-G, no remote DNS IP address is required to be set on the wireless clients.
  • Page 58: Host Address Resolution

    The SMCWHSG44-G provides the Host Address Resolution to provide the local DNS server capability. The Host Address Resolution (local DNS server) function of SMCWHSG44-G will respond to the DNS request of wireless clients and reply the requested destination IP address. The benefits for local DNS server is that there is no Internet traffic (request going out through WAN port) required for local queries, hence it lowers the Internet traffic.
  • Page 59: Virtual Server Mappings

    2.4.3.2. Virtual Server Mappings The SMCWHSG44-G enables you to expose internal servers on the intranet through NAT to the Internet for public use. The exposed internal servers are called virtual servers because from the perspective of hosts on the Internet, these servers are invisible in terms of TCP/IP.
  • Page 60: Dhcp Server

    Basic Fig. 65. Basic DHCP server settings. The SMCWHSG44-G can automatically assign IP addresses to client comput- ers by DHCP. In this section of the management page, you can specify the Default gateway, Subnet mask, Primary DNS server, and Secondary DNS server settings that will be sent to a client at its request.
  • Page 61: Dhcp Relay

    WAN interface. Fig. 68. Load Balancing Mechanism. In addition, the SMCWHSG44-G can also set the load balancing policy by Port or IP range, so that the traffic of specified Port or IP range will be...
  • Page 62: Zero Client Reconfiguration

    Fig. 70. Zero Client Reconfiguration Settings. The SMCWHSG44-G provides the 'Zero Client Reconfiguration' function to allow the wireless clients that associate to the SMCWHSG44-G the ability to not make any network setting modifications. This feature is useful in case users already have static IP information or IP addressing set for another network.
  • Page 63: Wireless Distribution System

    Traditionally, access points are connected by Ethernet. By Wireless Distribution System (WDS), APs can communicate with one another wirelessly. For example, in Fig. 72, the SMCWHSG44-G acts as an access point for the notebook computers and it forwards packets sent from the notebook computers to the AP/bridge through WDS.
  • Page 64 In this way, the SMCWHSG44-G plays a role of “AP repeater.” NOTE: The SMCWHSG44-G can have up to 6 WDS links to other wireless AP/bridge. Fig. 73. Wireless Distribution System Settings. To enable a WDS link: 1. Specify the MAC address of the AP or wireless bridge at the other end of the WDS link.
  • Page 65: Security

    Hotspot. When the Wireless client isolation setting is set to This AP Only, wireless clients (STAs) associated to this SMCWHSG44-G, which acts as an AP, cannot see each other, and wireless-to-wireless traffic between the STAs is blocked.
  • Page 66 AP protocol to share their STA association information to block wireless traffic among all the STAs. There are up to 7 security modes: supported by the SMCWHSG44-G (based on WEP, WPA or Authentication Algorithm) • Open System. No authentication, no data encryption.
  • Page 67: Mac-Address-Based Access Control

    • IEEE 802.1x EAP with Dynamic TKIP (WPA). This is a full WPA mode, in which both the TKIP and IEEE 802.1x dynamic key exchange mechanisms are enabled. The SMCWHSG44-G is highly secure in this mode. In the above security modes, a back-end RADIUS (Remote Authentication Dial-In User Service) server is needed if IEEE 802.1x functionality is enabled.
  • Page 68: Ieee 802.1X/Radius

    With MAC-Address-Based Access Control, you can specify the wireless clients (STAs or Bridge Slaves) that are permitted or not permitted to asso- ciate with the SMCWHSG44-G. When the table type is set to inclusive, entries in the table are permitted to associate and all other users are blocked.
  • Page 69 Fig. 80. IEEE 802.1x and RADIUS. The SMCWHSG44-G supports IEEE 802.1x and can be configured to commu- nicate with two RA-DIUS servers. When the primary RADIUS server fails to respond, the SMCWHSG44-G will try to communicate with the secondary RADIUS server.
  • Page 70: Configuring Authentication Settings

    2.6. Configuring Authentication Settings The SMCWHSG44-G supports both IEEE 802.1x-based and Web redirection-based user authentication. Here is a brief description of how Web redirection works: When an unauthen- ticated wireless user is trying to access a Web page, a logon page is shown instead of the requested page, so that the user can type his/her user name and password for authentication.
  • Page 71: Aaa

    2.6.1. AAA 2.6.1.1. Basic Fig. 83. Web-Redirection Enabled with Authentication. There are three modes for Web redirection-Enabled with Authentication, Enabled without Authentication, and Disabled. In Enabled with Authentication mode, you have two options. Radius Authenticaion or Local Authentication built into the SMCWHS44-G. Currently for Radius Authentication EAP-MD5, PAP, and CHAP are supported.
  • Page 72 NOTE: Because your customized versions of authentication pages have to contain references to the SMCWHSG44-G's LAN IP address (192.168.2.1 by default). If the LAN IP address of the Wireless Hotspot Gateway is changed, you must remember to change the IP address references in your customized pages.
  • Page 73: Unrestricted Clients

