SMC Networks SMCWBR11S-N User's Manual

SMC Networks SMCWBR11S-N User's Manual
USER GUIDE
BarricadeTM N
150Mbps Wireless-N Mini Broadband Router
SMCWBR11S-N
BarricadeTM SMCWBR11S-N
User Guide
SMC Networks U.S.A
20 Mason
Irvine, CA 92618
Phone: (949) 679-8000
SMC Networks Europe
C/Fructuós Gelabert 6-8, 2o, 2a
Edificio Conata II
08970 Sant Joan Despí, Barcelona, Spain
Phone: +34 93 477 4920
March 2010
Pub. # 149100000057W
E032010-CS-R01
Information furnished by SMC Networks, Inc. (SMC) is believed to be accurate and reliable.
However, no responsibility is assumed by SMC for its use, nor for any infringements of patents or
other rights of third parties which may result from its use. No license is granted by implication or
otherwise under any patent or patent rights of SMC. SMC reserves the right to change specifications
at any time without notice.
Copyright © 2010 by
SMC Networks, Inc.
20 Mason
Irvine, CA 92618
All rights reserved
Trademarks:
SMC is a registered trademark; and Barricade, EZ Switch, TigerStack, TigerSwitch, and TigerAccess
are trademarks of SMC Networks, Inc. Other product and company names are trademarks or
registered trademarks of their respective holders.
WARRANTY AND PRODUCT REGISTRATION
To register SMC products and to review the detailed warranty statement,
please refer to the Support Section of the SMC Website at http://
www.smc.com.
– 4 –
COMPLIANCES
FEDERAL COMMUNICATION COMMISSION INTERFERENCE STATEMENT
This equipment has been tested and found to comply with the limits for a
Class B digital device, pursuant to Part 15 of the FCC Rules. These limits
are designed to provide reasonable protection against harmful interference
in a residential installation. This equipment generates, uses and can
radiate radio frequency energy and, if not installed and used in accordance
with the instructions, may cause harmful interference to radio
communications. This transmitter must not be co-located or operating in
conjunction with any other antenna or transmitter. However, there is no
guarantee that interference will not occur in a particular installation. If this
equipment does cause harmful interference to radio or television reception,
which can be determined by turning the equipment off and on, the user is
encouraged to try to correct the interference by one of the following
measures:
◆
Reorient or relocate the receiving antenna
◆
Increase the separation between the equipment and receiver
◆
Connect the equipment into an outlet on a circuit different from that to
which the receiver is connected
◆
Consult the dealer or an experienced radio/TV technician for help
This device complies with Part 15 of the FCC Rules. Operation is subject to
the following two conditions: (1) This device may not cause harmful
interference, and (2) this device must accept any interference received,
including interference that may cause undesired operation.
FCC Caution: Any changes or modifications not expressly approved by the
party responsible for compliance could void the user’s authority to operate
this equipment.
IEEE 802.11b or 802.11g operation of this product in the U.S.A. is
firmware-limited to channels 1 through 11.
IMPORTANT NOTE:
FCC RADIATION EXPOSURE STATEMENT
This equipment complies with FCC radiation exposure limits set forth for an
uncontrolled environment. This equipment should be installed and
operated with minimum distance 20 cm between the radiator and your
body.
– 5 –
COMPLIANCES
IC STATEMENT
This device complies with RSS-210 of the Industry Canada Rules.
Operation is subject to the following two conditions:
(1) this device may not cause interference, and (2) this device must accept
any interference, including interference that may cause undesired
operation of the device.
This device has been designed to operate with an antenna having a
maximum gain of 2.35 dBi. Antennas having a higher gain are strictly
prohibited per regulations of Industry Canada. The required antenna
impedance is 50 ohms.
To reduce potential radio interference to other users, the antenna type and
its gain should be so chosen that the EIRP is not more than required for
successful communication.
IMPORTANT NOTE:
IC RADIATION EXPOSURE STATEMENT:
This equipment complies with IC RSS-102 radiation exposure limits set forth
for an uncontrolled environment. This equipment should be installed and
operated with minimum distance 20 cm between the radiator and your body.
AUSTRALIA/NEW ZEALAND AS/NZS 4268
ACN 066 352010
TAIWAN NCC
根據國家通信傳播委員會低功率電波輻射性電機管理辦法規定:
第十二條 經型式認證合格之低功率射頻電機,非經許可,公司、商號或使用者均不得擅自變更
頻率、加大功率或變更原設計之特性及功能。
第十四條 低功率射頻電機之使用不得影響飛航安全及干擾合法通信;經發現有干擾現象時,應
立即停用,並改善至無干擾時方得繼續使用。前項合法通信,指依電信法規定作業之無線電通
信。低功率射頻電機須忍受合法通信或工業、科學及醫療用電波輻射性電機設備之干擾。
EC CONFORMANCE DECLARATION
SMC contact for these products in Europe is:
SMC Networks Europe,
C/Fructuós Gelabert 6-8, 2o, 2a,
Edificio Conata II,
08970 - Sant Joan Despí, Barcelona, Spain.
Marking by the above symbol indicates compliance with the Essential
Requirements of the R&TTE Directive of the European Union (1999/5/EC).
This equipment meets the following conformance standards:
◆
EN 60950-1: 2006 (IEC 60950-1) — Product Safety
– 6 –
COMPLIANCES
◆
EN 55022:2006 + A1:2007, Class B — ITE EMC
◆
EN 55024:1998 + A1:2001 + A2:2003 — ITE EMC
◆
EN 300 328 V1.7.1 (2006-10) — Technical requirements for 2.4 GHz
radio equipment
◆
EN 301 489-1 V1.8.1 (2008-04) — EMC requirements for radio
equipment
◆
EN 301 489-17 V1.3.2 (2008-04) — EMC requirements for radio
equipment
◆
50385 (2002) — Country-specific SAR requirements
This device is intended for use in the following European Community and
EFTA countries:
◆ Austria
◆ Denmark
◆ Greece
◆ Latvia
◆ Norway
◆ Slovenia
◆ Belgium
◆ Estonia
◆ Hungary
◆ Lithuania
◆ Poland
◆ Spain
◆ Bulgaria
◆ Finland
◆ Iceland
◆ Luxembourg
◆ Portugal
◆ Sweden
◆ Cyprus
◆ France
◆ Ireland
◆ Malta
◆ Romania
◆ Switzerland
◆ Czech Republic
◆ Germany
◆ Italy
◆ Netherlands
◆ Slovakia
◆ United Kingdom
NOTE: The user must use the configuration utility provided with this
product to ensure the channels of operation are in conformance with the
spectrum usage rules for European Community countries as described
below.
◆
This device will automatically limit the allowable channels determined
by the current country of operation. Incorrectly entering the country of
operation may result in illegal operation and may cause harmful
interference to other systems. The user is obligated to ensure the
device is operating according to the channel limitations, indoor/outdoor
restrictions and license requirements for each European Community
country as described in this document.
DECLARATION OF CONFORMITY IN LANGUAGES OF THE EUROPEAN
COMMUNITY
Czech
Česky
Manufacturer tímto prohlašuje, že tento Radio LAN device je ve shodě se základními
požadavky a dalšími příslušnými ustanoveními směrnice 1999/5/ES.
Estonian
Eesti
Käesolevaga kinnitab Manufacturer seadme Radio LAN device vastavust direktiivi 1999/
5/EÜ põhinõuetele ja nimetatud direktiivist tulenevatele teistele asjakohastele sätetele.
English
Hereby, Manufacturer, declares that this Radio LAN device is in compliance with the
essential requirements and other relevant provisions of Directive 1999/5/EC.
Finnish
Suomi
Valmistaja Manufacturer vakuuttaa täten että Radio LAN device tyyppinen laite on
direktiivin 1999/5/EY oleellisten vaatimusten ja sitä koskevien direktiivin muiden ehtojen
mukainen.
– 7 –
COMPLIANCES
Dutch
Nederlands
Hierbij verklaart Manufacturer dat het toestel Radio LAN device in overeenstemming is
met de essentiële eisen en de andere relevante bepalingen van richtlijn 1999/5/EG
Bij deze Manufacturer dat deze Radio LAN device voldoet aan de essentiële eisen en aan
de overige relevante bepalingen van Richtlijn 1999/5/EC.
French
Français
Par la présente Manufacturer déclare que l'appareil Radio LAN device est conforme aux
exigences essentielles et aux autres dispositions pertinentes de la directive 1999/5/CE
Swedish
Svenska
Härmed intygar Manufacturer att denna Radio LAN device står I överensstämmelse med
de väsentliga egenskapskrav och övriga relevanta bestämmelser som framgår av direktiv
1999/5/EG.
Danish
Dansk
Undertegnede Manufacturer erklærer herved, at følgende udstyr Radio LAN device
overholder de væsentlige krav og øvrige relevante krav i direktiv 1999/5/EF
German
Deutsch
Hiermit erklärt Manufacturer, dass sich dieser/diese/dieses Radio LAN device in
Übereinstimmung mit den grundlegenden Anforderungen und den anderen relevanten
Vorschriften der Richtlinie 1999/5/EG befindet". (BMWi)
Hiermit erklärt Manufacturer die Übereinstimmung des Gerätes Radio LAN device mit den
grundlegenden Anforderungen und den anderen relevanten Festlegungen der Richtlinie
1999/5/EG. (Wien)
Greek
Ελληνική
με την παρουσα Manufacturer δηλωνει οτι radio LAN device συμμορφωνεται προσ τισ
ουσιωδεισ απαιτησεισ και τισ λοιπεσ σχετικεσ διαταξεισ τησ οδηγιασ 1999/5/εκ.
Hungarian
Magyar
Alulírott, Manufacturer nyilatkozom, hogy a Radio LAN device megfelel a vonatkozó
alapvetõ követelményeknek és az 1999/5/EC irányelv egyéb elõírásainak.
Italian
Italiano
Con la presente Manufacturer dichiara che questo Radio LAN device è conforme ai
requisiti essenziali ed alle altre disposizioni pertinenti stabilite dalla direttiva 1999/5/CE.
Latvian
Latviski
Ar šo Manufacturer deklarē, ka Radio LAN device atbilst Direktīvas 1999/5/EK būtiskajām
prasībām un citiem ar to saistītajiem noteikumiem.
Lithuanian
Lietuvių
Šiuo Manufacturer deklaruoja, kad šis Radio LAN device atitinka esminius reikalavimus ir
kitas 1999/5/EB Direktyvos nuostatas.
Maltese
Malti
Hawnhekk, Manufacturer, jiddikjara li dan Radio LAN device jikkonforma mal-ħtiġijiet
essenzjali u ma provvedimenti oħrajn relevanti li hemm fid-Dirrettiva 1999/5/EC.
Spanish
Español
Por medio de la presente Manufacturer declara que el Radio LAN device cumple con los
requisitos esenciales y cualesquiera otras disposiciones aplicables o exigibles de la
Directiva 1999/5/CE
Polish
Polski
Niniejszym Manufacturer oświadcza, że Radio LAN device jest zgodny z zasadniczymi
wymogami oraz pozostałymi stosownymi postanowieniami Dyrektywy 1999/5/EC.
Portuguese
Português
Manufacturer declara que este Radio LAN device está conforme com os requisitos
essenciais e outras disposições da Directiva 1999/5/CE.
Slovak
Slovensky
Manufacturer týmto vyhlasuje, že Radio LAN device spĺňa základné požiadavky a všetky
príslušné ustanovenia Smernice 1999/5/ES.
Slovenian
Slovensko
Manufacturer izjavlja, da je ta radio LAN device v skladu z bistvenimi zahtevami in ostalimi
relevantnimi določili direktive 1999/5/ES.
– 8 –
ABOUT THIS GUIDE
PURPOSE This guide gives specific information on how to install the Mini Broadband
Router and its physical and performance related characteristics. It also
gives information on how to operate and use the management functions of
the Mini Broadband Router.
AUDIENCE This guide is for users with a basic working knowledge of computers. You
should be familiar with Windows operating system concepts.
CONVENTIONS The following conventions are used throughout this guide to show
information:
NOTE: Emphasizes important information or calls your attention to related
features or instructions.
CAUTION: Alerts you to a potential hazard that could cause loss of data, or
damage the system or equipment.
WARNING: Alerts you to a potential hazard that could cause personal injury.
RELATED PUBLICATIONS As part of the Mini Broadband Router’s software, there is an online webbased help that describes all management related features.
REVISION HISTORY This section summarizes the changes in each revision of this guide.
MARCH 2010 REVISION
This is the first revision of this guide.
– 9 –
CONTENTS
SECTION I
WARRANTY AND PRODUCT REGISTRATION
4
COMPLIANCES
5
ABOUT THIS GUIDE
9
CONTENTS
10
FIGURES
14
TABLES
17
GETTING STARTED
1 INTRODUCTION
18
19
Key Hardware Features
19
Description of Capabilities
19
Applications
20
Package Contents
21
Hardware Description
21
LED Indicators
23
Ethernet WAN Port
24
Ethernet LAN Port
24
Power Connector
24
WPS Button
24
Reset Button
24
2 NETWORK PLANNING
25
Internet Gateway Router
25
LAN Access Point
26
Wireless Bridge
27
Wireless Client
28
– 10 –
CONTENTS
3 INSTALLING THE MINI ROUTER
System Requirements
29
Mounting the Device
30
Mounting on a Wall
30
Mounting on a Horizontal Surface
30
Router Mode Connections
31
Bridge Mode Connections
32
4 INITIAL CONFIGURATION
SECTION II
29
34
ISP Settings
34
Connecting to the Login Page
34
Home Page and Main Menu
35
Common Web Page Buttons
36
Setup Wizard
36
Step 1 - Language Selection
36
Step 2 - Time Settings
37
Step 3 - WAN Settings - DHCP
38
Step 3 - WAN Settings - Static IP
39
Step 3 - WAN Settings - PPPoE
40
Step 3 - WAN Settings - PPTP
41
Step 3 - WAN Settings - L2TP
43
Step 4 - Wireless Security
44
Completion
45
WEB CONFIGURATION
5 OPERATION MODE
46
47
Logging In
48
Operation Mode
50
6 NETWORK SETTINGS
51
WAN Setting
51
DHCP
52
Static IP
53
PPPoE
54
PPTP
55
L2TP
57
– 11 –
CONTENTS
LAN Setting
59
DHCP Clients
61
Advanced Routing
62
Advanced Routing Settings
62
Routing Table
63
Dynamic Route
64
7 WIRELESS CONFIGURATION
65
Basic Settings
65
HT Physical Mode Settings
Advanced Settings
68
69
Advanced Wireless
69
Wi-Fi Multimedia
71
Multicast-to-Unicast Converter
74
WLAN Security
75
Wired Equivalent Privacy (WEP)
76
WPA Pre-Shared Key
77
WPA Enterprise Mode
78
IEEE 802.1X and RADIUS
80
Access Policy
82
Wireless Distribution System (WDS)
82
Wi-Fi Protected Setup (WPS)
85
Station List
88
8 AP CLIENT MODE WIRELESS CONFIGURATION
Profile
89
89
Profile Configuration
90
Security Policy
92
WEP Shared-Key Security
93
WPA/WPA2-Personal Security
94
Link Status
95
Site Survey
97
Statistics
98
9 FIREWALL CONFIGURATION
100
MAC/IP/Port Filtering
100
Current Filter Rules
Virtual Server Settings (Port Forwarding)
– 12 –
102
103
CONTENTS
Current Virtual Servers in system
SECTION III
104
DMZ
104
System Security
105
Content Filtering
106
10 ADMINISTRATION SETTINGS
108
System Management
109
Time Zone Settings
110
DDNS Settings
111
Firmware Upgrade
112
Configuration Settings
113
System Status
114
Statistics
116
System Log
117
APPENDICES
118
A TROUBLESHOOTING
119
Diagnosing LED Indicators
119
If You Cannot Connect to the Internet
119
Before Contacting Technical Support
120
B HARDWARE SPECIFICATIONS
121
C CABLES AND PINOUTS
123
Twisted-Pair Cable Assignments
123
10/100BASE-TX Pin Assignments
124
Straight-Through Wiring
124
Crossover Wiring
125
D LICENSE INFORMATION
126
The GNU General Public License
126
GLOSSARY
130
INDEX
134
– 13 –
FIGURES
Figure 1: Top Panel
22
Figure 2: Rear Panel
22
Figure 3: LEDs
23
Figure 4: Bottom Panel
24
Figure 5: Operating as an Internet Gateway Router
25
Figure 6: Operating as an Access Point
26
Figure 7: Operating as a Wireless Bridge
27
Figure 8: Operating as a Wireless Repeater
27
Figure 9: Operating as a Wireless Client
28
Figure 10: Wall Mounting
30
Figure 11: Router Mode Connection
31
Figure 12: Bridge Mode Connection
32
Figure 13: Login Page
35
Figure 14: Home Page
35
Figure 15: Wizard Step 1 - Language Selection
36
Figure 16: Wizard Step 2 - Time and SNTP Settings
37
Figure 17: Wizard Step 3 - WAN Settings - DHCP
38
Figure 18: Wizard Step 3 - WAN Settings - Static IP
39
Figure 19: Wizard Step 3 - WAN Settings - PPPoE
40
Figure 20: Wizard Step 3 - WAN Settings - PPTP
41
Figure 21: Wizard Step 3 - WAN Settings - L2TP
43
Figure 22: Wizard Step 4 - Wireless Security
44
Figure 23: Logging On
48
Figure 24: Home Page
49
Figure 25: Operation Mode
50
Figure 26: DHCP Configuration
52
Figure 27: Static IP Configuration
53
Figure 28: PPPoE Configuration
54
Figure 29: PPTP Configuration
55
Figure 30: L2TP Configuration
57
Figure 31: LAN Configuration
59
– 14 –
FIGURES
Figure 32: DHCP Clients
61
Figure 33: Advanced Routing (Router Mode)
62
Figure 34: Basic Settings
66
Figure 35: HT Physical Mode Settings
68
Figure 36: Advanced Wireless Settings
69
Figure 37: Wi-Fi Multimedia Settings
72
Figure 38: WMM Configuration
73
Figure 39: Multicast-to-Unicast Converter
74
Figure 40: Security Mode Options
75
Figure 41: Security Mode - WEP
76
Figure 42: Security Mode - WPA-PSK
77
Figure 43: Security Mode - WPA
79
Figure 44: Security Mode - 802.1X
81
Figure 45: Access Policy
82
Figure 46: Manual WDS MAC Address Configuration
83
Figure 47: WDS Configuration Example
83
Figure 48: WDS Configuration
84
Figure 49: Enabling WPS
86
Figure 50: WPS Configuration
86
Figure 51: Station List
88
Figure 52: Station Profile
89
Figure 53: Profile—System Configuration (Infrastructure)
90
Figure 54: Profile—System Configuration (Ad Hoc)
90
Figure 55: Add Profile-Security Policy
92
Figure 56: WEP Security
93
Figure 57: WPA Security
94
Figure 58: Station Site Survey
97
Figure 59: Station Statistics
98
Figure 60: MAC/IP/Port Filtering
101
Figure 61: Virtual Server
103
Figure 62: DMZ
104
Figure 63: System Security
105
Figure 64: Content Filtering
106
Figure 65: System Management
109
Figure 66: Time Zone Settings
110
Figure 67: DDNS Settings (Router Mode)
111
– 15 –
FIGURES
Figure 68: Firmware Upgrade
112
Figure 69: Configuration Settings
113
Figure 70: System Status (Router Mode)
114
Figure 71: Statistics
116
Figure 72: System Log
117
Figure 73: RJ-45 Connector
123
Figure 74: Straight-through Wiring
125
Figure 75: Crossover Wiring
125
– 16 –
TABLES
Table 1: Key Hardware Features
19
Table 2: LED Behavior
23
Table 3: WMM Access Categories
72
Table 4: LED Indicators
119
Table 5: 10/100BASE-TX MDI and MDI-X Port Pinouts
124
– 17 –
SECTION I
GETTING STARTED
This section provides an overview of the Mini Broadband Router, and
describes how to install and mount the unit. It also describes the basic
settings required to access the management interface and run the setup
Wizard.
This section includes these chapters:
◆
“Introduction” on page 19
◆
“Network Planning” on page 25
◆
“Installing the Mini Router” on page 29
◆
“Initial Configuration” on page 34
– 18 –
1
INTRODUCTION
The Barricade 150Mbps Wireless-N Mini Broadband Router
(SMCWBR11S-N) supports routing from an Internet Service Provider (ISP)
connection (DSL or cable modem) to a local network. It is simple to
configure and can be up and running in minutes.
