USER GUIDESMCWBR14-N2Barricade™ N2.4GHz Draft 11n Wireless 4-port Broadband Router
7 When a number of wireless stations are connected using a single access point, you have a Basic Service Set (BSS). In the ESS diagram below,
97 Universal Plug and Play A standard that allows network devices to discover each other and configure themselves to be a part of the network Upgr
98 Windows Connect Now. A Microsoft method for configuring and bootstrapping wireless networking hardware (access points) and wireless clients, includ
99 Y Yagi antenna A directional antenna used to concentrate wireless signals on a specific location Z # 1 802.11 A family of specificatio
TECHNICAL SUPPORT From U.S.A. and Canada (24 hours a day, 7 days a week) Phn: (800) SMC-4-YOU / (949) 679-8000 Fax: (949) 679-1481ENGLISHTechnical
8 In an ESS environment, users are able to move from one access point to another without losing the connection. In the diagram below, when the user mo
9 Introduction The SMCWBR14-N2 is a high-performance, wireless router that supports high-speed wireless networking at home, at work or in public place
10 Hardware Overview Back/Side Panel POWER The Power input connector is a single jack socket to supply power to the SMCWBR14-N2. Please use t
11 Front Panel LED’s POWER A solid green LED indicates the SMCWBR14-N2 is receiving power – normal operation. If the LED is off there is no power
12 Installation Considerations The SMCWBR14-N2 lets you access your network, using a wireless connection, from virtually anywhere within its operatin
13 Using the Configuration Menu Whenever you want to configure your SMCWBR14-N2, you can access the Configuration Menu through your PC by opening the
14 Basic The Basic tab provides the following configuration options: INTERNET, WIRELESS and NETWORK SETTINGS. Basic_Internet Setup Wizard If you
15 Configure to input all the settings manually. Basic_Wireless The wireless section is used to configure the wireless settings for your router. Not
16 Enable Wireless This option allows you to enable/disable the wireless AP function. The wireless can also be turned ON/OFF by the slide switch
iLIMITED WARRANTY Limited Warranty Statement: SMC Networks, Inc. (“SMC”) warrants its products to be free from defects in workmanship and materials,
17 WEP A method of encrypting data for wireless communication intended to provide the same level of privacy as a wired network. WEP is not as secure
18 Wireless Networking technology enables ubiquitous communication WPA-Enterprise This option works with a RADIUS Server to authenticate wireless cl
19 Basic_Network Settings Use this section to configure the internal network settings of your router. The IP Address that is configured here is the IP
20 Router Settings These are the settings of the LAN (Local Area Network) interface for the router. The router's local network (LAN) settings
21 Act as default router Make this router the preferred destination for packets that are not otherwise destined. Allow RIP updates from WAN For
22 server computer that has a manually configured address of 192.168.2.100. Because this falls within the "managed range" be sure to create
23 Windows 98 Windows Me Go to the Start menu, select Run, type in winipcfg, and hit Enter. A popup window will be displayed. Select the appropriat
24 Advanced The Advanced tab provides the following configuration options: Virtual Server, Special Applications, Gaming, StreamEngine, Routing, Access
25 Example: You are hosting a Web Server on a PC that has LAN IP Address of 192.168.2.50 and your ISP is blocking Port 80. 1. Name the Virtual Ser
26 a new filter. Schedule Select a schedule for when the service will be enabled. If you do not see the schedule you need in the list of schedules,
iiLOSS OF BUSINESS, OR OTHER FINANCIAL LOSS ARISING OUT OF OR IN CONNECTION WITH THE SALE, INSTALLATION, MAINTENANCE, USE, PERFORMANCE, FAILURE, OR I
27 Advanced_Special Applications An application rule is used to open single or multiple ports on your router when the router senses data sent to the I
28 Instead of entering a name for the Special Application rule, you can select from this list of common applications, and the remaining configuration
29 Advanced_Gaming Multiple connections are required by some applications, such as internet games, video conferencing, Internet telephony, and others.