    There are occasions on which you want some computers to be able to freely access the Internet without being authenticated first. For example, you may want your wired desktop computers connected with the SMCWHSG44-G to be uncontrolled while providing wireless Internet access service for your customers with wireless laptop computers.
  • Page 74: Walled Garden

    2.6.1.3. Walled Garden Fig. 89. Walled Garden Settings. IP addresses or URLs in the walled garden can be accessed without authen- tication. This feature is useful for WISPs to do advertisement. For example, a WISP can set up a Web server to contain advertisement information for users who have not subscribed to its wireless Internet service.
  • Page 75: Robustness

    RADIUS server after failing to communicate with the primary RA-DIUS server. The SMCWHSG44-G and its RADIUS server(s) share a secret key so that they can authenticate each other. In addition to its IP address, the SMCWHSG44-G can identify itself by an NAS (Network Access Server) iden- tifier.
  • Page 76: Authentication Session Control

    2.6.3. Authentication Session Control Fig. 92. Authentication Session Control Settings. Authentication session control settings are for controlling the lifetimes of user authentication sessions. The Idle timeout setting specifies how long a user can be idle without generating any traffic before being terminated. The Session timeout setting specifies the maximum session lifetime.
  • Page 77 Fig. 94. Authentication Success Page Customization Settings. Fig. 95. Authentication Failure Page Customization Settings. In addition to the Text alignment, HTML title, and Contents setting, two more settings are provided for specifying the size of the Log-Off window (Windows width and Window height). Fig.
  • Page 78: Ddns

    Fig. 97. Advertisement Links Settings. Fig. 98. Advertisement Links in Action. 2.7. DDNS Fig. 99. Dynamic DNS Settings. With the help of dynamic DNS (DDNS) services provided by dyndns.org or no-ip.com, you can make your device automatically register the IP address it obtains dynamically by PPPoE or DHCP with the DDNS servers.
  • Page 79: Configuring Advanced Settings

    2.8. Configuring Advanced Settings 2.8.1. Filters and Firewall 2.8.1.1. Packet Filters You can specify rules for the firewall component of the Router to check outgoing packets. Packets that meet the rules can be permitted or denied. The protocol field, source IP address field, destination IP address field, and destination port field of a packet's IP header are inspected to see if it meets a rule.
  • Page 80: Vlan

    To set a rule for packet filtering: 1. Specify the protocol type, source IP address, source IP mask, destination IP address, destination IP mask, and destination port for the rule. Then specify in the Action setting how to deal with a packet that meets the rule. 2.
  • Page 81: Url Filters

    2.8.1.4. URL Filters Fig. 103. URL Filters Settings. The SMCWHSG44-G is capable of blocking HTTP traffic from the intranet to specified unwelcome Web sites. To block HTTP traffic to an unwelcome Web site: 1. Specify the URL (ex. www.xxx.com) of the unwelcome Web site.
  • Page 82: Upnp

    Router. 2.8.2.3. System Log System events can be logged to the on-board RAM of the SMCWHSG44-G (Local log) or sent in the form of SNMP trap (Remote log by SNMP trap) or BSD Syslog (Remote log by BSD Syslog) to a remote SNMP trap monitoring server or remote Syslog server, respectively.
  • Page 83: Snmp

    3. Select the corresponding check box next to the IP address text box. 2.8.3. Access Rules The SMCWHSG44-G provides the 'Access Rules' to permit/deny the wireless users access in specified date/time frame. To specify the SMCWHSG44-G access rule with the date/time frame: 1.
  • Page 84: Lan Device Management

    2.8.4. LAN Device Management Fig. 110. LAN Device Management Settings. LAN device management is for the SMCWHSG44-G to pass management requests from the Internet through its built-in NAT server to devices on the private network. As a result, network devices (such as access points) behind the NAT server can be managed from the Internet.
  • Page 85 and Device Port. In other words, this request is passed through the built-in NAT server of the Router and routed to the corresponding man-aged LAN device. For example, Fig. 111 illustrates a LAN device management scenario based on the settings values in Fig. 110. AP1 can be managed from the management server by using a Web browser and a URL “http://61.16.31.110:60001”.
  • Page 86: Appendix A

    Appendix A A-1: Default Settings TIP: Press the reset button of a powered-on Router to reset the configuration settings to factory-set values.
  • Page 87: A-2: Led Definitions