KEY HARDWARE FEATURES
The following table describes the main hardware features of the Mini
Broadband Router.
Table 1: Key Hardware Features
Feature
Description
WAN Port
One 100BASE-TX RJ-45 port for connecting to the Internet.
LAN Port
One 100BASE-TX RJ-45 port for local network connections.
WPS Button
To set up a secure connection to a wireless device.
Reset Button
For resetting the unit and restoring factory defaults.
LEDs
Provides LED indicators for Power, WAN port, LAN port, and WLAN
status.
Mounting Options
Can be mounted on any horizontal surface such as a desktop or
shelf, or on a wall using two screws.
DESCRIPTION OF CAPABILITIES
◆
Internet connection through an RJ-45 WAN port.
◆
Local network connection through one 10/100 Mbps Ethernet port.
◆
DHCP for dynamic IP configuration.
◆
Firewall with Stateful Packet Inspection, client privileges, and NAT.
◆
NAT also enables multi-user Internet access via a single user account,
and virtual server functionality (providing protected access to Internet
services such as Web, FTP, e-mail, and Telnet).
◆
VPN passthrough (IPsec, PPTP, or L2TP).
◆
User-definable application sensing tunnel supports applications
requiring multiple connections.
– 19 –
CHAPTER 1 | Introduction
Description of Capabilities
◆
Easy setup and management through an easy-to-use web browser
interface on any operating system that supports TCP/IP.
◆
Compatible with all popular Internet applications.
APPLICATIONS Many advanced networking features are provided by the Mini Broadband
Router:
◆
Wired LAN — The Mini Broadband Router provides connectivity to
wired Ethernet devices, making it easy to create a network in small
offices or homes.
◆
Internet Access — This device supports Internet access through a
WAN connection. Since many DSL providers use PPPoE, PPTP, or L2TP
to establish communications with end users, the Mini Broadband Router
includes built-in clients for these protocols, eliminating the need to
install these services on your computer.
◆
Shared IP Address — The Mini Broadband Router provides Internet
access for up to 253 users using a single shared IP address account.
◆
Virtual Server — If you have a fixed IP address, you can set the Mini
Broadband Router to act as a virtual host for network address
translation. Remote users access various services at your site using a
static IP address. Then, depending on the requested service (or port
number), the Mini Broadband Router can route the request to the
appropriate server (at another internal IP address). This secures your
network from direct attack by hackers, and provides more flexible
management by allowing you to change internal IP addresses without
affecting outside access to your network.
◆
DMZ Host Support — Allows a networked computer to be fully
exposed to the Internet. This function is used when NAT and firewall
security prevent an Internet application from functioning correctly.
◆
Security — The Mini Broadband Router supports security features that
deny Internet access to specified users, or filter all requests for specific
services. WPA (Wi-Fi Protected Access) and MAC filtering provide
security over the wireless network.
◆
Virtual Private Network (VPN) Passthrough — The Mini Broadband
Router supports the passthrough of three of the most commonly used
VPN protocols – IPsec, PPTP, and L2TP. These protocols allow remote
users to establish a secure connection to another network. If your
service provider supports VPNs, then these protocols can be used to
create an authenticated and encrypted tunnel for passing secure data
over the Internet (that is, a traditionally shared data network). The
VPN-passthrough protocols supported by the Barricade are briefly
described below.
■
IPsec (Internet Protocol Security) — Encrypts and
authenticates entire IP packets and encapsulates them into new IP
packets for secure communications between networks.
– 20 –
CHAPTER 1 | Introduction
Package Contents
■
■
PPTP (Point-to-Point Tunneling Protocol) — Provides a secure
tunnel for remote client access to a PPTP security gateway. PPTP
includes provisions for call origination and flow control required by
ISPs.
L2TP (Layer 2 Tunneling Protocol) — Merges the best features
of PPTP and the Layer 2 Forwarding (L2F) protocol. Like PPTP, L2TP
requires that the ISP’s routers support the protocol.
PACKAGE CONTENTS
The Barricade 150Mbps Wireless-N Mini Broadband Router package
includes:
◆
Barricade Mini Broadband Router (SMCWBR11S-N)
◆
RJ-45 Category 5 network cable
◆
AC power adapter
◆
SMC Warranty Information Card
◆
Quick Installation Guide
◆
EZ Installation & Documentation CD
Inform your dealer if there are any incorrect, missing or damaged parts. If
possible, retain the carton, including the original packing materials. Use
them again to repack the product in case there is a need to return it.
HARDWARE DESCRIPTION
The Barricade 150Mbps Wireless-N Mini Broadband Router, from herein
refered to as Mini Broadband Router, connects to the Internet through its
RJ-45 WAN port. It connects directly to your PC or to a local area network
using its RJ-45 Fast Ethernet LAN port.
The Mini Broadband Router includes an LED display on the front panel for
system power and port indications that simplifies installation and network
troubleshooting.
– 21 –
CHAPTER 1 | Introduction
Hardware Description
Figure 1: Top Panel
WPS Button
LED Indicators
Figure 2: Rear Panel
RJ-45 WAN Port
RJ-45 LAN Port
– 22 –
DC Power
Socket
CHAPTER 1 | Introduction
Hardware Description
LED INDICATORS The Mini Broadband Router includes four status LED indicators, as
described in the following figure and table.
Figure 3: LEDs
WPS SET
WLAN
WLAN
LAN
LAN
WAN
Power
WAN
Power
Table 2: LED Behavior
LED
Status
Description
Power
On Blue
The unit is receiving power and is operating
normally.
Off
There is no power currently being supplied to
the unit.
On/Blinking Blue
The 802.11n radio is enabled and
transmitting or receiving data through wireless
links.
Off
The 802.11n radio is disabled.
On Blue
The Ethernet WAN port is aquiring an IP
address.
Blinking
The Ethernet WAN port is connected and is
transmitting/receiving data.
Off
The Ethernet WAN port is disconnected or has
malfunctioned.
On Blue
The Ethernet LAN port is connected to a PC or
server.
Blinking
The Ethernet port is connected and is
transmitting/receiving data.
Off
The Ethernet port is disconnected or has
malfunctioned.
WLAN
WAN
LAN
– 23 –
CHAPTER 1 | Introduction
Hardware Description
ETHERNET WAN PORT A 100BASE-TX RJ-45 port that can be attached to an Internet access
device, such as a DSL or Cable modem.
ETHERNET LAN PORT The Mini Broadband Router has one 100BASE-TX RJ-45 port that can be
attached directly to a PC or 10BASE-T/100BASE-TX LAN segments.
This port supports automatic MDI/MDI-X operation, so you can use
straight-through cables for all network connections to PCs, switches, or
hubs.
POWER CONNECTOR The Mini Broadband Router must be powered with its supplied power
adapter. Failure to do so results in voiding of any warrantly supplied with
the product. The power adapter automatically adjusts to any voltage
between 100~240 volts at 50 or 60 Hz, and supplies 12 volts DC power to
the unit. No voltage range settings are required.
WPS BUTTON Press the WPS button to automatically configure the Mini Broadband
Router with other WPS devices in the WLAN.
RESET BUTTON The Reset button is used to restore the factory default configuration. If you
hold down the button for 5 seconds or more, any configuration changes
you may have made are removed, and the factory default configuration is
restored to the Mini Broadband Router.
Figure 4: Bottom Panel
Reset Button
– 24 –
2
NETWORK PLANNING
The Mini Broadband Router is designed to be very flexible in its deployment
options. It can be used as an Internet gateway for a small network, or as
an access point to extend an existing wired network to support wireless
users. It also supports use as a wireless bridge to connect up to four wired
LANs, or as a wireless client to connect to another wireless network.
This chapter explains some of the basic features of the Mini Broadband
Router and shows some network topology examples in which the device is
implemented.
INTERNET GATEWAY ROUTER
The Mini Broadband Router can connect directly to a cable or DSL modem
to provide an Internet connection for multiple users through a single
service provider account. Users connect to the Mini Broadband Router
either through a wired connection to a LAN port, or though the device’s
own wireless network. The Mini Broadband Router functions as an Internet
gateway when set to Router Mode.
An Internet gateway employs several functions that essentially create two
separate Internet Protocol (IP) subnetworks; a private internal network
with wired and wireless users, and a public external network that connects
to the Internet. Network traffic is forwarded, or routed, between the two
subnetworks.
Figure 5: Operating as an Internet Gateway Router
Internet
Service
Provider
Cable/DSL
Modem
m IS
d fro
signe
s
a
.x)
(IP
68.2
WAN
92.1
1
:
P
I
(
LAN
P)
Mini Router
Notebook PC
(IP: 192.168.2.x)
LAN Switch
Server
(IP: 192.168.2.x)
Desktop PC
(IP: 192.168.2.x)
– 25 –
CHAPTER 2 | Network Planning
LAN Access Point
The private local network, connected to the LAN port or wireless interface,
provides a Dynamic Host Configuration Protocol (DHCP) server for
allocating IP addresses to local PCs and wireless clients, and Network
Address Translation (NAT) for mapping the multiple "internal" IP addresses
to one “external” IP address.
The public external network, connected to the WAN port, supports DHCP
client, Point-to-Point Protocol over Ethernet (PPPoE), PPTP (Point-to-Point
Tunneling Protocol), L2TP (Layer 2 Tunneling Protocol), and static IP for
connection to an Internet service provider (ISP) through a cable or DSL
modem.
LAN ACCESS POINT
The Mini Broadband Router can provide an access point service for an
existing wired LAN, creating a wireless extension to the local network. The
Mini Broadband Router functions as purely an access point when set to
Bridge Mode. When used in this mode, there are no gateway functions
between the WAN port and the LAN and wireless interfaces.
A Wi-Fi wireless network is defined by its Service Set Identifier (SSID) or
network name. Wireless clients that want to connect to a network must set
their SSID to the same SSID of the network service.
Figure 6: Operating as an Access Point
Server
(IP: 192.168.2.x)
Desktop PC
(IP: 192.168.2.x)
LAN Switch
Notebook PC
(IP: 192.168.2.x)
– 26 –
Mini Router
CHAPTER 2 | Network Planning
Wireless Bridge
WIRELESS BRIDGE
The IEEE 802.11 standard defines a Wireless Distribution System (WDS)
for bridge connections between access points. The Mini Broadband Router
can use WDS to forward traffic on links between units.
Up to four WDS links can be specified for the Mini Broadband Router.
The WDS feature enables two basic functions to be configured in the
wireless network. Either a repeater function that extends the range of the
wireless network, or a bridge function that connects a remote LAN segment
to an Internet connection.
Figure 7: Operating as a Wireless Bridge
Internet
Service
Provider
WDS Link
Cable/DSL
Modem
Mini Router
(Bridge Mode)
Mini Router
(Router Mode)
Desktop PC
Desktop PC
Figure 8: Operating as a Wireless Repeater
Internet
Service
Provider
Cable/DSL
Modem
WDS Link
Mini Router
(Router Mode)
Mini Router
(Bridge Mode)
Notebook PC
Notebook PC
– 27 –
CHAPTER 2 | Network Planning
Wireless Client
WIRELESS CLIENT
The Mini Broadband Router can operate as a wireless client on one SSID
interface, which enables a connection to another Wi-Fi network. When the
wireless client option is enabled, the client SSID interface functions as an
external gateway WAN port, and the other SSID interface and LAN ports all
function as the local network within the same IP subnet.
Figure 9: Operating as a Wireless Client
Internet
Service
Provider
Cable/DSL
Modem
Access Point
(External SSID)
N
Mini Router
t WA twork)
Clien
e
less xternal n
e
ir
W
e
m
o
(IP fr
Port
LAN 68.2.x)
92.1
1
:
(IP
LAN Switch
Notebook PC
(IP: 192.168.2.x)
Server
(IP: 192.168.2.x)
Desktop PC
(IP: 192.168.2.x)
– 28 –
3
INSTALLING THE MINI ROUTER
The Mini Broadband Router has two basic operating modes that can be set
through the web-based management interface. For information on setting
the mode suitable for your network environment, see “Operation Mode” on
page 50.
◆
Router Mode — A gateway mode that connects a wired LAN and
wireless clients to an Internet access device, such as a cable or DSL
modem. This is the factory set default mode.
◆
Bridge Mode — An access point mode that extends a wired LAN to
wireless clients.
In addition to these basic operating modes, the wireless interface supports
Wireless Distribution System (WDS) links to other Mini Broadband Routers,
and a wireless AP Client Mode for a link to another wireless network. These
advanced configurations are not described in this section, see “Network
Planning” on page 25 for more information.
In a basic configuration, how the Mini Broadband Router is connected
depends on the operating mode. The sections in this chapter describe
connections for basic Router Mode and Bridge Mode operation.
SYSTEM REQUIREMENTS
You must meet the following minimum requirements:
◆
An Internet access device (DSL or Cable modem) with an Ethernet port
connection.
◆
An up-to-date web browser: Internet Explorer 6.0 or above or Mozilla
Firefox 2.0 or above.
– 29 –
CHAPTER 3 | Installing the Mini Router
Mounting the Device
MOUNTING THE DEVICE
The Mini Broadband Router can be mounted on any horizontal surface, or
on a wall. The following sections describe the mounting options.
MOUNTING ON A WALL The Mini Broadband Router should be mounted only to a wall or wood
surface that is at least 1/2-inch plywood or its equivalent. To mount the
unit on a wall, always use its wall-mounting slots.
Figure 10: Wall Mounting
Mounting Slots
To mount on a wall, follow the instructions below.
1. Mark the position of the two screw holes on the wall. For concrete or
brick walls, you will need to drill holes and insert wall plugs for the
screws.
2. Insert two 20-mm M4 tap screws (not included) into the holes, leaving
about 2~3 mm (0.08~0.12 inches) clearance from the wall.
3. Line up the two mounting points on the unit with the screws in the wall,
then slide the unit down onto the screws until it is in a secured position.
MOUNTING ON A To keep the Mini Broadband Router from sliding on the surface, the unit has
HORIZONTAL SURFACE four rubber feet on its base.
It is recommended to select an uncluttered area on a sturdy surface, such
as a desktop or table. The unit can also be protected by securing all
attached cables to a table leg or other nearby fixed structure.
– 30 –
CHAPTER 3 | Installing the Mini Router
Router Mode Connections
ROUTER MODE CONNECTIONS
In its default Router Mode, the Mini Broadband Router forwards traffic
between an Internet connected cable or DSL modem, and wired or wireless
PCs or notebooks. The basic connections are illustrated in the figure below.
Figure 11: Router Mode Connection
up wireless
4. Set
devices
Notebook PC
Internet
WAN port to
1. Connect
cable/DSL modem
AC power
3. Connect
adapter to power source
Cable/DSL Modem
LAN port
2. Connect
to PC
To connect the Mini Broadband Router in Router Mode for use as an
Internet gateway, follow these steps:
1. Connect an Ethernet cable from the Mini Broadband Router’s WAN port
to your Internet connected cable or DSL modem.
2. Connect an Ethernet cable from the Mini Broadband Router’s LAN port
to your PC. Alternatively, you can connect to a workgroup switch to
support more wired users. The Mini Broadband Router can support up
to 253 wired and wireless users.
3. Power on the Mini Broadband Router by connecting the AC power
adapter and plugging it into a power source.
CAUTION: Use ONLY the power adapter supplied with the Mini Broadband
Router. Otherwise, the product may be damaged.
When you power on the Mini Broadband Router, verify that the Power
LED turns on and that the other LED indicators start functioning as
described under see “LED Indicators” on page 23.
4. Set up wireless devices by pressing the WPS button on the Mini
Broadband Router or by using the web interface. See “Initial
Configuration” on page 34 for more information on accessing the web
interface.
– 31 –
CHAPTER 3 | Installing the Mini Router
Bridge Mode Connections
BRIDGE MODE CONNECTIONS
In Bridge Mode, the Mini Broadband Router operates as a wireless access
point, extending a local wired network to associated wireless clients (PCs
or notebooks with wireless capability). From any nearby location, you can
then make a wireless connection to the Mini Broadband Router and access
the wired network resources, including local servers and the Internet.
In Bridge Mode, the Mini Broadband Router does not support gateway
functions on its WAN port. Both the LAN port and the WAN ports can be
connected to a local Ethernet LAN.
NOTE: Bridge Mode is not the factory default mode and must be manually
set using the web management interface.
Figure 12: Bridge Mode Connection
up wireless
3. Set
devices
Notebook PC
AC power
2. Connect
adapter to power source
LAN and WAN ports
1.Connect
to PCs or an Ethernet LAN switch
To connect the Mini Broadband Router for use as an access point, follow
these steps:
1. Using Ethernet cable connect the Mini Broadband Router’s LAN and
WAN ports to PCs. Alternatively, you can connect to a workgroup switch
to support more wired users.
2. Power on the Mini Broadband Router by connecting the AC power
adapter and plugging it into a power source.
CAUTION: Use ONLY the power adapter supplied with the Mini Broadband
Router. Otherwise, the product may be damaged.
When you power on the Mini Broadband Router, verify that the Power
LED turns on and that the other LED indicators start functioning as
described under “LED Indicators” on page 23.
– 32 –
CHAPTER 3 | Installing the Mini Router
Bridge Mode Connections
3. Set up wireless devices by pressing the WPS button on the Mini
Broadband Router or by using the web interface. See “Initial
Configuration” on page 34 for more information on accessing the web
interface.
– 33 –
4
INITIAL CONFIGURATION
The Mini Broadband Router offers a user-friendly web-based management
interface for the configuration of all the unit’s features. Any PC directly
attached to the unit can access the management interface using a web
browser, such as Internet Explorer (version 6.0 or above).
ISP SETTINGS
If you are not sure of your connection method, please contact your
Internet Service Provider. There are several connection types to choose
from: Static IP, DHCP (cable connection), PPPoE (DSL connection), PPTP,
and L2TP.
NOTE: If using the PPPoE option, you will need to remove or disable any
PPPoE client software on your computers.
CONNECTING TO THE LOGIN PAGE
It is recommended to make initial configuration changes by connecting a
PC directly to the Mini Broadband Router’s LAN port. The Mini Broadband
Router has a default IP address of 192.168.2.1 and a subnet mask of
255.255.255.0. You must set your PC IP address to be on the same subnet
as the Mini Broadband Router (that is, the PC and Mini Broadband Router
addresses must both start 192.168.2.x).
To access the Mini Broadband Router’s management interface, follow these
steps:
1. Use your web browser to connect to the management interface using
the default IP address of 192.168.2.1.
2. Log into the interface by entering the default username “admin” and
password “smcadmin,” then click OK.
NOTE: It is strongly recommended to change the default password the first
time you access the web interface. For information on changing passwords,
see “System Management” on page 109.
– 34 –
CHAPTER 4 | Initial Configuration
Home Page and Main Menu
Figure 13: Login Page
HOME PAGE AND MAIN MENU
After logging in to the web interface, the Home page displays. The Home
page shows the main menu and the method to access the Setup Wizard.
Figure 14: Home Page
– 35 –
CHAPTER 4 | Initial Configuration
Common Web Page Buttons
COMMON WEB PAGE BUTTONS
The list below describes the common buttons found on most web
management pages:
◆
Apply – Applies the new parameters and saves them to memory. Also
displays a screen to inform you when it has taken affect. Clicking
‘Apply’ returns to the home page.
◆
Cancel – Cancels the newly entered settings and restores the previous
settings.
◆
Next – Proceeds to the next step.
◆
Previous – Returns to the previous screen.
SETUP WIZARD
The Wizard is designed to help you configure the basic settings required to
get the the Mini Broadband Router up and running. There are only a few
basic steps you need to set up the the Mini Broadband Router and provide
a connection.
Follow these steps:
STEP 1 - LANGUAGE Select between English, Traditional Chinese, Simple Chinese, or Korean.
SELECTION Click Next to proceed to the next step of the wizard.
Figure 15: Wizard Step 1 - Language Selection
The following items are displayed on the first page of the Setup Wizard:
◆
Select Language — Selects English, Traditional Chinese, Simple
Chinese, or Korean as the interface language.
– 36 –
CHAPTER 4 | Initial Configuration
Setup Wizard
STEP 2 - TIME The Step 2 page of the Wizard configures time zone and SNTP settings.