30 Port Forwarding Fields Name Give the rule a name that is meaningful to you, for example Game Server. You can also select from a list of popular
31 Advanced_StreamEngine The StreamEngine feature helps improve your network gaming performance by prioritizing the data flows of network applications
32 Automatic Classification This option is enabled by default so that your router will automatically determine which programs should have network pr
33 that every flow defined in a rule receives the expected priority and avoids indeterminate prioritization that could reduce QoS effectiveness. Nam
34 Advanced_Routing Add/Edit Route Adds a new route to the IP routing table or edits an existing route. Enable: Specifies whether the entry will
35 Save: Saves the new or edited route in the following list. When finished updating the routing table, you must still click the Save Settings button
36 Advanced_Access Control The Access Control section allows you to control access in and out of devices on your network. Use this feature as Parental
iiiCompliances Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Clas
37 Policy Table This section shows the currently defined access control policies. A policy can be changed by clicking the Edit icon, or deleted by c
38 Advanced_WEB Filter This section is where you add the Web sites to be used for Access Control. The Web sites listed here are used when the Web Filt
39 Enable Entries in the Allowed Web Site List can be activated or deactivated with this checkbox. New entries are activated by default. Save Save
40 Advanced_MAC Address Filter The MAC address filter section can be used to filter network access by machines based on the unique MAC addresses of th
41 Filter Wired Clients When this is selected, the MAC address filters will be applied to wired network clients. Add/Edit MAC Address In this se
42 Advanced_Firewall The router provides a tight firewall by virtue of the way NAT works. Unless you configure the router to the contrary, the NAT doe
43 Firewall Settings Enable SPI SPI ("stateful packet inspection" also known as "dynamic packet filtering") helps to prevent
44 Controls endpoint filtering for packets of the TCP protocol. DMZ Host DMZ means "Demilitarized Zone." If an application has trouble w
45 then you may want to make a static reservation on the Basic → Network Settings page so that the IP address of the DMZ computer does not change. N
46 must also be enabled when the Windows Messenger ALG is enabled. FTP Allows FTP clients and servers to transfer data across NAT. Refer to the Adv
2 Table of Contents Getting Started with the SMCWBR14-N2 3 Package Contents 4 Minimum System Requirements 4 Wireless LAN Networki
47 Advanced_Inbound Filter When you use the Virtual Server, Gaming, or Remote Administration features to open specific ports to traffic from the Inter
48 Add/Edit Inbound Filter Rule Here you can add entries to the Inbound Filter Rules List below, or edit existing entries. Name Enter a name for
49 Advanced_Advanced Wireless Transmit Power Normally the wireless transmitter operates at 100% power. In some circumstances, however, there might
50 for associated clients, it sends the next DTIM with a DTIM Interval value. Wireless clients detect the beacons and awaken to receive the broadcast
51 Advanced_Network UPnP UPnP is short for Universal Plug and Play, which is a networking architecture that provides compatibility among networking
52 WAN Port Speed Normally, this is set to "auto". If you have trouble connecting to the WAN, try the other settings. Multicast Streams
53 WISH Enable WISH Enable this option if you want to allow WISH to prioritize your traffic. Priority Classifiers HTTP Allows the router to recogni
54 • BK: Background (least urgent). • BE: Best Effort. • VI: Video. • VO: Voice (most urgent). Protocol The protocol used by the messages. Host
55 Advanced_Wi-Fi PROTECTED SETUP Wi-Fi Protected Setup Enable Enable the Wi-Fi Protected Setup feature. Lock Wireless Security Settings Locking th
56 a new PIN can be generated. You can restore the default PIN at any time. Only the Administrator ("admin" account) can change or reset the
3Getting Started with the SMCWBR14-N2 Congratulations on purchasing the SMCWBR14-N2. This manual provides information for setting up and configuring
57 Tools The Tools tab provides the following configuration options: Admin, Time, Syslog, Email Settings, System, Firmware, Dynamic DNS, Windows Conne
58 Admin Password Enter a password for the user "admin", who will have full access to the Web-based management interface. User Password
59 Tools_Time The Time Configuration option allows you to configure, update, and maintain the correct time on the router's internal system clock.