    There are several LED indicators on the housing of a Router. They are defined as follows: • PWR : Power • ALV : Alive. Blinks when the SMCWHSG44-G is working normally. • RF : IEEE 802.11b/g interface activity • WAN/LAN : Ethernet WAN/LAN interface activity Appendix B: Troubleshooting Check the following first: •...
  • Page 88: B-1: Tcp/Ip Setting Problems

    Internet by the host's domain name (e.g. http://www.smc.com), it first sends a DNS request to a DNS server on the Internet. The DNS request travels first to the SMCWHSG44-G, then the SMCWHSG44-G relays this request to the default gateway of the SMCWHSG44-G through a modem. Finally, this request is forwarded by the default gateway to the DNS server on the Internet.
  • Page 89 SMCWHSG44-G may be really down or there are other communication problems on the network backbone. • The DNS server(s) of the SMCWHSG44-G do not respond to ping from the client computer. • Solve the preceding problems first.
  • Page 90: B-2: Wireless Settings Problems

    • Check the operating mode of the WLAN NIC. • Is the SSID of the WLAN NIC identical to that of the prospective SMCWHSG44-G? • Check the SSID setting of the WLAN NIC and of the SMCWHSG44-G. • Is the Security functionality of the prospective SMCWHSG44-G enabled? •...
  • Page 91: Appendix C: Distances And Data Rates

    Appendix C: Distances and Data Rates Important Notice: Maximum distances posted below are actual tested dis- tance thresholds. However, there are many variables such as barrier compo- sition and construction and local environmental interference that may impact your actual distances and cause you to experience distance thresh- olds far lower than those we post below.
  • Page 92: Appendix D: Technical Specifications

    Appendix D: Technical Specifications D-1: SMCWHSG44-G Standards • 802.11b • 802.11g • 802.3 • 802.3u • 802.3af Data Rate • 802.11g: 6, 9, 11, 12, 18, 24, 36, 48, 54 Mbps per channel • 802.11b: 1, 2, 5.5, 11 Mbps per channel Modulation Type •...
  • Page 93: D-2: Smcwhs-Pos

    Electromagnetic Compatibility • FCC Class B • Industry Canada • CE • ETS 300.328; ETS 300 826 Power Supply • Input: 100VAC 60Hz • Output: 12VDC, 1A Dimensions (without antenna) • 8. x 5.5 x 1.25 in • 21.6 x 14 x 3.2 cm Weight •...
  • Page 94: Glossary

    Glossary 10BASE-T IEEE 802.3 specification for 10 Mbps Ethernet over two pairs of Category 3 or better UTP cable. 100BASE-TX IEEE 802.3u specification for 100 Mbps Fast Ethernet over two pairs of Category 5 or better UTP cable. Access Point A networking device that seamlessly connects wired and wireless networks.
  • Page 95 Dynamic Host Configuration Protocol (DHCP) Provides a framework for passing configuration information to hosts on a TCP/IP network. DHCP is based on the Bootstrap Protocol (BOOTP), adding the capability of automatic allocation of reusable network addresses and additional configuration options. Encryption Data passing between the access point and clients can use encryption to protect from interception and eavesdropping.
  • Page 96 Infrastructure An integrated wireless and wired LAN is called an infrastructure configuration. Inter Access Point Protocol (IAPP) A protocol that specifies the wireless signaling required to ensure the suc- cessful handover of wireless clients roaming between different 802.11f-com- pliant access points. Local Area Network (LAN) A group of interconnected computer and support devices.
  • Page 97 Service Set Identifier (SSID) An identifier that is attached to packets sent over the wireless LAN and functions as a password for joining a particular radio cell; i.e., Basic Service Set (BSS). Session Key Session keys are unique to each client, and are used to authenticate a client connection, and correlate traffic passing between a specific client and the access point.
  • Page 98 802.11 wireless networks. Wired Equivalent Privacy (WEP) WEP is based on the use of security keys and the popular RC4 encryption algorithm. Wireless de-vices without a valid WEP key will be excluded from network traffic. WPA Pre-shared Key (PSK) PSK can be used for small office networks that may not have the resources to configure and maintain a RADIUS server, WPA provides a simple operating mode that uses just a pre-shared password for network access.
  • Page 100 Fax 46 (0) 887 62 62 Fax 34 93 477 3774 Fax 216-71751415 Fax 34 93 477 3774 Fax 7 (095) 789 357 Fax 86-10-6235-4962 Fax 886-2-87976288 Fax (65) 238 6466 Fax 82-2-553-7202 Fax 81-45-224-2331 Fax 61-2-8875-7777 Fax 91-22-8204443 Model Number: SMCWHSG44-G...

This manual is also suitable for:

Whsg44-g

Table of Contents