SETTINGS
Select a time zone according to where the device is operated. Click Next
after completing the setup.
Figure 16: Wizard Step 2 - Time and SNTP Settings
The following items are displayed on this page:
◆
Current Time — Receives a time and date stamp from an SNTP server.
◆
Time Zone — Select the time zone that is applicable to your region.
◆
SNTP Server — Enter the address of an SNTP server to receive time
updates.
◆
SNTP synchronization (hours) — Specify the interval between SNTP
server updates.
– 37 –
CHAPTER 4 | Initial Configuration
Setup Wizard
STEP 3 - WAN The Step 3 page of the Wizard specifies the Internet connection
SETTINGS - DHCP parameters for the Mini Broadband Router’s WAN port. Click Next after
completing the setup.
By default, the access point WAN port is configured with DHCP enabled.
The options are Static IP, DHCP (cable modem), PPPoE (DSL modem),
PPTP, and L2TP. Each option changes the parameters that are displayed on
the page.
Figure 17: Wizard Step 3 - WAN Settings - DHCP
The following items are displayed on this page:
◆
WAN Connection Type — Select the connection type for the WAN port
from the drop down list. (Default: DHCP)
◆
Hostname — Specifies the host name of the DHCP client.
(Default: SMCWBR11S-N)
◆
Primary DNS Server — The IP address of the Primary Domain Name
Server. A DNS maps numerical IP addresses to domain names and can
be used to identify network hosts by familiar names instead of the IP
addresses. To specify a DNS server, type the IP addresses in the text
field provided. Otherwise, leave the text field blank.
◆
Secondary DNS Server — The IP address of the Secondary Domain
Name Server.
◆
MAC Clone — Some ISPs limit Internet connections to a specified MAC
address of one PC, which is registered with the ISP. This setting allows
you to manually change the MAC address of the Mini Broadband
Router's WAN interface to match the PC's MAC address provided to your
ISP for registration. You can enter the registered MAC address manually
by typing it in the boxes provided. Otherwise, connect only the PC with
the registered MAC address to the Mini Broadband Router, then click the
“Clone your PC’s MAC Address”. (Default: Disabled)
– 38 –
CHAPTER 4 | Initial Configuration
Setup Wizard
NOTE: If you are unsure of the PC MAC address originally registered by
your ISP, call your ISP and request to register a new MAC address for your
account. Register the default MAC address of the Mini Broadband Router.
STEP 3 - WAN Configures a static IP for the WAN port.
SETTINGS - STATIC IP
Figure 18: Wizard Step 3 - WAN Settings - Static IP
The following items are displayed on this page:
◆
WAN Connection Type — Select the connection type for the WAN port
from the drop down list. (Default: DHCP)
◆
IP Address — The IP address of the Mini Broadband Router. Valid IP
addresses consist of four decimal numbers, 0 to 255, separated by
periods.
◆
Subnet Mask — The mask that identifies the host address bits used for
routing to specific subnets.
◆
Default Gateway — The IP address of the gateway router for the Mini
Broadband Router, which is used if the requested destination address is
not on the local subnet.
◆
Primary DNS Server — The IP address of the Primary Domain Name
Server. A DNS maps numerical IP addresses to domain names and can
be used to identify network hosts by familiar names instead of the IP
addresses. To specify a DNS server, type the IP addresses in the text
field provided. Otherwise, leave the text field blank.
◆
Secondary DNS Server — The IP address of the Secondary Domain
Name Server.
– 39 –
CHAPTER 4 | Initial Configuration
Setup Wizard
◆
MAC Clone — Some ISPs limit Internet connections to a specified MAC
address. This setting allows you to manually change the MAC address
of the Mini Broadband Router's WAN interface to match the PC's MAC
address provided to your ISP for registration. You can enter the
registered MAC address manually by typing it in the boxes provided.
Otherwise, connect only the PC with the registered MAC address to the
Mini Broadband Router, then click the “Clone your PC’s MAC Address”
(Default: Disable)
STEP 3 - WAN Enable the Mini Broadband Router IP address to be assigned automatically
SETTINGS - PPPOE from an Internet service provider (ISP) through a DSL modem using Pointto-Point Protocol over Ethernet (PPPoE).
Figure 19: Wizard Step 3 - WAN Settings - PPPoE
The following items are displayed on this page:
◆
User Name — Sets the PPPoE user name for the WAN port.
(Default: pppoe_user; Range: 1~32 characters)
◆
Password — Sets a PPPoE password for the WAN port.
(Default: pppoe_password; Range: 1~32 characters)
◆
Verify Password — Prompts you to re-enter your chosen password.
◆
Operation Mode — Enables and configures the keep alive time and
configures the on-demand idle time.
◆
MAC Clone — Some ISPs limit Internet connections to a specified MAC
address of one PC. This setting allows you to manually change the MAC
address of the Mini Broadband Router's WAN interface to match the
PC's MAC address provided to your ISP for registration. You can enter
the registered MAC address manually by typing it in the boxes
– 40 –
CHAPTER 4 | Initial Configuration
Setup Wizard
provided. Otherwise, connect only the PC with the registered MAC
address to the Mini Broadband Router, then click the “Clone your PC’s
MAC Address” (Default: Disable)
STEP 3 - WAN Enables the Point-to-Point Tunneling Protocol (PPTP) for implementing
SETTINGS - PPTP virtual private networks. The service is provided in many European
countries.
Figure 20: Wizard Step 3 - WAN Settings - PPTP
The following items are displayed on this page:
◆
Server IP — Sets the PPTP server IP Address. (Default: pptp_server)
◆
User Name — Sets the PPTP user name for the WAN port.
(Default: pptp_user; Range: 1~32 characters)
◆
Password — Sets a PPTP password for the WAN port. (Default:
pptp_password; Range: 1~32 characters)
◆
Verify Password — Prompts you to re-enter your chosen password.
◆
Address Mode — Sets a PPTP network mode. (Default: Static)
– 41 –
CHAPTER 4 | Initial Configuration
Setup Wizard
◆
IP Address — Sets the static IP address. (Default: 0.0.0.0, available
when PPTP Network Mode is set to static IP.)
◆
Subnet Mask — Sets the static IP subnet mask. (Default:
255.255.255.0, available when PPTP Network Mode is set to static IP.)
◆
Default Gateway — The IP address of a router that is used when the
requested destination IP address is not on the local subnet.
◆
Operation Mode — Enables and configures the keep alive time.
◆
Primary DNS Server — The IP address of the Primary Domain Name
Server. A DNS maps numerical IP addresses to domain names and can
be used to identify network hosts by familiar names instead of the IP
addresses. To specify a DNS server, type the IP addresses in the text
field provided. Otherwise, leave the text field blank.
◆
Secondary DNS Server — The IP address of the Secondary Domain
Name Server.
◆
MAC Clone — Some ISPs limit Internet connections to a specified MAC
address of one PC. This setting allows you to manually change the MAC
address of the Mini Broadband Router's WAN interface to match the
PC's MAC address provided to your ISP for registration. You can enter
the registered MAC address manually by typing it in the boxes
provided. Otherwise, connect only the PC with the registered MAC
address to the Mini Broadband Router, then click the “Clone your PC’s
MAC Address” (Default: Disable)
– 42 –
CHAPTER 4 | Initial Configuration
Setup Wizard
STEP 3 - WAN Enables the Layer 2 Tunneling Protocol (L2TP) for implementing virtual
SETTINGS - L2TP private networks. The service is provided in many European countries.
Figure 21: Wizard Step 3 - WAN Settings - L2TP
The following items are displayed on this page:
◆
Server IP — Sets the L2TP server IP Address. (Default: l2tp_server)
◆
User Name — Sets the L2TP user name for the WAN port.
(Default: l2tp_user; Range: 1~32 characters)
◆
Password — Sets a L2TP password for the WAN port. (Default:
l2tp_password; Range: 1~32 characters)
◆
Verify Password — Prompts you to re-enter your chosen password.
◆
Address Mode — Sets a L2TP network mode. (Default: Static)
◆
IP Address — Sets the static IP address. (Default: 0.0.0.0, available
when L2TP Network Mode is set to static IP.)
◆
Subnet Mask — Sets the static IP subnet mask. (Default:
255.255.255.0, available when L2TP Network Mode is set to static IP.)
– 43 –
CHAPTER 4 | Initial Configuration
Setup Wizard
◆
Default Gateway — The IP address of a router that is used when the
requested destination IP address is not on the local subnet.
◆
Operation Mode — Enables and configures the keep alive time.
◆
Primary DNS Server — The IP address of the Primary Domain Name
Server. A DNS maps numerical IP addresses to domain names and can
be used to identify network hosts by familiar names instead of the IP
addresses. To specify a DNS server, type the IP addresses in the text
field provided. Otherwise, leave the text field blank.
◆
Secondary DNS Server — The IP address of the Secondary Domain
Name Server.
◆
MAC Clone — Some ISPs limit Internet connections to a specified MAC
address of one PC. This setting allows you to manually change the MAC
address of the Mini Broadband Router’s WAN interface to match the
PC's MAC address provided to your ISP for registration. You can enter
the registered MAC address manually by typing it in the boxes
provided. Otherwise, connect only the PC with the registered MAC
address to the Mini Broadband Router, then click the “Clone your PC’s
MAC Address” (Default: Disable)
STEP 4 - WIRELESS The Step 4 page of the Wizard configures the wireless network name and
SECURITY security options.
Figure 22: Wizard Step 4 - Wireless Security
The following items are displayed on this page:
◆
SSID Choice — The name of the wireless network service provided by
the Mini Broadband Router. Clients that want to connect to the network
must set their SSID to the same as that of the Mini Broadband Router.
(Default: “SMC”)
– 44 –
CHAPTER 4 | Initial Configuration
Setup Wizard
◆
Security Mode — Specifies the security mode for the SSID. Select the
security method and then configure the required parameters. For more
information, see “WLAN Security” on page 75. (Options: Disabled,
Open, Shared, WEP-AUTO, WPA-PSK, WPA2-PSK, WPA-PSK_WPA2-PSK,
WPA, WPA2, WPA1_WPA2, 802.1X; Default: Disabled)
NOTE: To keep your wireless network protected and secure, you should
implement the highest security possible. For small networks, it is
recommended to select WPA2-PSK using AES encryption as the most
secure option. However, if you have older wireless devices in the network
that do not support AES encryption, select TKIP as the encryption
algorithm.
◆
Access Policy — The Mini Broadband Router provides a MAC address
filtering facility. The access policy can be set to allow or reject specific
station MAC addresses. This feature can be used to connect known
wireless devices that may not be able to support the configured
security mode.
◆
Add a station MAC — Enter the MAC address of the station that you
want to filter. MAC addresses must be entered in the format
xx:xx:xx:xx:xx:xx.
COMPLETION After completion of the Wizard, the screen returns to the Home Page.
– 45 –
SECTION II
WEB CONFIGURATION
This section provides details on configuring the Mini Broadband Router
using the web browser interface.
This section includes these chapters:
◆
“Operation Mode” on page 47
◆
“Network Settings” on page 51
◆
“Wireless Configuration” on page 65
◆
“AP Client Mode Wireless Configuration” on page 89
◆
“Firewall Configuration” on page 100
◆
“Administration Settings” on page 108
– 46 –
5
OPERATION MODE
The Mini Broadband Router offers a user-friendly web-based management
interface for the configuration of all the unit’s features. Any PC directly
attached to the unit can access the management interface using a web
browser, such as Internet Explorer (version 6.0 or above).
The following sections are contained in this chapter:
◆
“Logging In” on page 48
◆
“Operation Mode” on page 50
– 47 –
CHAPTER 5 | Operation Mode
Logging In
LOGGING IN
It is recommended to make initial configuration changes by connecting a
PC directly to the Mini Broadband Router's LAN port. The Mini Broadband
Router has a default IP address of 192.168.2.1 and a subnet mask of
255.255.255.0. If your PC is set to “Obtain an IP address automatically”
(that is, set as a DHCP client), you can connect immediately to the web
interface. Otherwise, you must set your PC IP address to be on the same
subnet as the Mini Broadband Router (that is, the PC and Mini Broadband
Router addresses must both start 192.168.2.x).
To access the configuration menu, follow these steps:
1. Use your web browser to connect to the management interface using
the default IP address of 192.168.2.1.
2. Log into the Mini Broadband Router management interface by entering
the default user name “admin” and password “smcadmin,” then click
OK.
NOTE: It is strongly recommended to change the default password the first
time you access the web interface. For information on changing passwords,
see “Administration Settings” on page 108.
Figure 23: Logging On
– 48 –
CHAPTER 5 | Operation Mode
Logging In
The home page displays the main menu items at the top of the screen and
the Setup Wizard. See “Setup Wizard” on page 36.
Figure 24: Home Page
NOTE: The displayed pages and settings may differ depending on whether
the unit is in Router or Bridge Mode. See “Operation Mode” on page 50.
– 49 –
CHAPTER 5 | Operation Mode
Operation Mode
OPERATION MODE
The Operation Mode Configuration page allows you to set up the mode
suitable for your network environment.
Figure 25: Operation Mode
The following items are displayed on this page:
◆
Bridge Mode — An access point mode that extends a wired LAN to
wireless clients.
◆
Router Mode — The Internet gateway mode that connects a wired LAN
and wireless clients to an Internet access device, such as a cable or
DSL modem. This is the factory set default mode.
◆
AP Client Mode — The Mini Broadband Router acts as a client
connecting to an available wireless network provided by another access
point or wireless router. This functionality allows other Ethernetenabled devices, like gaming consoles, NAS storage servers, or PCs/
laptops without built-in wireless support, to be added into a wireless
network.
In order to connect to a wireless network in AP Client mode, it is
necessary to know the following information: the network name
(SSID), the frequency channel (1-13), the type of security (WEP, WPA/
WPA2), and the security password (if any). For more information, see
“AP Client Mode Wireless Configuration” on page 89.
– 50 –
6
NETWORK SETTINGS
The Network Settings pages allow you to manage basic system
configuration settings. It includes the following sections:
◆
“WAN Setting” on page 51
■
“DHCP” on page 52
■
“Static IP” on page 53
■
“PPPoE” on page 54
■
“PPTP” on page 55
■
“L2TP” on page 57
◆
“LAN Setting” on page 59
◆
“DHCP Clients” on page 61
◆
“Advanced Routing” on page 62
NOTE: In Bridge mode, the Mini Broadband Router’s Network Settings
options are significantly reduced, with only LAN Settings and the Client List
being available to the user.
WAN SETTING
The WAN Setting page specifies the Internet connection parameters. Click
on “Network Settings” followed by “WAN”.
◆
WAN Connection Type — By default, the access point WAN port is
configured with DHCP enabled. After you have network access to the
access point, you can use the web browser interface to modify the
initial IP configuration, if needed. The options are Static IP, DHCP (cable
modem), PPPoE (DSL modem), PPTP, and L2TP. Each option changes
the parameters displayed below it. (Default: DHCP).
– 51 –
CHAPTER 6 | Network Settings
WAN Setting
DHCP Enables Dynamic Host Configuration Protocol (DHCP) for the WAN port.
This setting allows the Mini Broadband Router to automatically obtain an IP
address from a DHCP server normally operated by the Internet Service
Provider (ISP).
Figure 26: DHCP Configuration
The following items are displayed on this page:
◆
Hostname (Optional) — The hostname of the DHCP client.
◆
Primary DNS Server — The IP address of the Primary Domain Name
Server. A DNS maps numerical IP addresses to domain names and can
be used to identify network hosts by familiar names instead of the IP
addresses. To specify a DNS server, type the IP addresses in the text
field provided. Otherwise, leave the text field blank.
◆
Secondary DNS Server — The IP address of the Secondary Domain
Name Server.
◆
MAC Clone — Some ISPs limit Internet connections to a specified MAC
address of one PC. This setting allows you to manually change the MAC
address of the Mini Broadband Router's WAN interface to match the
PC's MAC address provided to your ISP for registration. You can enter
the registered MAC address manually by typing it in the boxes
provided. Otherwise, connect only the PC with the registered MAC
address to the Mini Broadband Router, then click the “Clone your PC’s
MAC Address” (Default: Disable)
NOTE: If you are unsure of the PC MAC address originally registered by
your ISP, call your ISP and request to register a new MAC address for your
account. Register the default MAC address of the Mini Broadband Router.
– 52 –
CHAPTER 6 | Network Settings
WAN Setting
STATIC IP Configures a static IP for the WAN port.
Figure 27: Static IP Configuration
The following items are displayed on this page:
◆
IP Address — The IP address of the Mini Broadband Router. Valid IP
addresses consist of four decimal numbers, 0 to 255, separated by
periods.
◆
Subnet Mask — The mask that identifies the host address bits used for
routing to specific subnets.
◆
Default Gateway — The IP address of the gateway router for the Mini
Broadband Router, which is used if the requested destination address is
not on the local subnet.
◆
Primary DNS Server — The IP address of the Primary Domain Name
Server on the network. A DNS maps numerical IP addresses to domain
names and can be used to identify network hosts by familiar names
instead of the IP addresses. If you have one or more DNS servers
located on the local network, type the IP addresses in the text fields
provided. Otherwise, leave the addresses as all zeros (0.0.0.0).
◆
Secondary DNS Server — The IP address of the Secondary Domain
Name Server on the network.
◆
MAC Clone — Some ISPs limit Internet connections to a specified MAC
address of one PC. This setting allows you to manually change the MAC
address of the Mini Broadband Router's WAN interface to match the
– 53 –
CHAPTER 6 | Network Settings
WAN Setting
PC's MAC address provided to your ISP for registration. You can enter
the registered MAC address manually by typing it in the boxes
provided. Otherwise, connect only the PC with the registered MAC
address to the Mini Broadband Router, then click the “Clone your PC’s
MAC Address” (Default: Disable)
PPPOE Enables the Mini Broadband Router IP address to be assigned automatically
from an Internet service provider (ISP) through a DSL modem using Pointto-Point Protocol over Ethernet (PPPoE).
Figure 28: PPPoE Configuration
The following items are displayed on this page:
◆
PPPoE User Name — Sets the PPPoE user name for the WAN port.
(Default: pppoe_user; Range: 1~32 characters)
◆
PPPoE Password — Sets a PPPoE password for the WAN port.
(Default: pppoe_password; Range: 1~32 characters)
◆
Verify Password — Prompts you to re-enter your chosen password.
◆
Operation Mode — Selects the operation mode as Keep Alive, On
Demand or Manual. (Default: Keep Alive)
■
Keep Alive Mode: The Mini Broadband Router will periodically
check your Internet connection and automatically re-establish your
connection when disconnected. (Default: 60 seconds)
– 54 –
CHAPTER 6 | Network Settings
WAN Setting
■
◆
On Demand Mode: The maximum length of inactive time the unit
will stay connected to the DSL service provider before
disconnecting. (Default: 5 minutes)
MAC Clone — Some ISPs limit Internet connections to a specified MAC
address of one PC. This setting allows you to manually change the MAC
address of the Mini Broadband Router's WAN interface to match the
PC's MAC address provided to your ISP for registration. You can enter
the registered MAC address manually by typing it in the boxes
provided. Otherwise, connect only the PC with the registered MAC
address to the Mini Broadband Router, then click the “Clone your PC’s
MAC Address” (Default: Disable)
PPTP Enables the Point-to-Point Tunneling Protocol (PPTP) for implementing
virtual private networks. The service is provided in many European
countries.
Figure 29: PPTP Configuration
– 55 –
CHAPTER 6 | Network Settings
WAN Setting
The following items are displayed on this page:
◆
Server IP — Sets a PPTP server IP Address. (Default: pptp_server)
◆
User Name — Sets the PPTP user name for the WAN port. (Default:
pptp_user; Range: 1~32 characters)
◆
Password — Sets a PPTP password for the WAN port. (Default:
pptp_password; Range: 1~32 characters)
◆
Verify Password — Prompts you to re-enter your chosen password.
◆
Address Mode — Sets a PPTP network mode. (Default: Static)
◆
IP Address — Sets the static IP address. (Default: 0.0.0.0, available
when PPTP Network Mode is set to static IP.)
◆
Subnet Mask — Sets the static IP subnet mask. (Default:
255.255.255.0, available when PPTP Network Mode is set to static IP.)
◆
Default Gateway — The IP address of the gateway router for the Mini
Broadband Router, which is used if the requested destination address is
not on the local subnet.