60 Check this option if your location observes daylight saving time. Daylight Saving Offset Select the time offset, if your location observes dayl
61 Tools_Syslog This section allows you to archive your log files to a Syslog Server. Enable Logging to Syslog Server Enable this option if you ha
62 Tools_Email Settings The Email feature can be used to send the system log files, router alert messages, and firmware update notification to your em
63 Verify Password Re-type the password associated with the account. Email Log When Full or on Schedule On Log Full Select this option if you
64 Tools_System This section allows you to manage the router's configuration settings, reboot the router, and restore the router to the factory d
65 Tools_Firmware The Firmware Upgrade section can be used to update to the latest firmware code to improve functionality and performance. To check fo
66 Firmware upgrade cannot be performed from a wireless device. To perform an upgrade, ensure that you are using a PC that is connected to the router
4Package Contents z Barricade™ N Broadband Router (SMCWBR14-N2) z Yellow RJ-45 Ethernet Cable z Power Adapter (12V, 1A) z Documentation CD z Q
67 Tools_Dynamic DNS The Dynamic DNS feature allows you to host a server (Web, FTP, Game Server, etc.) using a domain name that you have purchased (ww
68 Re-type the password or key provided by your service provider. If the Dynamic DNS provider supplies only a key, enter that key in all three fields.
69 Tools_System Check Ping Test "Ping" is an Internet utility function that sends a series of short messages to a target computer and re
70 Tools_Schedules Schedules can be created for use with enforcing rules. For example, if you want to restrict web access to Mon-Fri from 3pm to 8pm,
71 The end time is entered in the same format as the start time. The hour in the first box and the minutes in the second box. The end time is used for
72 Status The Status tab provides the following configuration options: Device Info, Wireless, Routing, Logs, Statistics and Active Sessions. Status_D
73 Depending on the type of WAN connection, you can take one of the following sets of actions: DHCP Connection Clicking the DHCP Release button
74 Status_Wireless The wireless section allows you to view the wireless clients that are connected to your wireless router. MAC Address The Ethern
75 Status_Routing The routing section displays all of the routing details configured for your router. A value of 0.0.0.0 for gateway means there is
76 Status_Logs The router automatically logs (records) events of possible interest in its internal memory. If there is not enough internal memory for
5Wireless LAN Networking This section provides background information on wireless LAN networking technology. Consult the Glossary for definitions of
77 Click this button after changing Log Options to make them effective and permanent. Refresh Clicking this button refreshes the display of log ent
78 Status_Statistics The Statistics page displays all of the LAN, WAN, and Wireless packet transmit and receive statistics. Sent The number of pack
79 Status_Active Sessions The Active Sessions page displays full details of active sessions through your router. A session is a conversation between a
80 • SS: SYN Sent -- One of the systems is attempting to start a connection. • EST: Established -- the connection is passing data. • FW: FIN Wa
81 Originator The IP address and, where appropriate, port number of the computer that originated a network connection. Target The IP address and, w
82 Priority The priority given to packets sent wirelessly over this conversation by the WISH logic. The priorities are: • BK: Background (least urg
83 Glossary A Access Control List ACL. This is a database of network devices that are allowed to access resources on the network. Access Point AP
84 American Standard Code for Information Interchange. This system of characters is most commonly used for text files Attenuation The loss in stren
85 A time during processes when something causes the process to slowdown or stop all together Broadband A wide band of frequencies available for tr
86 The second layer of the OSI model. Controls the movement of data on the physical link of a network Database Organizes information so that it can
6channel for each station.
87 "Demilitarized Zone". A computer that logically sits in a "no-mans land" between the LAN and the WAN. The DMZ computer trades s
88 A way of sending data through light impulses over glass or plastic wire or fiber File server A computer on a network that stores data so that t
89 A standard that provides consistency of voice and video transmissions and compatibility for videoconferencing devices Half-duplex Data cannot be
90 Infrastructure In terms of a wireless network, this is when wireless clients use an Access Point to gain access to the network Internet A syste
91 Java A programming language used to create programs and applets for web pages K Kbps Kilobits per second Kbyte Kilobyte L LAN Local Area N
92 MDIX Medium Dependent Interface Crossover, is an Ethernet port for a connection to a crossover cable MIB Management Information Base is a set of
93 Network Time Protocol Used to synchronize the time of all the computers in a network NIC Network Interface Card NTP Network Time Protocol
94 Port A logical channel endpoint in a network. A computer might have only one physical channel (its Ethernet channel) but can have multiple ports (
95 RJ-45 The most commonly used connection method for Ethernet RS-232C The interface for serial communication between computers and other related
96 Secure Shell is a command line interface that allows for secure connections to remote computers SSID Service Set Identifier is a name for a wirel
Comentarios a estos manuales