◆
Operation Mode — Selects the operation mode as Keep Alive, or
Manual. (Default: Keep Alive)
■
Keep Alive Mode: The Mini Broadband Router will periodically
check your Internet connection and automatically re-establish your
connection when disconnected. (Default: 60 seconds)
■
Manual Mode: The unit will remain connected to the Internet
without disconnecting.
◆
Primary DNS Server — The IP address of the Primary Domain Name
Server. A DNS maps numerical IP addresses to domain names and can
be used to identify network hosts by familiar names instead of the IP
addresses. To specify a DNS server, type the IP addresses in the text
field provided. Otherwise, leave the text field blank.
◆
Secondary DNS Server — The IP address of the Secondary Domain
Name Server.
◆
MAC Clone — Some ISPs limit Internet connections to a specified MAC
address of one PC. This setting allows you to manually change the MAC
address of the Mini Broadband Router's WAN interface to match the
PC's MAC address provided to your ISP for registration. You can enter
the registered MAC address manually by typing it in the boxes
provided. Otherwise, connect only the PC with the registered MAC
address to the Mini Broadband Router, then click the “Clone your PC’s
MAC Address” (Default: Disable)
– 56 –
CHAPTER 6 | Network Settings
WAN Setting
L2TP Enables the Layer 2 Tunneling Protocol (L2TP) for implementing virtual
private networks. The service is provided in many European countries.
Figure 30: L2TP Configuration
The following items are displayed on this page:
◆
Server IP — Sets the L2TP server IP Address. (Default: l2tp_server)
◆
User Name — Sets the L2TP user name for the WAN port.
(Default: l2tp_user; Range: 1~32 characters)
◆
Password — Sets a L2TP password for the WAN port. (Default:
l2tp_password; Range: 1~32 characters)
◆
Verify Password — Prompts you to re-enter your chosen password.
◆
Address Mode — Sets a L2TP network mode. (Default: Static)
– 57 –
CHAPTER 6 | Network Settings
WAN Setting
◆
IP Address — Sets the static IP address. (Default: 0.0.0.0, available
when L2TP Network Mode is set to static IP.)
◆
Subnet Mask — Sets the static IP subnet mask. (Default:
255.255.255.0, available when L2TP Network Mode is set to static IP.)
◆
Default Gateway — The IP address of the gateway router for the Mini
Broadband Router, which is used if the requested destination address is
not on the local subnet.
◆
Operation Mode — Selects the operation mode as Keep Alive, or
Manual. (Default: Keep Alive)
■
Keep Alive Mode: The Mini Broadband Router will periodically
check your Internet connection and automatically re-establish your
connection when disconnected. (Default: 60 seconds)
■
Manual Mode: The unit will remain connected to the Internet
without disconnecting.
◆
Primary DNS Server — The IP address of the Primary Domain Name
Server. A DNS maps numerical IP addresses to domain names and can
be used to identify network hosts by familiar names instead of the IP
addresses. To specify a DNS server, type the IP addresses in the text
field provided. Otherwise, leave the text field blank.
◆
Secondary DNS Server — The IP address of the Secondary Domain
Name Server.
◆
MAC Clone — Some ISPs limit Internet connections to a specified MAC
address of one PC. This setting allows you to manually change the MAC
address of the Mini Broadband Router's WAN interface to match the
PC's MAC address provided to your ISP for registration. You can enter
the registered MAC address manually by typing it in the boxes
provided. Otherwise, connect only the PC with the registered MAC
address to the Mini Broadband Router, then click the “Clone your PC’s
MAC Address” (Default: Disable)
– 58 –
CHAPTER 6 | Network Settings
LAN Setting
LAN SETTING
The Mini Broadband Router must have a valid IP address for management
using a web browser and to support other features. The unit has a default
IP address of 192.168.2.1. You can use this IP address or assign another
address that is compatible with your existing local network. Click on
“Network Settings” followed by “LAN.”
Figure 31: LAN Configuration
The following items are displayed on this page:
◆
MAC Address — The physical layer address for the Mini Broadband
Router’s LAN port.
◆
IP Address — Valid IP addresses consist of four decimal numbers, 0 to
255, separated by periods. (Default: 192.168.2.1)
– 59 –
CHAPTER 6 | Network Settings
LAN Setting
◆
Subnet Mask — Indicate the local subnet mask.
(Default: 255.255.255.0.)
◆
DHCP Server — Enable this feature to assign IP settings to wired and
wireless clients connected to the Mini Broadband Router. The IP
address, subnet mask, default gateway, and Domain Name Server
(DNS) address are dynamically assigned to clients. (Options: Enable,
Disable; Default: Enable)
◆
Start/End IP Address — Specify the start and end IP addresses of a
range that the DHCP server can allocate to DHCP clients. Note that the
address pool range is always in the same subnet as the unit’s IP
setting. The maximum clients that the unit can support is 253.
◆
Lease Time — Select a time limit for the use of an IP address from the
IP pool. When the time limit expires, the client has to request a new IP
address. The lease time is expressed in seconds. (Options: Forever, Two
weeks, One week, Two days, One day, Half day, Two hours, One hour,
Half hour; Default: One week)
◆
LLTD — Link Layer Topology Discovery (LLTD) is a Microsoft proprietary
discovery protocol which can be used for both wired and wireless
networks. (Options: Disable/Enable, Default: Enable)
◆
IGMP Proxy — Enables IGMP proxy on the Mini Broadband Router.
(Options: Disable/Enable, Default: Disable)
◆
UPNP — Allows the device to advertise its UPnP capabilities. (Default:
Enable)
◆
Router Advertisement — Enables the sending and receiving of
routing advertisements to discover the existence of neighboring
routers. (Options: Disable/Enable, Default: Disable)
◆
PPPoE Relay — When enabled, the Mini Broadband Router will forward
PPPoE messages to clients. Clients are then able to connect to the
PPPoE service through the WAN port. (Options: Disable/Enable,
Default: Disable)
◆
DNS Proxy — Enables DNS proxy on the LAN port. DNS Proxy receives
DNS queries from the local network and forwards them to an Internet
DNS server. (Default: Enable)
– 60 –
CHAPTER 6 | Network Settings
DHCP Clients
DHCP CLIENTS
The DHCP Clients page displays information on connected client stations
that have been assigned IP addresses from the DHCP address pool.
Figure 32: DHCP Clients
The following items are displayed on this page:
Host name — The name of the connected client station.
MAC Address — The MAC address of the connected client station.
IP Address — The IP address assigned to the client from the IP pool.
Expires in — The time limit for the use of the IP address from the IP pool.
When the time limit expires, the client has to request a new IP address.
– 61 –
CHAPTER 6 | Network Settings
Advanced Routing
ADVANCED ROUTING
Routing setup allows a manual method to set up routing between
networks. The network administrator configures static routes by entering
routes directly into the routing table. Static routing has the advantage of
being predictable and easy to configure.
ADVANCED ROUTING This screen is used to manually configure static routes to other IP
SETTINGS networks, subnetworks, or hosts. Click “Network Settings” followed by
“Advanced Routing.” (Maximum 32 entries are allowed.)
Figure 33: Advanced Routing (Router Mode)
– 62 –
CHAPTER 6 | Network Settings
Advanced Routing
The following items are displayed on this page:
◆
Destination — A destination network or specific host to which packets
can be routed.
◆
Type — Defines the type of destination. (Options: Host/Net, Default:
Host)
◆
Gateway — The IP address of the router at the next hop to which
matching frames are forwarded.
◆
Interface — The selected interface to which a static routing subnet is
to be applied.
◆
Comment — Enters a useful comment to help identify this route.
ROUTING TABLE This page displays the information necessary to forward a packet along the
best path toward its destination. Each packet contains information about
its origin and destination. When a packet is received, a network device
examines the packet and matches it to the routing table entry providing
the best match for its destination. The table then provides the device with
instructions for sending the packet to the next hop on its route across the
network.
NOTE: The Routing Table is only available when the Mini Broadband Router
is set to Router Mode.
◆
Destination — Displays all destination networks or specific hosts to
which packets can be routed.
◆
Netmask — Displays the subnetwork associated with the destination.
◆
Gateway — Displays the IP address of the router at the next hop to
which matching frames are forwarded.
◆
Flags — Flags – Possible flags identify as below
◆
■
0: reject route
■
1: route is up
■
3: route is up, use gateway
■
5: route is up, target is a host
■
7: route is up, use gateway, target is a host
Metric — A number used to indicate the cost of the route so that the
best route, among potentially multiple routes to the same destination,
can be selected.
– 63 –
CHAPTER 6 | Network Settings
Advanced Routing
◆
Ref — Number of references to this route.
◆
Use — Count of lookups for the route.
◆
Interface — Interface to which packets for this route will be sent.
◆
Comment — Displays a useful comment to identify the routing rules.
DYNAMIC ROUTE ◆ The Mini Broadband Router supports RIP 1 and RIP 2 dynamic routing
protocol. Routing Information Protocol (RIP) is the most widely used
method for dynamically maintaining routing tables. RIP uses a distance
vector-based approach to routing. Routes are chosen to minimize the
distance vector, or hop count, which serves as a rough estimate of
transmission cost. Each router broadcasts its advertisement every 30
seconds, together with any updates to its routing table. This allows all
routers on the network to build consistent tables of next hop links
which lead to relevant subnets.
◆
RIP — Enables or disable the RIP protocol for the WAN or LAN
interface. (Options: Disable/v1/v2, Default: Disable)
– 64 –
7
WIRELESS CONFIGURATION
The wireless settings section displays configuration settings for the access
point functionality of the Mini Broadband Router. It includes the following
sections:
◆
“Basic Settings” on page 65
◆
“Advanced Settings” on page 69
◆
“WLAN Security” on page 75
◆
“Wireless Distribution System (WDS)” on page 82
◆
“Wi-Fi Protected Setup (WPS)” on page 85
◆
“Station List” on page 88
BASIC SETTINGS
The IEEE 802.11n interface includes configuration options for radio signal
characteristics and wireless security features.
The Mini Broadband Router’s radio can operate in six modes, mixed
802.11b/g/n, mixed 802.11b/g, mixed 802.11g/n, 802.11n only, 802.11b
only, or 802.11g only. Note that 802.11g is backward compatible with
802.11b, and 802.11n is backward compatible with 802.11b/g at slower
data transmit rates.
The Mini Broadband Router supports two virtual access point (VAP)
interfaces. One VAP is the primary (Network Name SSID), and the other
one is referred to as "Multiple SSID1." Each VAP functions as a separate
access point, and can be configured with its own Service Set Identification
(SSID) and security settings. However, most radio signal parameters apply
to all VAP interfaces.
Traffic to specific VAPs can be segregated based on user groups or
application traffic. All VAPs can have up to 64 wireless clients, whereby the
clients associate with these VAPs the same as they would with a physical
access point.
NOTE: The radio channel settings for the access point are limited by local
regulations, which determine the number of channels that are available.
– 65 –
CHAPTER 7 | Wireless Configuration
Basic Settings
The Basic Settings page allows you to configure the wireless network name
(Service Set Identifier or SSID) and set the wireless security method.
Click on “Wireless Settings,” followed by “Basic.”
Figure 34: Basic Settings
The following items are displayed on this page:
◆
Wireless On/Off — Enables or Disable the radio. (Default: Enable)
◆
Network Mode — Defines the radio operating mode. (Default: 11g/n
Mixed)
■
11b/g mixed: Both 802.11b and 802.11g clients can communicate
with the Mini Broadband Router (up to 108 Mbps), but data
transmission rates may be slowed to compensate for 802.11b
clients. Any 802.11n clients will also be able to communicate with
the Mini Broadband Router, but they will be limited to 802.11g
protocols and data transmission rates.
■
11b only: All 802.11b, 802.11g, and 802.11n clients will be able to
communicate with the Mini Broadband Router, but the 802.11g and
802.11n clients will be limited to 802.11b protocols and data
transmission rates (up to 11 Mbps).
■
11g only: Both 802.11g and 802.11n clients will be able to
communicate with the Mini Broadband Router, but the 802.11n
clients will be limited to 802.11g protocols and data transmission
rates (up to 54 Mbps). Any 802.11b clients will not be able to
communicate with the Mini Broadband Router.
– 66 –
CHAPTER 7 | Wireless Configuration
Basic Settings
■
■
■
11n only: Only 802.11n clients will be able to communicate with
the Mini Broadband Router (up to 150 Mbps).
11g/n mixed: Both 802.11g and 802.11n clients can communicate
with the Mini Broadband Router (up to 150 Mbps), but data
transmission rates may be slowed to compensate for 802.11g
clients.
11b/g/n Mixed: All 802.11b/g/n clients can communicate with the
Mini Broadband Router (up to 150 Mbps), but data transmission
rates may be slowed to compensate for 802.11b/g clients.
◆
Network Name (SSID) — The name of the wireless network service
provided by the Mini Broadband Router. Clients that want to connect to
the network must set their SSID to the same as that of the Mini
Broadband Router. (Default: “SMC”; Range: 1-32 characters)
◆
Multiple SSID1 — One additional VAP interface supported on the
device. (Default: no name configured; Range: 1-32 characters)
◆
Broadcast Network Name (SSID) — By default, the Mini Broadband
Router always broadcasts the SSID in its beacon signal. Disabling the
SSID broadcast increases security of the network because wireless
clients need to already know the SSID before attempting to connect.
When set to disable, the Network Name SSID, and SSID1 are
automatically set to “Hide.” (Default: Enabled)
◆
AP Isolation — The Mini Broadband Router will isolate
communincation between all clients in order to protect them. Normally
for users who are at hotspots. (Default: Disabled)
◆
MBSSID AP Isolation — The Mini Broadband Router will isolate
wireless clients from different SSID.
◆
BSSID — The identifier (MAC address) of the Mini Broadband Router in
the Basic Service Set (BSS) network.
◆
Frequency (Channel) — The radio channel that the Mini Broadband
Router uses to communicate with wireless clients. When multiple
access points are deployed in the same area, set the channel on
neighboring access points at least five channels apart to avoid
interference with each other. For example, you can deploy up to three
access points in the same area using channels 1, 6, 11. Note that
wireless clients automatically set the channel to the same as that used
by the Mini Broadband Router to which it is linked. Selecting Auto
Select enables the Mini Broadband Router to automatically select an
unoccupied radio channel. (Default: AutoSelect)
– 67 –
CHAPTER 7 | Wireless Configuration
Basic Settings
HT PHYSICAL MODE The HT Physical Mode section on the Wireless Settings Advanced page
SETTINGS includes additional parameters for 802.11n operation.
Figure 35: HT Physical Mode Settings
The following items are displayed in this section on this page:
◆
HT Channel Bandwidth — The Mini Broadband Router provides a
channel bandwidth of 40 MHz by default giving an 802.11g connection
speed of 108 Mbps (sometimes referred to as Turbo Mode) and a
802.11n connection speed of up to 150 Mbps. Setting the HT Channel
Bandwidth to 20 MHz slows connection speed for 802.11g and 802.11n
to 54 Mbps and 74 Mbps respectively and ensures backward compliance
for slower 802.11b devices. (Default: 20MHz)
◆
Guard Interval — The guard interval between symbols helps receivers
overcome the effects of multipath delays. When you add a guard time,
the back portion of useful signal time is copied and appended to the
front. (Default: Auto)
◆
MCS — The Modulation and Coding Scheme (MCS) is a value that
determines the modulation, coding and number of spatial channels.
(Options: value [range] = 0~7 (1 Tx Stream), 8~15 (2 TxStream), 32
and auto (33). Default: auto)
◆
Reverse Direction Grant (RDG) — When Reverse Direction Grant is
enabled, the Mini Broadband Router can reduce the transmitted data
packet collision by using the reverse direction protocol. During TXOP
(Transmission Opportunity) period, the receiver could use remaining
transmission time to transmit data to a sender. The RDG improves
transmission performance and scalability in a wireless environment.
◆
Extension Channel — When 20/40MHz channel bandwidth has been
set, the extension channel option will be enabled. The extension
channel will allow you to get extra bandwidth. (Options: 2417MHz/
Channel 2, 2457MHz/Channel 10. Default: AutoSelect.)
– 68 –
CHAPTER 7 | Wireless Configuration
Advanced Settings
◆
Aggregate MSDU (A-MSDU) — This option enables Mac Service Data
Unit (MSDU) aggregation. (Default: Disable)
◆
Auto Block ACK — Select to block ACK (Acknowledge Number) or not
during data transferring.
◆
Decline BA Request — Select to reject peer BA-Request or not.
ADVANCED SETTINGS
The Advanced Settings page includes additional parameters concerning the
wireless network and Wi-Fi Multimedia settings.
NOTE: There are several variables to consider when selecting a radio mode
that make it fully functional. Simply selecting the mode you want is not
enough to ensure full compatibility for that mode. Information on these
variables may be found in the HT Physcial Mode Setting section.
ADVANCED WIRELESS The Advanced Wireless section on the Wireless Settings Advanced page
includes additional radio parameters.
Figure 36: Advanced Wireless Settings
The following items are displayed in this section on this page:
◆
BG Protection Mode — Enables a backward compatible protection
mechanism for 802.11b clients. There are three modes: (Default: Auto)
– 69 –
CHAPTER 7 | Wireless Configuration
Advanced Settings
■
■
■
Auto — The unit enables its protection mechanism for 802.11b
clients when they are detected in the network. When 802.11b
clients are not detected, the protection mechanism is disabled.
On — Forces the unit to always use protection for 802.11b clients,
whether they are detected in the network or not. Note that enabling
b/g Protection can slow throughput for 802.11g/n clients by as
much as 50%.
Off — Forces the unit to never use protection for 802.11b clients.
This prevents 802.11b clients from connecting to the network.
◆
Beacon Interval — The rate at which beacon signals are transmitted
from the access point. The beacon signals allow wireless clients to
maintain contact with the access point. They may also carry powermanagement information. (Range: 20-999 TUs; Default: 100 TUs)
◆
Data Beacon Rate (DTIM) — The rate at which stations in sleep
mode must wake up to receive broadcast/multicast transmissions.
Known also as the Delivery Traffic Indication Map (DTIM) interval, it
indicates how often the MAC layer forwards broadcast/multicast traffic,
which is necessary to wake up stations that are using Power Save
mode. The default value of one beacon indicates that the access point
will save all broadcast/multicast frames for the Basic Service Set (BSS)
and forward them after every beacon. Using smaller DTIM intervals
delivers broadcast/multicast frames in a more timely manner, causing
stations in Power Save mode to wake up more often and drain power
faster. Using higher DTIM values reduces the power used by stations in
Power Save mode, but delays the transmission of broadcast/multicast
frames. (Range: 1-255 beacons; Default: 1 beacon)
◆
Fragmentation Threshold – Configures the minimum packet size that
can be fragmented when passing through the access point.
Fragmentation of the PDUs (Package Data Unit) can increase the
reliability of transmissions because it increases the probability of a
successful transmission due to smaller frame size. If there is significant
interference present, or collisions due to high network utilization, try
setting the fragment size to send smaller fragments. This will speed up
the retransmission of smaller frames. However, it is more efficient to
set the fragment size larger if very little or no interference is present
because it requires overhead to send multiple frames. (Range: 2562346 bytes; Default: 2346 bytes)
◆
RTS Threshold — Sets the packet size threshold at which a Request to
Send (RTS) signal must be sent to a receiving station prior to the
sending station starting communications. The access point sends RTS
frames to a receiving station to negotiate the sending of a data frame.
After receiving an RTS frame, the station sends a CTS (clear to send)
frame to notify the sending station that it can start sending data.
If the RTS threshold is set to 0, the access point always sends RTS
signals. If set to 2347, the access point never sends RTS signals. If set
to any other value, and the packet size equals or exceeds the RTS
– 70 –
CHAPTER 7 | Wireless Configuration
Advanced Settings
threshold, the RTS/CTS (Request to Send / Clear to Send) mechanism
will be enabled.
The access points contending for the medium may not be aware of each
other. The RTS/CTS mechanism can solve this “Hidden Node Problem.”
(Range: 1-2347 bytes: Default: 2347 bytes)
◆
Short Preamble — Sets the length of the signal preamble that is used
at the start of a data transmission. Use a short preamble (96
microseconds) to increase data throughput when it is supported by all
connected 802.11g clients. Use a long preamble (192 microseconds) to
ensure all 802.11b clients can connect to the network.
(Default: Disabled)
◆
Short Slot — Sets the basic unit of time the access point uses for
calculating waiting times before data is transmitted. A short slot time
(9 microseconds) can increase data throughput on the access point, but
requires that all clients can support a short slot time (that is, 802.11gcompliant clients must support a short slot time). A long slot time
(20 microseconds) is required if the access point has to support
802.11b clients. (Default: Enabled)
◆
TX Burst — A performance enhancement that transmits a number of
data packets at the same time when the feature is supported by
compatible clients. (Default: Enabled)
◆
Packet Aggregate — A performance enhancement that combines data
packets together when the feature is supported by compatible clients.
(Default: Enabled)
WI-FI MULTIMEDIA The Mini Broadband Router implements Quality of Service (QoS) using the
Wi-Fi Multimedia (WMM) standard. Using WMM, the access point is able to
prioritize traffic and optimize performance when multiple applications
compete for wireless network bandwidth at the same time. WMM employs
techniques that are a subset of the developing IEEE 802.11e QoS standard
and it enables access points to interoperate with both WMM-enabled clients
and other devices that may lack any WMM functionality.
WMM defines four access categories (ACs): voice, video, best effort, and
background. These categories correspond to traffic priority levels and are
mapped to IEEE 802.1D priority tags (see Table 3). The direct mapping of
the four ACs to 802.1D priorities is specifically intended to facilitate
interoperability with other wired network QoS policies. While the four ACs
are specified for specific types of traffic, WMM allows the priority levels to
be configured to match any network-wide QoS policy. WMM also specifies a
protocol that access points can use to communicate the configured traffic
priority levels to QoS-enabled wireless clients.
– 71 –
CHAPTER 7 | Wireless Configuration
Advanced Settings
Table 3: WMM Access Categories
Access
Category
WMM
Designation
Description
802.1D
Tags
AC_VO (AC3)
Voice
Highest priority, minimum delay. Time-sensitive
data such as VoIP (Voice over IP) calls.
7, 6
AC_VI (AC2)
Video
High priority, minimum delay. Time-sensitive
data such as streaming video.
5, 4
AC_BE (AC0)
Best Effort
Normal priority, medium delay and throughput.
Data only affected by long delays. Data from
applications or devices that lack QoS
capabilities.
0, 3
AC_BK (AC1)
Background
Lowest priority. Data with no delay or
throughput requirements, such as bulk data
transfers.
2, 1
The Wi-Fi Multimedia section on the Wireless Settings Advanced page
allows you to enable WMM and set detailed QoS parameters.
Figure 37: Wi-Fi Multimedia Settings
The following items are displayed in this section on this page:
◆
WMM — Sets the WMM operational mode on the access point. When
enabled, the QoS capabilities are advertised to WMM-enabled clients in
the network. WMM must be supported on any device trying to
associated with the access point. Devices that do not support this
feature will not be allowed to associate with the access point.
(Default: Enabled)
◆
APSD — When WMM is enabled, Automatic Power Save Delivery
(APSD) can also be enabled. APSD is an efficient power management
method that enables client devices sending WMM packets to enter a
low-power sleep state between receiving and transmitting data.
(Default: Disabled)
◆
WMM Parameters — Click the WMM Configuration button to set
detailed WMM parameters.
– 72 –
CHAPTER 7 | Wireless Configuration
Advanced Settings
Figure 38: WMM Configuration
The following items are displayed in the WMM Configuration window:
◆
AIFSN (Arbitration Inter-Frame Space) — The minimum amount of
wait time before the next data transmission attempt. Specify the AIFS
value in the range 0-15 microseconds.
◆
CWMin (Minimum Contention Window) — The initial upper limit of the
random backoff wait time before wireless medium access can be
attempted. The initial wait time is a random value between zero and
the CWMin value. Specify the CWMin value in the range 0-15
microseconds. Note that the CWMin value must be equal or less than
the CWMax value.
◆
CWMax (Maximum Contention Window) — The maximum upper limit
of the random backoff wait time before wireless medium access can be
attempted. The contention window is doubled after each detected
collision up to the CWMax value. Specify the CWMax value in the range
0-15 microseconds. Note that the CWMax value must be greater or
equal to the CWMin value.
◆
Txop (Transmit Opportunity Limit) — The maximum time an AC
transmit queue has access to the wireless medium. When an AC queue
is granted a transmit opportunity, it can transmit data for a time up to
the TxOpLimit. This data bursting greatly improves the efficiency for
high data-rate traffic. Specify a value in the range 0-65535
microseconds.
– 73 –
CHAPTER 7 | Wireless Configuration
Advanced Settings
◆
ACM — The admission control mode for the access category. When
enabled, clients are blocked from using the access category.
(Default: Disabled)
◆
AckPolicy — By default, all wireless data transmissions require the
sender to wait for an acknowledgement from the receiver. WMM allows
the acknowledgement wait time to be turned off for each Access
Category (AC) 0-3. Although this increases data throughput, it can also
result in a high number of errors when traffic levels are heavy.
(Default: Acknowledge)
MULTICAST-TO- The Multicast-to-Unicast Converter section on the Wireless Settings
UNICAST CONVERTER Advanced page allows you to enable multicast traffic conversion.
Converting multicast traffic to unicast before sending to wireless clients
allows a longer DTIM (Data Beacon Rate) interval to be set. A longer DTIM
interval prevents clients in power-save mode having to activate their radios
to receive the multicast data, which saves battery life.
Figure 39: Multicast-to-Unicast Converter
The following items are displayed in this section on this page:
◆
Multicast-to-Unicast — Enables multicast traffic streams to be
converted to unicast traffic before delivery to wireless clients.
(Default: Disabled)
– 74 –
CHAPTER 7 | Wireless Configuration
WLAN Security
WLAN SECURITY
The Mini Broadband Router’s wireless interface is configured by default as
an “open system,” which broadcasts a beacon signal including the
configured SSID. Wireless clients with a configured SSID of “ANY” can read
the SSID from the beacon, and automatically set their SSID to allow
immediate connection to the wireless network.
To implement wireless network security, you have to employ one or both of
the following functions:
◆
Authentication — It must be verified that clients attempting to
connect to the network are authorized users.
◆
Traffic Encryption — Data passing between the unit and clients must
be protected from interception and eavesdropping.
The Mini Broadband Router supports supports ten different security
mechanisms that provide various levels of authentication and encryption
depending on the requirements of the network.
The Mini Broadband Router supports two SSID interfaces. Each SSID
interface functions as a separate access point, and can be configured with
its own security settings.
Click on “Wireless Settings,” followed by “Basic”.
Figure 40: Security Mode Options
– 75 –
CHAPTER 7 | Wireless Configuration
WLAN Security
The supported security mechanisms and their configuration parameters are
described in the following sections:
◆
OPEN, SHARED, WEP-AUTO — See “Wired Equivalent Privacy (WEP)”
on page 76
◆
WPA-PSK, WPA2-PSK, WPA-PSK_WPA2-PSK — See “WPA PreShared Key” on page 77
◆
WPA, WPA2, WPA1_WPA2 — See “WPA Enterprise Mode” on
page 78
◆
802.1X — See “IEEE 802.1X and RADIUS” on page 80
WIRED EQUIVALENT WEP provides a basic level of security, preventing unauthorized access to
PRIVACY (WEP) the network, and encrypting data transmitted between wireless clients and
an access point. WEP uses static shared keys (fixed-length hexadecimal or
alphanumeric strings) that are manually distributed to all clients that want
to use the network.
When you select to use WEP, be sure to define at least one static WEP key
for user authentication or data encryption. Also, be sure that the WEP
shared keys are the same for each client in the wireless network.
Figure 41: Security Mode - WEP
The following items are displayed in this section on this page:
Security Mode — Configures the WEP security mode used by clients.
When using WEP, be sure to define at least one static WEP key for the Mini
Broadband Router and all its clients. (Default: Disable)
◆
OPEN — Open-system authentication accepts any client attempting to
connect the Mini Broadband Router without verifying its identity. In this
mode the default data encryption type is “WEP.”
◆
SHARED — The shared-key security uses a WEP key to authenticate
clients connecting to the network and for data encryption.
– 76 –
CHAPTER 7 | Wireless Configuration
WLAN Security
◆
WEP-AUTO — Allows wireless clients to connect to the network using
Open-WEP (uses WEP for encryption only) or Shared-WEP (uses WEP
for authentication and encryption).
◆
Encrypt Type — Selects WEP for data encryption (OPEN mode only).
◆
Default Key — Selects the WEP key number to use for authentication
or data encryption. If wireless clients have all four WEP keys configured
to the same values, you can change the encryption key to any of the
settings without having to update the client keys. (Default: 1;
Range: 1~4)
◆
WEP Keys 1 ~ 4 — Sets WEP key values. The user must first select
ASCII or hexadecimal keys. Each WEP key has an index number. Enter
key values that match the key type and length settings. Enter 5
alphanumeric characters or 10 hexadecimal digits for 64-bit keys, or
enter 13 alphanumeric characters or 26 hexadecimal digits for 128-bit
keys. (Default: Hex, no preset value)
WPA PRE-SHARED Wi-Fi Protected Access (WPA) was introduced as an interim solution for the
KEY vulnerability of WEP pending the adoption of a more robust wireless
security standard. WPA2 includes the complete wireless security standard,
but also offers backward compatibility with WPA. Both WPA and WPA2
provide an “enterprise” and “personal” mode of operation.
For small home or office networks, WPA and WPA2 provide a simple
“personal” operating mode that uses just a pre-shared key for network
access. The WPA Pre-Shared Key (WPA-PSK) mode uses a common
password phrase for user authentication that is manually entered on the
access point and all wireless clients. Data encryption keys are
automatically generated by the access point and distributed to all clients
connected to the network.
Figure 42: Security Mode - WPA-PSK
The following items are displayed in this section on this page:
Security Mode — Configures the WPA-PSK and WPA2-PSK security modes
used by clients. When using WPA-PSK or WPA2-PSK, be sure to define the
shared key for the Mini Broadband Router and all its clients.
(Default: Disable)
– 77 –
CHAPTER 7 | Wireless Configuration
WLAN Security
◆
WPA-PSK — Clients using WPA with a Pre-shared Key are accepted for
authentication. The default data encryption type for WPA is TKIP.
◆
WPA2-PSK — Clients using WPA2 with a Pre-shared Key are accepted
for authentication. The default data encryption type for WPA is AES.
◆
WPA-PSK_WPA2-PSK — Clients using WPA or WPA2 with a Preshared Key are accepted for authentication. The default data encryption
type is TKIP/AES.
◆
WPA Algorithms — Selects the data encryption type to use. (Default
is determined by the Security Mode selected.)
■
TKIP — Uses Temporal Key Integrity Protocol (TKIP) keys for
encryption. WPA specifies TKIP as the data encryption method to
replace WEP. TKIP avoids the problems of WEP static keys by
dynamically changing data encryption keys.
■
AES — Uses Advanced Encryption Standard (AES) keys for
encryption. WPA2 uses AES Counter-Mode encryption with Cipher
Block Chaining Message Authentication Code (CBC-MAC) for
message integrity. The AES Counter-Mode/CBCMAC Protocol (AESCCMP) provides extremely robust data confidentiality using a 128bit key. Use of AES-CCMP encryption is specified as a standard
requirement for WPA2. Before implementing WPA2 in the network,
be sure client devices are upgraded to WPA2-compliant hardware.
■
TKIP/AES — Uses either TKIP or AES keys for encryption. WPA and
WPA2 mixed modes allow both WPA and WPA2 clients to associate
to a common SSID. In mixed mode, the unicast encryption type
(TKIP or AES) is negotiated for each client.
◆
Pass Phrase — The WPA Preshared Key can be input as an ASCII
string (an easy-to-remember form of letters and numbers that can
include spaces) or Hexadecimal format. (Range: 8~63 ASCII
characters, or exactly 64 Hexadecimal digits)
◆
Key Renewal Interval — Sets the time period for automatically
changing data encryption keys and redistributing them to all connected
clients. (Default: 3600 seconds)
WPA ENTERPRISE Wi-Fi Protected Access (WPA) was introduced as an interim solution for the
MODE vulnerability of WEP pending the adoption of a more robust wireless
security standard. WPA2 includes the complete wireless security standard,
but also offers backward compatibility with WPA. Both WPA and WPA2
provide an “enterprise” and “personal” mode of operation.
For enterprise deployment, WPA and WPA2 use IEEE 802.1X for user
authentication and require a RADIUS authentication server to be
configured on the wired network. Data encryption keys are automatically
generated and distributed to all clients connected to the network.
– 78 –
CHAPTER 7 | Wireless Configuration
WLAN Security
Figure 43: Security Mode - WPA
The following items are displayed in this section on this page:
Security Mode — Configures the WPA and WPA2 security modes used by
clients. When using WPA or WPA2, be sure there is a RADIUS server in the
connected wired network, and that the RADIUS settings are configured.
See “IEEE 802.1X and RADIUS” on page 80 for more information.
(Default: Disable)
◆
WPA — Clients using WPA with an 802.1X authentication method are
accepted for authentication. The default data encryption type for WPA
is TKIP.
◆
WPA2 — Clients using WPA2 with an 802.1X authentication method
are accepted for authentication. The default data encryption type for
WPA is AES.
◆
WPA1_WPA2 — Clients using WPA or WPA2 with an 802.1X
authentication method are accepted for authentication. The default
data encryption type is TKIP/AES.
◆
WPA Algorithms — Selects the data encryption type to use. (Default
is determined by the Security Mode selected.)
■
■
TKIP — Uses Temporal Key Integrity Protocol (TKIP) keys for
encryption. WPA specifies TKIP as the data encryption method to
replace WEP. TKIP avoids the problems of WEP static keys by
dynamically changing data encryption keys.
AES — Uses Advanced Encryption Standard (AES) keys for
encryption. WPA2 uses AES Counter-Mode encryption with Cipher
Block Chaining Message Authentication Code (CBC-MAC) for
– 79 –
CHAPTER 7 | Wireless Configuration
WLAN Security
message integrity. The AES Counter-Mode/CBCMAC Protocol (AESCCMP) provides extremely robust data confidentiality using a 128bit key. Use of AES-CCMP encryption is specified as a standard
requirement for WPA2. Before implementing WPA2 in the network,
be sure client devices are upgraded to WPA2-compliant hardware.
■
TKIP/AES — Uses either TKIP or AES keys for encryption. WPA and
WPA2 mixed modes allow both WPA and WPA2 clients to associate
to a common SSID. In mixed mode, the unicast encryption type
(TKIP or AES) is negotiated for each client.
◆
Key Renewal Interval — Sets the time period for automatically
changing data encryption keys and redistributing them to all connected
clients. (Default: 3600 seconds)
◆
PMK Cache Period — WPA2 provides fast roaming for authenticated
clients by retaining keys and other security information in a cache, so
that if a client roams away from an access point and then returns
reauthentication is not required. This parameter sets the time for
deleting the cached WPA2 Pairwise Master Key (PMK) security
information. (Default: 10 minutes)
◆
Pre-Authentication — When using WPA2, pre-authentication can be
enabled that allows clients to roam to another access point and be
quickly associated without performing full 802.1X authentication.
(Default: Disabled)
IEEE 802.1X AND IEEE 802.1X is a standard framework for network access control that uses
RADIUS a central RADIUS server for user authentication. This control feature
prevents unauthorized access to the network by requiring an 802.1X client
application to submit user credentials for authentication. The 802.1X
standard uses the Extensible Authentication Protocol (EAP) to pass user
credentials (either digital certificates, user names and passwords, or other)
from the client to the RADIUS server. Client authentication is then verified
on the RADIUS server before the client can access the network.
Remote Authentication Dial-in User Service (RADIUS) is an authentication
protocol that uses software running on a central server to control access to
RADIUS-aware devices on the network. An authentication server contains a
database of user credentials for each user that requires access to the
network.
The WPA and WPA2 enterprise security modes use 802.1X as the method
of user authentication. IEEE 802.1X can also be enabled on its own as a
security mode for user authentication. When 802.1X is used, a RADIUS
server must be configured and be available on the connected wired network.
NOTE: This guide assumes that you have already configured RADIUS
server(s) to support the access point. Configuration of RADIUS server
software is beyond the scope of this guide, refer to the documentation
provided with the RADIUS server software.
– 80 –
CHAPTER 7 | Wireless Configuration
WLAN Security
Figure 44: Security Mode - 802.1X
The following items are displayed in this section on this page:
Security Mode — Configures the 802.1X security mode used by clients.
When using 802.1X, either with WPA/WPA2 or on its own, be sure there is
a configured RADIUS server in the connected wired network.
(Default: Disable)
802.1X WEP: Selects WEP keys for data encryption. When enabled, WEP
encryption keys are automatically generated by the RADIUS server and
distributed to all connected clients. (Default: Disabled)
RADIUS Server — Configures RADIUS server settings.
◆
IP Address — Specifies the IP address of the RADIUS server.
◆
Port — The User Datagram Protocol (UDP) port number used by the
RADIUS server for authentication messages. (Range: 1024-65535;
Default: 1812)
◆
Shared Secret — A shared text string used to encrypt messages
between the access point and the RADIUS server. Be sure that the
same text string is specified on the RADIUS server. Do not use blank
spaces in the string. (Maximum length: 20 characters)
◆
Session Timeout — Number of seconds the access point waits for a
reply from the RADIUS server before resending a request. (Range: 160 seconds; Default: 0)
◆
Idle Timeout — Sets the maximum time (in seconds) of client
inactivity before a session is terminated.
– 81 –
CHAPTER 7 | Wireless Configuration
Wireless Distribution System (WDS)
ACCESS POLICY The Mini Broadband Router provides a MAC address filtering facility. The
access policy can be set to allow or reject specific station MAC addresses.
This feature can be used to connect known wireless devices that may not
be able to support the configured security mode.
Figure 45: Access Policy
The following items are displayed in this section on this page:
◆
Access Policy — The access policy can be set to allow or reject specific
station MAC addresses.
◆
Add a station MAC — Enter the MAC address of the station that you
want to filter. MAC addresses must be entered in the format
xx:xx:xx:xx:xx:xx.
WIRELESS DISTRIBUTION SYSTEM (WDS)
The radio interface can be configured to operate in a mode that allows it to
forward traffic directly to other Mini Broadband Router units. This feature
can be used to extend the range of the wireless network to reach remote
clients, or to link disconnected network segments to an Internet
connection.
To set up links between units, you must configure the Wireless Distribution
System (WDS) forwarding table by specifying the wireless MAC address of
all units to which you want to forward traffic.
NOTE: All units in a WDS wireless network must be configured with the
same SSID and use the same radio channel. Also each WDS link must be
configured with the same encryption key on both units in the link.
Up to four WDS links can be specified for each unit in the WDS network.
The following figures illustrate an example WDS network. Figure 46 shows
the manual set up of MAC addresses for units in the WDS network.
Figure 47 shows the basic configuration required on each unit in the WDS
network.
– 82 –
CHAPTER 7 | Wireless Configuration
Wireless Distribution System (WDS)
Figure 46: Manual WDS MAC Address Configuration
Internet
Service
Provider
WDS Link
Cable/DSL
Modem
S
WD
L ink
WD
SL
MAC: 00-22-2D-62-EA-11
WDS MAC List:
00-22-2D-62-EA-22
00-22-2D-62-EA-33
00-22-2D-62-EA-44
MAC: 00-22-2D-62-EA-44
WDS MAC List:
00-22-2D-62-EA-11
ink
MAC: 00-22-2D-62-EA-22
WDS MAC List:
00-22-2D-62-EA-11
MAC: 00-22-2D-62-EA-33
WDS MAC List:
00-22-2D-62-EA-11
Figure 47: WDS Configuration Example
Internet
Service
Provider
WDS Link
Cable/DSL
Modem
WD
SL
ink
WD
Operation Mode: Router
WDS Mode: Bridge
DHCP Server: Enable
LAN IP Address: 192.168.2.1
Operation Mode: Bridge
WDS Mode: Repeater
DHCP Server: Disable
LAN IP Address: 192.168.2.2
SL
ink
Operation Mode: Router
WDS Mode: Lazy
DHCP Server: Disable
LAN IP Address: 192.168.2.4
Operation Mode: Bridge
WDS Mode: Lazy
DHCP Server: Disable
LAN IP Address: 192.168.2.3
A WDS link between two units can be configured in any of the following
Operation Mode combinations:
1. Both units in a link are configured as Router Mode.
2. One unit in a link is configured in Router Mode and the other in Bridge
Mode.
3. Both units in a link are configured as Bridge Mode.
When two or more units in the WDS network are set to Router Mode, be
sure to check these settings:
◆
Be sure each unit is configured with a different LAN IP address.
– 83 –
CHAPTER 7 | Wireless Configuration
Wireless Distribution System (WDS)
◆
Be sure that only one unit has an Internet access on its WAN port.
◆
Be sure the DHCP server is enabled only on one unit. When one unit is
providing Internet access, enable the DHCP server on that unit.
NOTE: When using WDS Lazy mode in the network, at least one unit must
be set to Bridge or Repeater mode.
Figure 48: WDS Configuration
The WDS settings configure WDS related parameters. Up to four MAC
addresses can be specified for each unit in the WDS network. WDS links
may either be manually configured (Bridge and Repeater modes) or autodiscovered (Lazy mode).
The following items are displayed on this page:
◆
WDS Mode — Selects the WDS mode of the SSID. (Options: Disable,
Lazy, Bridge, Repeater. Default: Disable)
■
■
Disable: WDS is disabled.
Lazy: Operates in an automatic mode that detects and learns WDS
peer addresses from received WDS packets, without the need to
– 84 –
CHAPTER 7 | Wireless Configuration
Wi-Fi Protected Setup (WPS)
configure a WDS MAC list entry. This feature allows the Mini
Broadband Router to associate with other Mini Broadband Routers
in the network and use their WDS MAC list. Lazy mode requires one
other Mini Broadband Router within the wireless network that is
configured in Bridge or Repeater mode, and has a configured MAC
address list.
■
■
Bridge: Operates as a standard bridge that forwards traffic
between WDS links (links that connect to other units in Repeater or
Lazy mode). The MAC addresses of WDS peers must be configured
on the Mini Broadband Router.
Repeater: Operates as a wireless repeater, extending the range for
remote wireless clients and connecting them to an AP connected to
the wired network. The MAC addresses of WDS peers must be
configured on the Mini Broadband Router.
◆
Physical — The radio media coding used on all WDS links. CCK
corresponds to 11b, OFDM corresponds to 11g, and HTMIX corresponds
to 11n.
◆
Encryption Type — The data encryption used on the WDS link. Be
sure that both ends of a WDS link are configured with the same
encryption type and key. (Options: None, WEP, TKIP, AES.
Default: None)
◆
Encryption Key — The encryption key for the WDS link. The key type
and length varies depending on the encryption type selected. For WEP,
enter 5 alphanumeric characters or 10 hexadecimal digits for 64-bit
keys, or 13 alphanumeric characters or 26 hexadecimal digits for 128bit keys. For TKIP or AES, enter a password key phrase of between 8 to
63 ASCII characters, which can include spaces, or specify exactly 64
hexadecimal digits.
◆
AP MAC Address — The MAC address of the other Mini Broadband
Router in the WDS link.
WI-FI PROTECTED SETUP (WPS)
Wi-Fi Protected Setup (WPS) is designed to ease installation and activation
of security features in wireless networks. WPS has two basic modes of
operation, Push-button Configuration (PBC) and Personal Identification
Number (PIN). The WPS PIN setup is optional to the PBC setup and
provides more security. The WPS button on the Mini Broadband Router can
be pressed at any time to allow a single device to easily join the network.
The WPS Settings page includes configuration options for setting WPS
device PIN codes and activating the virtual WPS button.
Click on “Wireless Settings,” followed by “WPS”.
– 85 –
CHAPTER 7 | Wireless Configuration
Wi-Fi Protected Setup (WPS)
Figure 49: Enabling WPS
The following items are displayed on this page:
◆
WPS — Enables WPS, locks security settings, and refreshes WPS
configuration information. (Default: Disabled)
Figure 50: WPS Configuration
– 86 –
CHAPTER 7 | Wireless Configuration
Wi-Fi Protected Setup (WPS)
The following items are displayed on this page:
WPS Summary — Provides detailed WPS statistical information.
◆
WPS Current Status — Displays if there is currently any WPS traffic
connecting to the Mini Broadband Router. (Options: Start WSC Process;
Idle)
◆
WPS Configured — States if WPS for wireless clients has been
configured for this device.
◆
WPS SSID — The service set identifier for the unit.
◆
WPS Auth Mode — The method of authentication used.
◆
WPS Encryp Type — The encryption type used for the unit.
◆
WPS Default Key Index — Displays the WEP default key (1~4).
◆
WPS Key (ASCII) — Displays the WPS security key (ASCII) which can
be used to ensure the security of the wireless network.
◆
AP PIN — Displays the PIN Code for the Mini Broadband Router. The
default is exclusive for each unit. (Default: 64824901)
◆
Reset WPS to Default — Resets the WPS settings to factory default
values.
WPS Config — Configures WPS settings for the Mini Broadband Router.
◆
WPS Mode — Selects between methods of broadcasting the WPS
beacon to network clients wanting to join the network:
■
PIN: The Mini Broadband Router, along with other WPS devices,
such as notebook PCs, cameras, or phones, all come with their own
eight-digit PIN code. When one device, the WPS enrollee, sends a
PIN code to the Mini Broadband Router, it becomes the WPS
registrar. After configuring PIN-Code information you must press
“Apply” to send the beacon, after which you have up to two minutes
to activate WPS on devices that need to join the network.
■
PBC: This has the same effect as pressing the physical WPS button
that is located on the front of the Mini Broadband Router. After
checking this option and clicking “Apply” you have up to two
minutes to activate WPS on devices that need to join the network.
– 87 –
CHAPTER 7 | Wireless Configuration
Station List
STATION LIST
Displays the station information which associated to this Mini Broadband
Router.
Figure 51: Station List
– 88 –
8
AP CLIENT MODE WIRELESS
CONFIGURATION
This chapter describes configuration settings for the Mini Broadband Router
to function as a wireless client for connecting to another wireless network.
It includes the following sections:
◆
“Profile” on page 89
◆
“Link Status” on page 95
◆
“Site Survey” on page 97
◆
“Statistics” on page 98
PROFILE
The Station Profile page shows the list of configuration profiles for
connecting to preferred Wi-Fi networks.
Figure 52: Station Profile
For a selected profile in the list, you can click Activate to connect to the
specified network, Edit to modify the configuration details, or Delete to
remove the profile from the list. Click Add to manually set up details for a
new wireless network.
– 89 –
CHAPTER 8 | AP Client Mode Wireless Configuration
Profile
PROFILE The profile settings page allows you to configure and save wireless settings
CONFIGURATION for a specific wireless network connection.
Figure 53: Profile—System Configuration (Infrastructure)
Figure 54: Profile—System Configuration (Ad Hoc)
The following items are displayed on this page:
◆
Profile Name — A name that identifies the profile (0-32 ASCII
characters are allowed; no spaces can be used).
◆
SSID — The name of the wireless network to which the client will
connect.
◆
Network Type — The type of wireless network.
(Default: Infrastructure)
■
Infrastructure: An integrated wireless and wired LAN. Select
Infrastructure to associate to an AP.
– 90 –
CHAPTER 8 | AP Client Mode Wireless Configuration
Profile
■
◆
802.11 Ad hoc: A group of wireless devices connected as an
independent wireless LAN. Select “Ad hoc” to associate to a peer
computer.
Power Saving Mode — Only available when “Infrastructure” is
selected as the network type.
■
CAM (Constantly Awake Mode): Power saving mode is disabled.
■
Power Saving Mode: Enables the power save operation.
◆
Channel — The radio channel used to communicate with wireless peers
in an ad hoc network. The channel has to be the same for all peer
computers. (Only available when “Ad hoc” is selected as the network
type.)
◆
11B Preamble Type — Sets the length of the signal preamble that is
used at the start of a data transmission. Use a long preamble (192
microseconds) to ensure connection to all 802.11b devices. When set
to Auto, a short (96 microseconds) or long preamble will be used
depending on the capabilities of other ad hoc network devices. (Only
available when “Ad hoc” is selected as the network type.)
(Default: Auto)
◆
RTS Threshold — Sets the packet size threshold at which a Request to
Send (RTS) signal must be sent to a receiving station prior to the
sending station starting communications. The access point sends RTS
frames to a receiving station to negotiate the sending of a data frame.
After receiving an RTS frame, the station sends a CTS (clear to send)
frame to notify the sending station that it can start sending data. If the
RTS threshold is set to 0, the access point always sends RTS signals. If
set to 2347, the access point never sends RTS signals. If set to any
other value, and the packet size equals or exceeds the RTS threshold,
the RTS/CTS (Request to Send / Clear to Send) mechanism will be
enabled. The access points contending for the medium may not be
aware of each other. The RTS/CTS mechanism can solve this “Hidden
Node Problem.” (Range: 0-2347 bytes)
◆
Fragment Threshold — Configures the minimum packet size that can
be fragmented when passing through the access point. Fragmentation
of the PDUs (Package Data Unit) can increase the reliability of
transmissions because it increases the probability of a successful
transmission due to smaller frame size. If there is significant
interference present, or collisions due to high network utilization, try
setting the fragment size to send smaller fragments. This will speed up
the retransmission of smaller frames. However, it is more efficient to
set the fragment size larger if very little or no interference is present
because it requires overhead to send multiple frames. (Range: 2562346 bytes; Default: 2346 bytes)
– 91 –
CHAPTER 8 | AP Client Mode Wireless Configuration
Profile
SECURITY POLICY Configures authentication and encryption to match the security of the
wireless network. For an infrastructure network, four security modes are
supported, including Open, Shared, WPA-Personal, and WPA2-Personal. For
an ad hoc network, Open, Shared, and WPA-NONE (same as WPAPersonal) modes are supported.
Figure 55: Add Profile-Security Policy
The following items are available for the Security Mode:
◆
Open: Open-system authentication accepts any client attempting to
connect to the access point without verifying its identity.
◆
Shared: Uses Wired Equivalent Privacy (WEP) to verify client identity
by distributing a shared key to clients before attempting authentication.
◆
WPA-Personal: Wi-Fi Protected Access (WPA) employs a combination
of technologies to provide an enhanced security solution for wireless
networks. The WPA Pre-shared Key (WPA-PSK, or WPA-Personal) mode
for small networks uses a common password phrase that must be
manually distributed to all clients that want to connect to a network.
◆
WPA2-Personal: A security enhancement to WPA that includes
stronger encryption based on the AES algorithm, which is considered
the strongest security possible. The WPA2-Personal mode also requires
a common password phrase that must be manually distributed to all
clients that want to connect to a network.
– 92 –
CHAPTER 8 | AP Client Mode Wireless Configuration
Profile
WEP SHARED-KEY Wired Equivalent Privacy (WEP) provides a basic level of security,
SECURITY preventing unauthorized access to the network and encrypting data
transmitted between wireless clients. WEP uses static shared keys (fixedlength hexadecimal or alphanumeric strings) that are manually distributed
to all clients that want to use the network. When WEP shared-key security
is enabled, you must configure at least one key.
Figure 56: WEP Security
The following items are displayed for WEP Shared-key security:
◆
WEP Key Length — Sets the length of the WEP key. (Default: 64 bit;
Options: 64 bit, 128 bit)
◆
WEP Key Entry Method — Specifies the method for entering the WEP
key values. (Default: Hexadecimal; Options: Hexadecimal, Ascii Text)
◆
Key 1 ~ Key 4 — Sets WEP key values. The user must first choose
between ASCII or Hexadecimal keys. At least one key must be
specified. Each WEP key has an index number. Enter key values that
match the key type and length settings. Standard keys are either 5 or
13 alphanumeric characters; or 10 or 26 hexadecimal digits.
◆
Default Key — Sets the WEP key used for authentication. (Default: 1;
Range: 1~4)
– 93 –
CHAPTER 8 | AP Client Mode Wireless Configuration
Profile
WPA/WPA2- For small home or office networks, WPA and WPA2 provide a simple
PERSONAL SECURITY “personal” operating mode that uses a pre-shared key for network access.
This mode uses a common password phrase for user authentication that is
manually entered on an AP and all wireless clients.
Figure 57: WPA Security
The following items are displayed for WPA-personal security:
◆
◆
WPA Algorithms — Configure the encryption algorithm for WPA/
WPA2-Personal security. The selection options are TKIP and AES.
■
TKIP — Use Temporal Key Integrity Protocol (TKIP) keys for
encryption. WPA specifies TKIP as the data encryption method to
replace WEP. TKIP avoids the problems of WEP static keys by
dynamically changing data encryption keys.
■
AES — Use Advanced Encryption Standard (AES) keys for
encryption. AES (AES-CCMP) provides extremely robust data
confidentiality using a 128-bit key and is specified as a standard
requirement for WPA2. Before implementing WPA2 in the network,
be sure client devices are upgraded to WPA2-compliant hardware.
Pass Phrase — The WPA pre-shared Key can be entered as an ASCII
string (an easy-to-remember form of letters and numbers that can
include spaces) or Hexadecimal format. (Range: 8~63 ASCII
characters, or exactly 64 Hexadecimal digits)
– 94 –
CHAPTER 8 | AP Client Mode Wireless Configuration
Link Status
LINK STATUS
The Link Status page displays the current status of the connection to the
wireless network.
The following items are displayed on this page:
◆
Status — The service set identifier of the wireless network and the
MAC address of the connected AP.
◆
Extra Info — Indicates if the link is active.
◆
Channel — Specifies the current channel in use.
◆
Link Speed — The current transmitting and receiving rates.
◆
Throughput — The transmitting and receiving throughputs.
◆
Link Quality — The strength of the receive signal compared to other
interference and noise.
◆
Signal Strength 1~3 — The current receive signal strength indication.
◆
Noise Level — A value that indicates the amount of radio noise on the
current channel.
◆
dBm Format — Displays the signal strength and noise values in dBm.
– 95 –
CHAPTER 8 | AP Client Mode Wireless Configuration
Link Status
◆
BW (Channel Bandwidth) — The Wireless-N Access Point/Repeater
provides a channel bandwidth of 40 MHz by default giving an 802.11g
connection speed of 108 Mbps (sometimes referred to as Turbo Mode)
and a 802.11n connection speed of up to 150 Mbps. Setting the HT
Channel Bandwidth to 20 MHz slows connection speed for 802.11g and
802.11n to 54 Mbps and 74 Mbps respectively and ensures backward
compliance for slower 802.11b devices.
◆
GI (Guard Interval) — The guard interval between symbols helps
receivers overcome the effects of multipath delays. When you add a
guard time, the back portion of useful signal time is copied and
appended to the front.
◆
STBC — Indicates if Space Time Block Coding (STBC) is being used.
STBC is a MIMO mechanism that allows a unit with only one antenna to
leverage multiple antennas on other 802.11n devices to improve
performance and range.
◆
MCS — The Modulation and Coding Scheme (MCS) is a value that
determines the modulation, coding and number of spatial channels.
(Options: value [range] = 0~7 (1 Tx Stream), 8~15 (2 TxStream), 32
and auto (33))
◆
SNR (0/1) — The signal-to-noise ratio value for the MIMO spatial
channels 0 and 1.
– 96 –
CHAPTER 8 | AP Client Mode Wireless Configuration
Site Survey
SITE SURVEY
Site survey page displays information of detected wireless networks. You
can select one of these networks to connect to, or add it as a profile.
Figure 58: Station Site Survey
The following items are displayed on this page:
◆
SSID — The name of a detected wireless network.
◆
BSSID — The MAC address of the detected AP.
◆
RSSI — The receive signal strength of the detected AP.
◆
Channel — The radio channel used by the detected AP.
◆
Encryption — The data encryption type used by the detected AP.
◆
Authentication — The authentication method used by the detected
AP.
◆
Network Type — The type of wireless network detected;
infrastructure or ad hoc.
– 97 –
CHAPTER 8 | AP Client Mode Wireless Configuration
Statistics
◆
Connect — Click to attempt a connection to the selected wireless
network.
◆
Rescan — Click to scan all radio channels for nearby wireless
networks.
◆
Add Profile — Click to add the selected network as a profile. This
action opens the Profile Configuration page (see “Profile Configuration”
on page 90).
STATISTICS
The statistics page displays the connection-related statistics with detail
counter information.
Figure 59: Station Statistics
The following items are displayed on this page:
◆
Frames Transmitted Successfully — The number of data frames
transmitted from the client and successfully received by the AP or
network peer.
◆
Frames Transmitted Successfully Without Retry — The number of
data frames transmitted from the client and successfully received by
the AP or network peer without the need of a retransmit.
– 98 –
CHAPTER 8 | AP Client Mode Wireless Configuration
Statistics
◆
Frames Transmitted Successfully After Retry(s) — The number of
data frames transmitted from the client and successfully received by
the AP or network peer after being retransmited.
◆
Frames Fail To Receive ACK After All Retries — The number of
data frames transmitted from the client that were not successfully
received by the AP or network peer.
◆
RTS Frames Successfully Receive CTS — The number of Request to
Send frames transmitted from the client that resulted in a Clear to Send
frame being successfully received.
◆
RTS Frames Fail to Receive CTS — The number of Request to Send
frames transmitted from the client that did not result in a Clear to Send
frame being received.
◆
Frames Received Successfully — The number of data frames
successfully received by the client.
◆
Frames Received With CRC Error — The number of data frames
received by the client that had CRC errors.
◆
Frames Dropped Due To Out-of-Resource — The number of data
frames dropped by the client due to a lack of resources in the device.
◆
Duplicate Frames Received — The number of duplicate data frames
received by the client.
◆
Reset Counters — Click to set all the statistics counters back to zero.
– 99 –
9
FIREWALL CONFIGURATION
The Mini Broadband Router provides extensive firewall protection by
restricting connection parameters to limit the risk of intrusion and
defending against a wide array of common hacker attacks.
Firewall Configuration contains the following sections:
◆
“MAC/IP/Port Filtering” on page 100
◆
“Virtual Server Settings (Port Forwarding)” on page 103
◆
“DMZ” on page 104
◆
“System Security” on page 105
◆
“Content Filtering” on page 106
MAC/IP/PORT FILTERING
MAC/IP/Port filtering restricts connection parameters to limit the risk of
intrusion and defends against a wide array of common hacker attacks.
MAC/IP/Port filtering allows the unit to permit, deny or proxy traffic
through its MAC addresses, IP addresses and ports.
The Mini Broadband Router allows you define a sequential list of permit or
deny filtering rules (up to 32). This device tests ingress packets against the
filter rules one by one. A packet will be accepted as soon as it matches a
permit rule, or dropped as soon as it matches a deny rule. If no rules
match, the packet is either accepted or dropped depending on the default
policy setting.
– 100 –
CHAPTER 9 | Firewall Configuration
MAC/IP/Port Filtering
Figure 60: MAC/IP/Port Filtering
The following items are displayed on this page:
◆
MAC/IP/Port Filtering — Enables or disables MAC/IP/Port Filtering.
(Default: Disable)
◆
Default Policy — When MAC/IP/Port Filtering is enabled, the default
policy will be enabled. If you set the default policy to “Dropped”, all
incoming packets that don’t match the rules will be dropped. If the
policy is set to "Accepted," all incoming packets that don't match the
rules are accepted. (Default: Dropped)
◆
MAC Address — Specifies the MAC address to block or allow traffic
from.
– 101 –
CHAPTER 9 | Firewall Configuration
MAC/IP/Port Filtering
◆
Destination IP Address — Specifies the destination IP address to
block or allow traffic from.
◆
Source IP Address — Specifies the source IP address to block or allow
traffic from.
◆
Protocol — Specifies the destination port type, TCP, UDP or ICMP.
(Default: None).
◆
Destination Port Range — Specifies the range of destination port to
block traffic from the specified LAN IP address from reaching.
◆
Source Port Range — Specifies the range of source port to block
traffic from the specified LAN IP address from reaching.
◆
Action — Specifies if traffic should be accepted or dropped. (Default:
Accept)
◆
Comment — Enter a useful comment to help identify the filtering rules.
CURRENT FILTER The Current Filter Table displays the configured IP addresses and ports that
RULES are permitted or denied access to and from the Mini Broadband Router.
◆
Select — Selects a table entry.
◆
MAC Address — Displays a MAC address to filter.
◆
Destination IP Address — Displays the destination IP address.
◆
Source IP Address — Displays the source IP address.
◆
Protocol — Displays the destination port type.
◆
Destination Port Range — Displays the destination port range.
◆
Source Port Range — Displays the source port range.
◆
Action — Displays if the specified traffic is accepted or dropped.
◆
Comment — Displays a useful comment to identify the routing rules.
– 102 –
CHAPTER 9 | Firewall Configuration
Virtual Server Settings (Port Forwarding)
VIRTUAL SERVER SETTINGS (PORT FORWARDING)
Virtual Server (sometimes referred to as Port Forwarding) is the act of
forwarding a network port from one network node to another. This
technique can allow an external user to reach a port on a private IP
address (inside a LAN) from the outside through a NAT-enabled router.
(Maximum 32 entries are allowed.)
Figure 61: Virtual Server
The following items are displayed on this page:
◆
Virtual Server Settings — Selects between enabling or disabling port
forwarding the virtual server. (Default: Disable)
◆
IP Address — Specifies the IP address on the local network to allow
external access.
◆
Port Range — Specifies the port range through which traffic is
forwarded.
◆
Protocol — Specifies a protocol to use for port forwarding, either TCP,
UDP or TCP&UDP.
◆
Comment — Enter a useful comment to help identify the forwarded
port service on the network.
– 103 –
CHAPTER 9 | Firewall Configuration
DMZ
CURRENT VIRTUAL The Current Port Forwarding Table displays the entries that are allowed to
SERVERS IN SYSTEM forward packets through the Mini Broadband Router’s firewall.
◆
No. — The table entry number.
◆
IP Address — Displays an IP address on the local network to allow
external access to.
◆
Port Mapping — Displays the port the server is mapped.
◆
Protocol — Displays the protocol used for forwarding of this port.
◆
Comment — Displays a useful comment to identify the nature of the
port to be forwarded.
DMZ
Enables a specified host PC on the local network to access the Internet
without any firewall protection. Some Internet applications, such as
interactive games or video conferencing, may not function properly behind
the Mini Broadband Router's firewall. By specifying a Demilitarized Zone
(DMZ) host, the PC's TCP ports are completely exposed to the Internet,
allowing open two-way communication. The host PC should be assigned a
static IP address (which is mapped to its MAC address) and this must be
configured as the DMZ IP address.
Figure 62: DMZ
The following items are displayed on this page:
◆
DMZ Settings — Sets the DMZ status. (Default: Disable)
◆
DMZ IP Address — Specifies an IP address on the local network
allowed unblocked access to the WAN.
– 104 –
CHAPTER 9 | Firewall Configuration
System Security
SYSTEM SECURITY
The Mini Broadband Router includes the facility to manage it from a remote
location. The unit can also be sent a ping message from a remote location.
Figure 63: System Security
The following items are displayed on this page:
◆
Remote Management — Denies or allows management access to the
Mini Broadband Router through the WAN interface. (Default: Deny)
◆
Ping from WAN Filter — When enabled, the Mini Broadband Router
does not respond to ping packets received on the WAN port.
(Default: Disable)
◆
Stateful Packet Inspection (SPI) — The Stateful Packet Inspection
(SPI) firewall protects your network and computers against attacks and
intrusions. A stateful packet firewall looks at packet contents to check if
the traffic may involve some type of security risk. (Default: Enable)
– 105 –
CHAPTER 9 | Firewall Configuration
Content Filtering
CONTENT FILTERING
The Mini Broadband Router provides a variety of options for blocking
Internet access based on content, URL and host name.
Figure 64: Content Filtering
The following items are displayed on this page:
Web URL Filter Settings — By filtering inbound Uniform Resource
Locators (URLs) the risk of compromising the network can be reduced.
URLs are commonly used to point to websites. By specifying a URL or a
keyword contained in a URL traffic from that site may be blocked.
◆
Current URL Filters — Displays current URL filter.
◆
Add a URL Filter — Adds a URL filter to the settings. For example,
myhost.example.com.
Web Host Filter Settings — The Mini Broadband Router allows Internet
content access to be restricted based on web address keywords and web
domains. A domain name is the name of a particular web site. For
example, for the address www.FUNGAMES.com, the domain name is
FUNGAMES.com. Enter the Keyword then click “Add.”
– 106 –
CHAPTER 9 | Firewall Configuration
Content Filtering
◆
Current Host Filters — Displays current Host filter.
◆
Add a Host Filter — Enters the keyword for a host filtering.
– 107 –
10
ADMINISTRATION SETTINGS
The Mini Broadband Router’s Administration Settings menu provides the
same configuration options in both Router and Bridge Mode. These settings
allow you to configure a management access password, set the system
time, upgrade the system software, display the system status and
statistics.
Administration Settings contains the following sections:
◆
“System Management” on page 109
◆
“Time Zone Settings” on page 110
◆
“DDNS Settings” on page 111
◆
“Firmware Upgrade” on page 112
◆
“Configuration Settings” on page 113
◆
“System Status” on page 114
◆
“Statistics” on page 116
◆
“System Log” on page 117
– 108 –
CHAPTER 10 | Administration Settings
System Management
SYSTEM MANAGEMENT
The System Management commands allow you to change the language
settings displayed in the interface, and change the user password.
Figure 65: System Management
The following items are displayed in the first two sections on this page:
◆
Language Settings — You can change the language displayed in web
interface. Select the language of your choice from the drop-down list,
then click “Apply.” (Options: English, Traditional Chinese, Simple
Chinese, or Korean. Default: English)
◆
Web Interface Settings — To protect access to the management
interface, you need to configure a new Administrator’s password as
soon as possible. If a new password is not configured, then anyone
having access to the Mini Broadband Router may be able to
compromise the unit's security by entering the default value.
■
User Name — The name of the user. The user name for access to
the unit is fixed as “admin” and cannot be changed.
■
Password — The password for management access. The default
password preset for access to the unit is “smcadmin”. (Length: 1-32
characters, case sensitive)
– 109 –
CHAPTER 10 | Administration Settings
Time Zone Settings
TIME ZONE SETTINGS
The System Management page allows you to manually configure time
settings or enable the use of a Simple Network Time Protocol (SNTP) or
NTP server.
Figure 66: Time Zone Settings
The following items are displayed in this section on this page:
◆
Current Time — Displays the current system time on the unit.
◆
Sync with host — Updates the unit's time from the web management
PC's system time.
◆
Time Zone — Specifies the time zone in relation to Greenwich Mean
Time (GMT).
◆
SNTP Server — The IP address or URL of the NTP server to be used.
◆
SNTP synchronization — Sets the SNTP sycnronization in hours.
– 110 –
CHAPTER 10 | Administration Settings
DDNS Settings
DDNS SETTINGS
Dynamic DNS (DDNS) provides users on the Internet with a method to tie
a specific domain name to the unit’s dynamically assigned IP address.
DDNS allows your domain name to follow your IP address automatically by
changing your DNS records when your IP address changes.
The Mini Broadband Router provides access to three DDNS service
providers, DynDns.org, Non-IP.com and ZoneEdit.com. To set up an DDNS
account, visit the websites of these service providers at www.dyndns.org,
www.non-ip.com, or www.zoneedit.com.
Figure 67: DDNS Settings (Router Mode)
The following items are displayed in this section on this page:
◆
Dynamic DNS Provider — Specifies the DDNS service provider,
DynDns.org, Freedns.afraid.org, ZoneEdit.com or Non-IP.com.
(Default: none)
◆
User Name — Specifies your user name for the DDNS service.
◆
Password — Specifies your password for the DDNS service.
◆
HostName — Specifies the URL of the DDNS service.
– 111 –
CHAPTER 10 | Administration Settings
Firmware Upgrade
FIRMWARE UPGRADE
You can update the Mini Broadband Router firmware by using the Firmware
Update facility.
Figure 68: Firmware Upgrade
The following items are displayed on this page:
◆
Firmware Upgrade — Allows you to upload new firmware manually by
specifying a file path. Make sure the firmware you want to use is on the
local computer by clicking Browse to search for the firmware to be used
for the update.
■
Software Version — The current version number of the firmware.
■
Browse — Opens a directory on the local hard drive for specifying
the path of the file to upload.
■
Apply — Starts the upload procedure.
– 112 –
CHAPTER 10 | Administration Settings
Configuration Settings
CONFIGURATION SETTINGS
The Configuration Setting page allows you to save the Mini Broadband
Router’s current configuration or restore a previously saved configuration
back to the device.
Figure 69: Configuration Settings
The following items are displayed on this page:
◆
Export Settings — Saves the current configuration to a file locally.
◆
Import Settings — Allows the user to load previously saved
configuration files from a local source.
◆
Load Factory Defaults — Restores the factory defaults.
– 113 –
CHAPTER 10 | Administration Settings
System Status
SYSTEM STATUS
The System Information page displays basic system information and the
displayed settings are for status information only and are not configurable
on this page. This information is split into the three sections that follow.
Figure 70: System Status (Router Mode)
The following items are displayed on this page:
◆
◆
System Info — Displays the basic system information in both Bridge
and Router Modes.
■
Firmware Version — The version number of the current Mini
Broadband Router software.
■
System Time — Length of time the management agent has been
up, specified in hours and minutes.
■
Operation Mode — Displays the mode setting of the unit.
Internet Configurations — Displays the basic WAN information:
■
Connected Type — Displays the WAN connected mode.
■
WAN IP Address — IP address of the WAN port for this device.
■
Subnet Mask — The mask that identifies the host address bits
used for routing to the WAN port.
– 114 –
CHAPTER 10 | Administration Settings
System Status
■
■
■
◆
Default Gateway — The default gateway is the IP address of the
router for the Mini Broadband Router, which is used if the requested
destination address is not on the local subnet.
Primary DNS Server / Secondary DNS Server — The IP address
of Domain Name Servers. A DNS maps numerical IP addresses to
domain names and can be used to identify network hosts by familiar
names instead of the IP addresses.
MAC Address — The shared physical layer address for the Mini
Broadband Router’s LAN ports.
Local Network — Displays the basic LAN information.
■
LAN IP Address — The IP address configured on the Mini
Broadband Router.
■
LAN Netmask — The mask that identifies the host address bits
used for routing to the LAN port.
■
MAC Address — The shared physical layer address for the Mini
Broadband Router’s LAN ports.
– 115 –
CHAPTER 10 | Administration Settings
Statistics
STATISTICS
The Mini Broadband Router Traffic Statistics - Interfaces window displays
received and transmitted packet statistics for all interfaces on the Mini
Broadband Router.
Figure 71: Statistics
The following items are displayed on this page:
◆
Memory total — The total memory of this Mini Broadband Router.
◆
Memory left — The available memory of this Mini Broadband Router.
◆
WAN/LAN/All Interfaces — Displays the interface on which traffic is
being monitored.
◆
Rx packets — Displays the total number of packets received by the
specified interface.
◆
Rx bytes — Displays the total number of bytes transmitted by the
specified interface.
◆
Tx packets — Displays the total number of packets transmitted by the
specified interfaces.
– 116 –
CHAPTER 10 | Administration Settings
System Log
◆
Tx bytes — Displays the total number of bytes transmitted by the
specified interface.
SYSTEM LOG
The Mini Broadband Router supports a logging process that controls error
messages saved to memory or sent to a Syslog server. The logged
messages serve as a valuable tool for isolating Mini Broadband Router and
network problems. The System Log page displays the latest messages
logged in chronological order, from the newest to the oldest. Log messages
saved in the Mini Broadband Router’s memory are erased when the device
is rebooted.
Figure 72: System Log
The following items are displayed on this page:
◆
System Log — Displays the latest log messages in chronological order,
from the newest to the oldest.
◆
Refresh — Sends a request to add the latest entries to the System Log
Table.
◆
Clear — Removes the current system log messages from the System
Log Table.
– 117 –
SECTION III
APPENDICES
This section provides additional information and includes these items:
◆
“Troubleshooting” on page 119
◆
“Hardware Specifications” on page 121
◆
“Cables and Pinouts” on page 123
◆
“License Information” on page 126
– 118 –
A
TROUBLESHOOTING
DIAGNOSING LED INDICATORS
Table 4: LED Indicators
Symptom
Action
Power and LAN LEDs are
off
◆
The AC power adapter may be disconnected. Check
connections between the Mini Broadband Router, the power
adapter, and the wall outlet.
WLAN LED is off
◆
The access point radio has been disabled through it’s web
management interface. Access the management interface
using a web browser to enable the radio.
LAN LED is off
(when port connected)
◆
◆
Verify that the Mini Broadband Router is powered on.
◆
Verify that the proper cable type is used and its length does
not exceed specified limits.
◆
Check the cable connections for possible defects. Replace the
defective cable if necessary.
◆
There is no detected signal from WAN port. Check
connections and the management interface.
WAN LED is off
Be sure cables are plugged into both the Mini Broadband
Router and corresponding PC.
IF YOU CANNOT CONNECT TO THE INTERNET
Check the following items:
◆
Check that your computer is properly configured for TCP/IP.
◆
Make sure the correct network adapter driver is installed for your PC
operating system. If necessary, try reinstalling the driver.
◆
Check that the network adapter’s speed or duplex mode has not been
configured manually. We recommend setting the adapter to autonegotiation when installing the network driver.
– 119 –
APPENDIX A | Troubleshooting
Before Contacting Technical Support
BEFORE CONTACTING TECHNICAL SUPPORT
Check the following items before you contact local Technical Support.
1. If the Mini Broadband Router cannot be configured using a web
browser:
■
■
■
Be sure to have configured the Mini Broadband Router with a valid
IP address, subnet mask and default gateway.
Check that you have a valid network connection to the Mini
Broadband Router and that the Ethernet port or the wireless
interface that you are using has not been disabled.
If you are connecting to the Mini Broadband Router through the
wired Ethernet interface, check the network cabling between the
management station and the Mini Broadband Router. If you are
connecting to Mini Broadband Router from a wireless client, ensure
that you have a valid connection.
2. If you forgot or lost the password:
■
Set the Mini Broadband Router to its default configuration by
pressing the reset button on the back panel for 5 seconds or more.
Then use the default user name “admin” and password “smcadmin”
to access the management interface.
3. If all other recovery measure fail, and the Mini Broadband Router is still
not functioning properly, take any of these steps:
■
Reset the Mini Broadband Router’s hardware using the web
interface, or through a power reset.
– 120 –
B
HARDWARE SPECIFICATIONS
PORT INTERFACES WAN: 10/100BASE-TX port, RJ-45 connector, auto MDI/X
(100-ohm, UTP cable; Category 5 or better)
LAN: 10/100BASE-TX port, RJ-45 connector, auto MDI/X
(100-ohm, UTP cable; Category 5 or better)
AC POWER ADAPTER Asian Power Devices Inc. / APD: WA-12112FG, WA-12112R
Sunny Electronics Corp.: SYS1381-1212-W2E, SYS1381-1212-W3U,
SYS1381-1212-W2
Input: 100~240 VAC, 50/60 Hz
Output: 12 VDC, 1 A
LED INDICATORS Power, WLAN (Wireless Local Area Network), WAN (Wide Area Network),
LAN (Local Area Network)
NETWORK MANAGEMENT Web browser
TEMPERATURE Operating: 0 to 40 °C (32 to 104 °F)
Storage: -20 to 70 °C (32 to 158 °F)
HUMIDITY 20% to 85% (non-condensing)
PHYSICAL SIZE 93 x 70 x 26 mm
WEIGHT 76 g (2.68 oz)
FREQUENCY RANGE FCC/IC/NCC: 2412MHz ~ 2462MHz
CE, AS/NZS: 2412 MHz ~ 2472MHz
MODULATION TYPE CCK, DQPSK, DBPSK for DSSS
64QAM, 16QAM, QPSK, BPSK for OFDM
– 121 –
APPENDIX B | Hardware Specifications
DATA RATE 802.11b: 11 / 5.5 / 2 / 1Mbps
802.11g: 54/48/36/24/18/12/9/6 Mbps
Draft 802.11n (20MHz, 800ns GI): 65/58.5/52/39/26/19.5/13/6.5 Mbps
Draft 802.11n (40MHz, 800ns GI): 135/121.5/108/81/54/40.5/27/
13.5 Mbps
Draft 802.11n (20MHz, 400ns GI): 72.2/65/57.8/43.3/28.9/21.7/14.4/
7.2 Mbps
Draft 802.11n (40MHz, 400ns GI): 150/135/120/90/60/45/30/15 Mbps
RF OUTPUT POWER 22.5 +/- 2dBm
RADIO FCC Part 15C (Section 15.247)
EN 301 489-1 V1.8.1 (2008-04)
EN 301 489-17 V1.3.2 (2008-04)
LP0002
RSS-210
AS/NZS 4268
EMC FCC Part 15B
ICES-003
EN 55022:2006 + A1:2007
EN 55024:1998 + A1:2001 + A2:2003
SAR FCC IEEE C95.1
EN 50385 (2002)
SAFETY EN 60950-1 (2006)
NRTL -TUV(cUL)
ENVIRONMENTAL ETSI EN 300 019-2-1 Class 1.2 (Storage)
ETSI EN 300 019-2-2 Class 2.3 (Packaged)
ETSI EN 300 019-2-3 Class 3.2 (Operating)
– 122 –
C
CABLES AND PINOUTS
TWISTED-PAIR CABLE ASSIGNMENTS
For 10/100BASE-TX connections, a twisted-pair cable must have two pairs
of wires. For 1000BASE-T connections the twisted-pair cable must have
four pairs of wires. Each wire pair is identified by two different colors. For
example, one wire might be green and the other, green with white stripes.
Also, an RJ-45 connector must be attached to both ends of the cable.
NOTE: Each wire pair must be attached to the RJ-45 connectors in a specific
orientation.
CAUTION: DO NOT plug a phone jack connector into the RJ-45 port. Use
only twisted-pair cables with RJ-45 connectors that conform with FCC
standards.
The following figure illustrates how the pins on the RJ-45 connector are
numbered. Be sure to hold the connectors in the same orientation when
attaching the wires to the pins.
Figure 73: RJ-45 Connector
8
1
– 123 –
8
1
APPENDIX C | Cables and Pinouts
10/100BASE-TX Pin Assignments
10/100BASE-TX PIN ASSIGNMENTS
Use unshielded twisted-pair (UTP) or shielded twisted-pair (STP) cable for
RJ-45 connections: 100-ohm Category 3 or better cable for 10 Mbps
connections. Also be sure that the length of any twisted-pair connection
does not exceed 100 meters (328 feet).
The RJ-45 ports on the router support automatic MDI/MDI-X operation, so
you can use straight-through or crossover cables for all network
connections to PCs, switches, or hubs. In straight-through cable, pins 1, 2,
3, and 6, at one end of the cable, are connected straight through to pins 1,
2, 3, and 6 at the other end of the cable.
Table 5: 10/100BASE-TX MDI and MDI-X Port Pinouts
PIN
MDI Signal Namea
MDI-X Signal Name
1
Transmit Data plus (TD+)
Receive Data plus (RD+)
2
Transmit Data minus (TD-)
Receive Data minus (RD-)
3
Receive Data plus (RD+)
Transmit Data plus (TD+)
6
Receive Data minus (RD-)
Transmit Data minus (TD-)
4, 5, 7, 8
Not used
Not used
a.
The “+” and “-” signs represent the polarity of the wires that make up each wire pair.
STRAIGHT-THROUGH WIRING
If the twisted-pair cable is to join two ports and only one of the ports has
an internal crossover (MDI-X), the two pairs of wires must be straightthrough. (When auto-negotiation is enabled for any RJ-45 port on this
switch, you can use either straight-through or crossover cable to connect
to any device type.)
You must connect all four wire pairs as shown in the following diagram to
support Gigabit Ethernet connections.
– 124 –
APPENDIX C | Cables and Pinouts
Crossover Wiring
Figure 74: Straight-through Wiring
EIA/TIA 568B RJ-45 Wiring Standard
10/100BASE-TX Straight-through Cable
White/Orange Stripe
Orange
End A
White/Green Stripe
1
2
3
4
5
6
7
8
Blue
White/Blue Stripe
Green
White/Brown Stripe
1
2
3
4
5
6
7
8
End B
Brown
CROSSOVER WIRING
If the twisted-pair cable is to join two ports and either both ports are
labeled with an “X” (MDI-X) or neither port is labeled with an “X” (MDI), a
crossover must be implemented in the wiring. (When auto-negotiation is
enabled for any RJ-45 port on this switch, you can use either straightthrough or crossover cable to connect to any device type.)
You must connect all four wire pairs as shown in the following diagram to
support Gigabit Ethernet connections.
Figure 75: Crossover Wiring
EIA/TIA 568B RJ-45 Wiring Standard
10/100BASE-TX Crossover Cable
White/Orange Stripe
Orange
End A
White/Green Stripe
1
2
3
4
5
6
7
8
Blue
White/Blue Stripe
Green
White/Brown Stripe
Brown
– 125 –
1
2
3
4
5
6
7
8
End B
D
LICENSE INFORMATION
This product includes copyrighted third-party software subject to the terms of the GNU General Public
License (GPL), GNU Lesser General Public License (LGPL), or other related free software licenses.
The GPL code used in this product is distributed WITHOUT ANY WARRANTY and is subject to the
copyrights of one or more authors. For details, refer to the section "The GNU General Public License"
below, or refer to the applicable license as included in the source-code archive.
THE GNU GENERAL PUBLIC LICENSE
GNU GENERAL PUBLIC LICENSE
Version 2, June 1991
Copyright (C) 1989, 1991 Free Software Foundation, Inc.
59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it
is not allowed.
Preamble
The licenses for most software are designed to take away your freedom to share and change it. By
contrast, the GNU General Public License is intended to guarantee your freedom to share and
change free software--to make sure the software is free for all its users. This General Public License
applies to most of the Free Software Foundation's software and to any other program whose authors
commit to using it. (Some other Free Software Foundation software is covered by the GNU Library
General Public License instead.) You can apply it to your programs, too.
When we speak of free software, we are referring to freedom, not price. Our General Public Licenses
are designed to make sure that you have the freedom to distribute copies of free software (and
charge for this service if you wish), that you receive source code or can get it if you want it, that you
can change the software or use pieces of it in new free programs; and that you know you can do
these things.
To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to
ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you
distribute copies of the software, or if you modify it.
For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the
recipients all the rights that you have. You must make sure that they, too, receive or can get the
source code. And you must show them these terms so they know their rights.
We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which
gives you legal permission to copy, distribute and/or modify the software.
Also, for each author's protection and ours, we want to make certain that everyone understands that
there is no warranty for this free software. If the software is modified by someone else and passed on,
we want its recipients to know that what they have is not the original, so that any problems introduced
by others will not reflect on the original authors' reputations.
Finally, any free program is threatened constantly by software patents. We wish to avoid the danger
that redistributors of a free program will individually obtain patent licenses, in effect making the
program proprietary. To prevent this, we have made it clear that any patent must be licensed for
everyone's free use or not licensed at all.
The precise terms and conditions for copying, distribution and modification follow.
– 126 –
APPENDIX D | License Information
The GNU General Public License
GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION
AND MODIFICATION
1.
This License applies to any program or other work which contains a notice placed by the
copyright holder saying it may be distributed under the terms of this General Public License. The
"Program", below, refers to any such program or work, and a "work based on the Program"
means either the Program or any derivative work under copyright law: that is to say, a work
containing the Program or a portion of it, either verbatim or with modifications and/or translated
into another language. (Hereinafter, translation is included without limitation in the term
"modification".) Each licensee is addressed as "you".
Activities other than copying, distribution and modification are not covered by this License; they
are outside its scope. The act of running the Program is not restricted, and the output from the
Program is covered only if its contents constitute a work based on the Program (independent of
having been made by running the Program). Whether that is true depends on what the Program
does.
2.
You may copy and distribute verbatim copies of the Program's source code as you receive it, in
any medium, provided that you conspicuously and appropriately publish on each copy an
appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to
this License and to the absence of any warranty; and give any other recipients of the Program a
copy of this License along with the Program.
You may charge a fee for the physical act of transferring a copy, and you may at your option offer
warranty protection in exchange for a fee.
3.
You may modify your copy or copies of the Program or any portion of it, thus forming a work
based on the Program, and copy and distribute such modifications or work under the terms of
Section 1 above, provided that you also meet all of these conditions:
a). You must cause the modified files to carry prominent notices stating that you changed the
files and the date of any change.
b). You must cause any work that you distribute or publish, that in whole or in part contains or is
derived from the Program or any part thereof, to be licensed as a whole at no charge to all
third parties under the terms of this License.
c).
If the modified program normally reads commands interactively when run, you must cause
it, when started running for such interactive use in the most ordinary way, to print or display
an announcement including an appropriate copyright notice and a notice that there is no
warranty (or else, saying that you provide a warranty) and that users may redistribute the
program under these conditions, and telling the user how to view a copy of this License.
(Exception: if the Program itself is interactive but does not normally print such an
announcement, your work based on the Program is not required to print an announcement.)
These requirements apply to the modified work as a whole. If identifiable sections of that work
are not derived from the Program, and can be reasonably considered independent and separate
works in themselves, then this License, and its terms, do not apply to those sections when you
distribute them as separate works. But when you distribute the same sections as part of a whole
which is a work based on the Program, the distribution of the whole must be on the terms of this
License, whose permissions for other licensees extend to the entire whole, and thus to each and
every part regardless of who wrote it.
Thus, it is not the intent of this section to claim rights or contest your rights to work written
entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or
collective works based on the Program.
In addition, mere aggregation of another work not based on the Program with the Program (or
with a work based on the Program) on a volume of a storage or distribution medium does not
bring the other work under the scope of this License.
4.
You may copy and distribute the Program (or a work based on it, under Section 2) in object code
or executable form under the terms of Sections 1 and 2 above provided that you also do one of
the following:
– 127 –
APPENDIX D | License Information
The GNU General Public License
a). Accompany it with the complete corresponding machine-readable source code, which must
be distributed under the terms of Sections 1 and 2 above on a medium customarily used for
software interchange; or,
b). Accompany it with a written offer, valid for at least three years, to give any third party, for a
charge no more than your cost of physically performing source distribution, a complete
machine-readable copy of the corresponding source code, to be distributed under the terms
of Sections 1 and 2 above on a medium customarily used for software interchange; or,
c).
Accompany it with the information you received as to the offer to distribute corresponding
source code. (This alternative is allowed only for noncommercial distribution and only if you
received the program in object code or executable form with such an offer, in accord with
Subsection b above.)
The source code for a work means the preferred form of the work for making modifications to it.
For an executable work, complete source code means all the source code for all modules it
contains, plus any associated interface definition files, plus the scripts used to control
compilation and installation of the executable. However, as a special exception, the source code
distributed need not include anything that is normally distributed (in either source or binary form)
with the major components (compiler, kernel, and so on) of the operating system on which the
executable runs, unless that component itself accompanies the executable.
If distribution of executable or object code is made by offering access to copy from a designated
place, then offering equivalent access to copy the source code from the same place counts as
distribution of the source code, even though third parties are not compelled to copy the source
along with the object code.
5.
You may not copy, modify, sublicense, or distribute the Program except as expressly provided
under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program
is void, and will automatically terminate your rights under this License. However, parties who
have received copies, or rights, from you under this License will not have their licenses
terminated so long as such parties remain in full compliance.
6.
You are not required to accept this License, since you have not signed it. However, nothing else
grants you permission to modify or distribute the Program or its derivative works. These actions
are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the
Program (or any work based on the Program), you indicate your acceptance of this License to do
so, and all its terms and conditions for copying, distributing or modifying the Program or works
based on it.
7.
Each time you redistribute the Program (or any work based on the Program), the recipient
automatically receives a license from the original licensor to copy, distribute or modify the
Program subject to these terms and conditions. You may not impose any further restrictions on
the recipients' exercise of the rights granted herein. You are not responsible for enforcing
compliance by third parties to this License.
8.
If, as a consequence of a court judgment or allegation of patent infringement or for any other
reason (not limited to patent issues), conditions are imposed on you (whether by court order,
agreement or otherwise) that contradict the conditions of this License, they do not excuse you
from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your
obligations under this License and any other pertinent obligations, then as a consequence you
may not distribute the Program at all. For example, if a patent license would not permit royaltyfree redistribution of the Program by all those who receive copies directly or indirectly through
you, then the only way you could satisfy both it and this License would be to refrain entirely from
distribution of the Program.
If any portion of this section is held invalid or unenforceable under any particular circumstance,
the balance of the section is intended to apply and the section as a whole is intended to apply in
other circumstances.
It is not the purpose of this section to induce you to infringe any patents or other property right
claims or to contest validity of any such claims; this section has the sole purpose of protecting
the integrity of the free software distribution system, which is implemented by public license
practices. Many people have made generous contributions to the wide range of software
distributed through that system in reliance on consistent application of that system; it is up to the
author/donor to decide if he or she is willing to distribute software through any other system and
a licensee cannot impose that choice.
– 128 –
APPENDIX D | License Information
The GNU General Public License
This section is intended to make thoroughly clear what is believed to be a consequence of the
rest of this License.
9.
If the distribution and/or use of the Program is restricted in certain countries either by patents or
by copyrighted interfaces, the original copyright holder who places the Program under this
License may add an explicit geographical distribution limitation excluding those countries, so
that distribution is permitted only in or among countries not thus excluded. In such case, this
License incorporates the limitation as if written in the body of this License.
10. The Free Software Foundation may publish revised and/or new versions of the General Public
License from time to time. Such new versions will be similar in spirit to the present version, but
may differ in detail to address new problems or concerns.
Each version is given a distinguishing version number. If the Program specifies a version
number of this License which applies to it and "any later version", you have the option of
following the terms and conditions either of that version or of any later version published by the
Free Software Foundation. If the Program does not specify a version number of this License,
you may choose any version ever published by the Free Software Foundation.
11. If you wish to incorporate parts of the Program into other free programs whose distribution
conditions are different, write to the author to ask for permission. For software which is
copyrighted by the Free Software Foundation, write to the Free Software Foundation; we
sometimes make exceptions for this. Our decision will be guided by the two goals of preserving
the free status of all derivatives of our free software and of promoting the sharing and reuse of
software generally.
NO WARRANTY
1.
BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY
FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN
OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER
EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE
ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH
YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL
NECESSARY SERVICING, REPAIR OR CORRECTION.
2.
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR
DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL
DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING
BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR
LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO
OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY
HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
END OF TERMS AND CONDITIONS
– 129 –
GLOSSARY
10BASE-T IEEE 802.3-2005 specification for 10 Mbps Ethernet over two pairs of
Category 3 or better UTP cable.
100BASE-TX IEEE 802.3-2005 specification for 100 Mbps Fast Ethernet over two pairs of
Category 5 or better UTP cable.
1000BASE-T IEEE 802.3ab specification for 1000 Mbps Gigabit Ethernet over four pairs
of Category 5 or better UTP cable.
ACCESS POINT An internetworking device that seamlessly connects wired and wireless
networks. Access points attached to a wired network, support the creation
of multiple radio cells that enable roaming throughout a facility.
AES Advanced Encryption Standard: An encryption algorithm that implements
symmetric key cryptography. AES provides very strong encryption using a
completely different ciphering algorithm to TKIP and WEP.
AUTHENTICATION The process to verify the identity of a client requesting network access.
IEEE 802.11 specifies two forms of authentication: open system and
shared key.
BACKBONE The core infrastructure of a network. The portion of the network that
transports information from one central location to another central location
where it is unloaded onto a local system.
BEACON A signal periodically transmitted from the access point that is used to
identify the service set, and to maintain contact with wireless clients.
BROADCAST KEY Broadcast keys are sent to stations using dynamic keying. Dynamic
broadcast key rotation is often used to allow the access point to generate a
random group key and periodically update all key-management capable
wireless clients.
DHCP Dynamic Host Configuration Protocol: Provides a framework for passing
configuration information to hosts on a TCP/IP network. DHCP is based on
– 130 –
GLOSSARY
the Bootstrap Protocol (BOOTP), adding the capability of automatic
allocation of reusable network addresses and additional configuration
options.
ENCRYPTION Data passing between the access point and clients can use encryption to
protect from interception and evesdropping.
ETHERNET A popular local area data communications network, which accepts
transmission from computers and terminals.
FTP File Transfer Protocol: A TCP/IP protocol used for file transfer.
HTTP Hypertext Transfer Protocol: HTTP is a standard used to transmit and
receive all data over the World Wide Web.
IEEE 802.11B A wireless standard that supports wireless communications in the 2.4 GHz
band using Direct Sequence Spread Spectrum (DSSS). The standard
provides for data rates of 1, 2, 5.5, and 11 Mbps.
IEEE 802.11G A wireless standard that supports wireless communications in the 2.4 GHz
band using Orthogonal Frequency Division Multiplexing (OFDM). The
standard provides for data rates of 6, 9, 12, 18, 24, 36, 48, 54 Mbps. IEEE
802.11g is also backward compatible with IEEE 802.11b.
INFRASTRUCTURE An integrated wireless and wired LAN is called an infrastructure
configuration.
LAN Local Area Network: A group of interconnected computers and support
devices.
MAC ADDRESS The physical layer address used to uniquely identify network nodes.
NTP Network Time Protocol: NTP provides the mechanisms to synchronize time
across the network. The time servers operate in a hierarchical-masterslave configuration in order to synchronize local clocks within the subnet
and to national time standards via wire or radio.
OPEN SYSTEM A security option which broadcasts a beacon signal including the access
point’s configured SSID. Wireless clients can read the SSID from the
beacon, and automatically reset their SSID to allow immediate connection
to the nearest access point.
– 131 –
GLOSSARY
ODFM Orthogonal Frequency Division Multiplexing: OFDM allows multiple users to
transmit in an allocated band by dividing the bandwidth into many narrow
bandwidth carriers.
SSID Service Set Identifier: An identifier that is attached to packets sent over
the wireless LAN and functions as a password for joining a particular radio
cell; i.e., Basic Service Set (BSS).
SESSION KEY Session keys are unique to each client, and are used to authenticate a
client connection, and correlate traffic passing between a specific client and
the access point.
SHARED KEY A shared key can be used to authenticate each client attached to a wireless
network. Shared Key authentication must be used along with the 802.11
Wireless Equivalent Privacy algorithm.
SNTP Simple Network Time Protocol: SNTP allows a device to set its internal
clock based on periodic updates from a Network Time Protocol (NTP)
server. Updates can be requested from a specific NTP server, or can be
received via broadcasts sent by NTP servers.
TKIP Temporal Key Integrity Protocol: A data encryption method designed as a
replacement for WEP. TKIP avoids the problems of WEP static keys by
dynamically changing data encryption keys.
TFTP Trivial File Transfer Protocol: A TCP/IP protocol commonly used for software
downloads.
VAP Virtual Access Point: Virtual AP technology multiplies the number of Access
Points present within the RF footprint of a single physical access device.
With Virtual AP technology, WLAN users within the device.s footprint can
associate with what appears to be different access points and their
associated network services. All the services are delivered using a single
radio channel, enabling Virtual AP technology to optimize the use of limited
WLAN radio spectrum.
WI-FI PROTECTED WPA employs 802.1X as its basic framework for user authentication and
ACCESS dynamic key management to provide an enhanced security solution for
802.11 wireless networks.
WEP Wired Equivalent Privacy: WEP is based on the use of security keys and the
popular RC4 encryption algorithm. Wireless devices without a valid WEP
key will be excluded from network traffic.
– 132 –
GLOSSARY
WPA-PSK WPA Pre-shared Key: WPA-PSK can be used for small office networks with
a limited number of users that may not need a high level of security. WPAPSK provides a simple security implementation that uses just a pre-shared
password for network access.
– 133 –
INDEX
NUMERICS
10/100BASE-TX pin assignments 124
802.11n settings 65
802.1X authentication 80
A
access categories, WMM 71
access point connections 26
access policy settings 82
address pool range, DHCP 60
advertisements, router 60
AES encryption 78
aggregate MSDU 69
AP client 28
AP Client Mode 50
AP isolation 67
Applications 20
applications, network 20
authentication options 75
B
basic setup, wizard 36
beacon interval 70
BG protection mode 69
bridge connections 27
Bridge Mode 29
connections 32
operation 26
setting 50
browser requirements 29
buttons
common web page 36
Reset 24
WPS 22, 24
C
cable modem, connections 25
capabilities, hardware 19
channel setting 67
client, AP 28
common web page buttons 36
configuration settings 113
connections
Bridge Mode 32
repeater 27
Router Mode 31
wireless bridge 27
contents of package 21
crossover cables 125
D
data beacon rate 70
DC power socket 22
default IP address 34, 48
default Key, WEP 77
default settings, reset 24
deployment options 25
desktop mounting 30
destination, routing 63
DHCP address pool 60
DHCP clients list 61
DHCP server settings 60
DHCP, WAN setting 52
dimensions, physical 121
DMZ setting 104
DNS proxy 60
DNS Server setting 52
DSL modem, connections 25
DTIM setting 70
dynamic DNS 111
dynamic routing 64
E
encryption options 75
Ethernet port 24
export configuration 113
extension channel setting 68
F
factory defaults, resetting 24, 113
features, hardware 19
firmware upgrade 112
flags, routing 63
fragmentation threshold 70
frequency setting 67
G
gateway operation 25
guard interval 68
H
hardware capabilities 19
– 134 –
INDEX
hardware description 21
hardware features 19
home page 35, 49
horizontal surface mounting
HT channel bandwidth 68
multiple SSID
30
I
IGMP proxy 60
import configuration 113
indicators, LED 23
information, system 114
Internet connection problems 119
Internet gateway connections 25
IP address, default 34, 48
IP Address, LAN setting 59
IP port filtering 100
IPsec 19, 20
ISP accounts 20
ISP settings 34
K
key features 19
L
L2TP 21
LAN ports 22, 24
LAN settings 59
language settings 36, 109
Lazy Mode, WDS 84
lease time, DHCP 60
LED indicators 23
troubleshooting 119
license information 126
local network settings 59
location selection 30
logging, system 117
login defaults 34, 48
login page 34
lost password 120
M
MAC address filtering 82
main menu 35, 49
management interface, login defaults 34, 48
MCS setting 68
MDI/MDI-X operation 24
messages, logging 117
metric, routing 63
modes, operating 29
mounting
horizontal surface 30
options 30
slots 30
mounting on a wall 30
multicast-to-unicast convertion 74
67
N
network applications 20
network name, wireless 65, 67
network statistics 116
O
open system 75
operation mode, setting
50
P
package contents 21
password
default 34
lost 120
setting 109
PBC mode, WPS 87
physical size 121
ping filter 105
pinouts, cable 123
planning, network 25
PMK cache period 80
port filtering, IP/MAC 100
power adapter, details 24
power connector 24
power socket 22
PPPoE relay 60
PPTP 19, 21
preamble, short 71
pre-authentication 80
protection mode 69
Q
Quality of Service
71
R
radio mode 66
radio settings 65
radio standards 122
RADIUS 80
remote management 105
repeater operation 27
requirements, system 29
Reset button 24
reset button 24
restoring defaults 113
reverse direction grant 68
RIP protocol 64
RJ-45 connector pins 123
RJ-45 ports 24
router advertisements 60
Router Mode 25, 29, 31, 50
routing metric 63
– 135 –
INDEX
RTS threshold 70
S
screws for mounting 30
security features 20
security, wireless 75
service provider settings 34
setup wizard steps 36
shared secret, RADIUS 81
slot time 71
slots, wall-mounting 30
SNTP 110
socket, DC power 22
software upgrade 112
specifications, hardware 121
SSID 65, 67
standards, radio 122
stateful packet inspection 105
station list, wireless 88
statistics, system 116
status indicators 23
status of system 114
straight-through cables 124
system capabilities 19
system defaults 113
system log 117
system requirements 29
system time 110
WAN ping filter 105
WAN port 22
WAN settings 51
WDS operation 27
WDS settings 82
web browser requirements 29
web IP address 34, 48
web login 34, 48
web main menu 35, 49
web page buttons 36
web URL filters 106
website host filters 106
WEP security 76
Wi-Fi Multimedia 71
Wi-Fi network operation 26
wireless bridge connections 27
wireless client list 88
wireless network mode 66
wireless settings, basic 65
wizard, setup 36
WLAN security 75
WMM 71
WPS button 22, 24
WPS security 85
T
table mounting 30
temperature, operating 121
time settings 110
time zone setting 110
TKIP encryption 78
traffic statistics 116
troubleshooting 119, 126
twisted-pair cable assignments 123
U
upgrading software 112
UPNP 60
URL filters 106
user interface login 48
username setting 109
username, default 34
UTP cable pinouts 124
V
VAP interfaces 65
VPN Passthrough 20
W
wall mounting
30
– 136 –
SMCWBR11S-N
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertisement