background image

 

18

 

 

 

Enable Wireless   

This option allows you to enable/disable the wireless AP function. The wireless can also be 
turned ON/OFF by the slide switch on the back panel. When the wireless is enabled, the 
following parameters are in effect.   

Wireless Network Name   

When you are browsing for available wireless networks, this is the name that will appear in the 
list (unless Visibility Status is set to Invisible, see below). This name is also referred to as the 
SSID. For security purposes, it is highly recommended to change from the pre-configured 
network name.   

Enable Auto Channel Scan   

If you select this option, the router automatically finds the channel with least interference and 
uses that channel for wireless networking. If you disable this option, the router uses the 
channel that you specify with the following 

Wireless Channel

 option.   

Wireless Channel   

A wireless network uses specific channels in the wireless spectrum to handle communication 
between clients. Some channels in your area may have interference from other electronic 
devices. Choose the clearest channel to help optimize the performance and coverage of your 
wireless network.   

802.11 Mode   

If all of the wireless devices you want to connect with this router can connect in the same 
transmission mode, you can improve performance slightly by choosing the appropriate "Only" 
mode. If you have some devices that use a different transmission mode, choose the 
appropriate "Mixed" mode.   

Channel Width   

The "Auto 20/40 MHz" option is usually best. The other options are available for special 
circumstances. Note that when 20/40MHz option is selected, an extended channel will be used 
to extend the data rate. 

Transmission Rate   

By default the fastest possible transmission rate will be selected. You have the option of 
selecting the speed if necessary.   

Visibility Status   

The Invisible option allows you to hide your wireless network. When this option is set to Visible, 
your wireless network name is broadcast to anyone within the range of your signal. If you're not 
using encryption then they could connect to your network. When Invisible mode is enabled, 
you must enter the Wireless Network Name (SSID) on the client manually to connect to the 
network.  

Security Mode (NONE, WEP, WPA-Personal, WPA-Enterprise) 

Unless one of these encryption modes is selected, wireless transmissions to and from your 
wireless network can be easily intercepted and interpreted by unauthorized users.   

Summary of Contents for Barricade SMCWGBR14-N

Page 1: ...Barricade N Draft 11n Wireless 4 port Gigabit Broadband Router SMCWGBR14 N...

Page 2: ...ation information or memory data of Customer contained in stored on or integrated with any products returned to SMC pursuant to any warranty Products returned to SMC should have any customer installed...

Page 3: ...CONSEQUENTIAL DAMAGES FOR CONSUMER PRODUCTS SO THE ABOVE LIMITATIONS AND EXCLUSIONS MAY NOT APPLY TO YOU THIS WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS WHICH MAY VARY FROM STATE TO STATE NOTHING IN THI...

Page 4: ...assure continued compliance example use only shielded interface cables when connecting to computer or peripheral devices any changes or modifications not expressly approved by the party responsible f...

Page 5: ...es 9 Hardware Overview 11 Back Panel 11 Front Panel 12 Installation Considerations 14 Getting Started 14 Using the Configuration Menu 15 Basic 16 Advanced 27 Tools 67 Status 86 Using the USB2 0 Multi...

Page 6: ...wing conventions are used in this manual THE NOTE SYMBOL INDICATES ADDITIONAL INFORMATION ON THE TOPIC AT HAND THE TIP SYMBOL INDICATES HELPFULL INFORMATION AND TIPS TO IMPROVE YOUR NETWORK EXPERIENCE...

Page 7: ...than the one included with your product will cause damage and void the warranty for this product Minimum System Requirements Broadband Cable xDSL Internet service and Modem with Ethernet connection 2...

Page 8: ...the transmission data rate again until it reaches the highest available transmission rate Types of Wireless Networks Wireless LAN networking works in either of the two modes ad hoc and infrastructure...

Page 9: ...6 channel for each station...

Page 10: ...u have a Basic Service Set BSS In the ESS diagram below communication is done through the access points which relay data packets to other wireless stations or devices connected to the wired network Wi...

Page 11: ...o move from one access point to another without losing the connection In the diagram below when the user moves from BSS 1 to BSS 2 the WLAN client devices automatically switches to the channel used in...

Page 12: ...content at up to gigabit speeds The integrated NAT firewall with SPI provides protection from hackers and Denial of Service attacks by analyzing individual data packets to ensure that only authorized...

Page 13: ...MAC Filtering Supports Multiple and Concurrent IPSec L2TP and PPTP VPN Pass Through Sessions Flash Memory for Firmware Upgrade Save Restore Settings Easy Management via Web Browser HTTP and Remote Man...

Page 14: ...T Pressing the reset button for 10 seconds restores the router to its original factory default settings WAN Auto MDI MDIX The WAN port is used to connect to an Ethernet Cable or xDSL modem LAN1 4 Auto...

Page 15: ...ess AP is ready The LED blinks when wireless data is transmitted WPS LED After pressing the WPS button for 4 seconds the WPS LED will blink continually When a client joins the network successfully the...

Page 16: ...ted If no client joins the LED will stop blinking and switch off after 4 minutes USB The USB2 0 port can be used for connecting USB printers For a list of printers refer to Appendix A WLAN ON OFF The...

Page 17: ...tead of at an angle for better reception 3 Building Materials can impede the wireless signal a solid metal door or aluminum studs may have a negative effect on range Try to position wireless devices a...

Page 18: ...N default IP address is http 192 168 2 1 Open the Web browser Type in the IP Address of the Router http 192 168 2 1 If you have changed the default IP Address assigned to the SMCWGBR14 N make sure yo...

Page 19: ...f you are new to networking and have never configured a router before click on Setup Wizard and the router will guide you through a few simple steps to get your network up and running Manual Configure...

Page 20: ...ss network To protect your privacy use the wireless security mode to configure the wireless security features This device supports three wireless security modes including WEP WPA Personal and WPA Ente...

Page 21: ...rage of your wireless network 802 11 Mode If all of the wireless devices you want to connect with this router can connect in the same transmission mode you can improve performance slightly by choosing...

Page 22: ...encryption Note that if you enter fewer characters in the WEP key than required the remainder of the key is automatically padded with zeros WPA Personal and WPA Enterprise Both of these options selec...

Page 23: ...er Port The port number used to connect to the authentication server RADIUS Server Shared Secret A pass phrase that must match with the authentication server MAC Address Authentication If this is sele...

Page 24: ...may need to adjust your PC s network settings to access the network again Router Settings These are the settings of the LAN Local Area Network interface for the router The router s local network LAN...

Page 25: ...e even when the router obtains a different DNS server address from the ISP upon re establishing the WAN connection You should disable DNS relay if you implement a LAN side DNS server as a virtual serv...

Page 26: ...t use DHCP to obtain network address details automatically It is possible for a computer or device that is manually configured to have an address that does reside within this range In this case the ad...

Page 27: ...t the same as when a device has a static IP address except that the device must still request an IP address from the router The router will provide the device the same IP address every time DHCP Reser...

Page 28: ...ou have specified to have reserved DHCP addresses An entry can be changed by clicking the Edit icon or deleted by clicking the Delete icon When you click the Edit icon the item is highlighted and the...

Page 29: ......

Page 30: ...ilter Firewall Inbound Filter Advanced Wireless and Advanced Network Advanced_Virtual Server The Virtual Server option gives Internet users access to services on your LAN This feature is useful for ho...

Page 31: ...as LAN IP Address of 192 168 2 50 and your ISP is blocking Port 80 1 Name the Virtual Server for example Web Server 2 Enter the IP Address of the machine on your LAN for example 192 168 2 50 3 Enter t...

Page 32: ...rovide the virtual service for example 192 168 2 50 You can select a computer from the list of DHCP clients in the Computer Name drop down menu or you can manually enter the IP address of the server c...

Page 33: ...lighted and the Edit Virtual Server section is activated for editing You might have trouble accessing a virtual server using its public identity WAN side IP address of the gateway or its dynamic DNS n...

Page 34: ...your internal network Parameters for an Application Rule Example You need to configure your router to allow a software application running on any computer on your network to connect to a web based ser...

Page 35: ...create a new schedule With the above example application rule enabled the router will open up a range of ports from 6000 6200 for incoming traffic from the Internet whenever any computer on the intern...

Page 36: ...nd others These applications have difficulties working through NAT Network Address Translation This section is used to open multiple ports or a range of ports in your router and redirect data through...

Page 37: ...Inbound Filter Select a filter that controls access as needed for this rule If you do not see the filter you need in the list of filters go to the Advanced Inbound Filter screen and create a new filte...

Page 38: ...s the currently defined game rules A game rule can be changed by clicking the Edit icon or deleted by clicking the Delete icon When you click the Edit icon the item is highlighted and the Edit Game Ru...

Page 39: ...36 Advanced_StreamEngine The StreamEngine feature helps improve your network gaming performance by prioritizing the data flows of network applications...

Page 40: ...37...

Page 41: ...etwork connections Manual Uplink Speed If Automatic Uplink Speed is disabled this options allows you to set the uplink speed manually Uplink speed is the speed at which data can be transferred from th...

Page 42: ...me Create a name for the rule that is meaningful to you Priority The priority of the message flow is entered here 1 receives the highest priority most urgent and 255 receives the lowest priority least...

Page 43: ...must still click the Save Settings button at the top of the page to make the changes effective and permanent StreamEngine Rules List The section shows the currently defined StreamEngine rules A Strea...

Page 44: ...the IP routing table or edits an existing route Enable Specifies whether the entry will be enabled or disabled Destination IP The IP address of packets that will take this route Netmask One bits in th...

Page 45: ...s that the route is not reachable from this router When trying to reach a particular destination computers on your network will select the best route ignoring unreachable routes Save Saves the new or...

Page 46: ...ou need Access Control check this option When Access Control is disabled every device on the LAN has unrestricted access to the Internet However if you enable Access Control Internet access is restric...

Page 47: ...this button to start creating a new access control policy Policy Table This section shows the currently defined access control policies A policy can be changed by clicking the Edit icon or deleted by...

Page 48: ...ites and saves you the trouble of entering specific web site URLs For more information about the Sentinel service refer to Tools Sentinel Web Filter Parameters Web Site Enter the address of the web si...

Page 49: ...ivated by default Save Saves the new or edited Allowed Web Site in the following list When finished updating the Allowed Web Site List you must still click the Save Settings button at the top of the p...

Page 50: ...facturer of the network adapter Enable MAC Address Filter When this is enabled computers are granted or denied network access depending on the mode of the filter Misconfiguration of this feature can p...

Page 51: ...activated or deactivated with this checkbox MAC Address Enter the MAC address of the desired computer or connect to the router from the desired computer and click the Copy Your PC s MAC Address button...

Page 52: ...ing your LAN invisible to Internet cyber attackers However some network applications cannot run with a tight firewall Those applications need to selectively open ports in the firewall to function corr...

Page 53: ...50 Firewall Settings Enable SPI SPI stateful packet inspection also known as dynamic packet filtering helps to prevent cyber attacks by tracking more state per session It validates that the...

Page 54: ...he one used when the outgoing session was created Port And Address Restricted The NAT does not forward any incoming connection requests with the same port address as an already establish connection No...

Page 55: ...The DMZ capability is just one of several means for allowing incoming requests that might appear unsolicited to the NAT In general the DMZ host should be used only if there are no other alternatives b...

Page 56: ...Some protocols and applications require special handling of the IP payload to make them work with network address translation NAT Each ALG provides special handling for a specific protocol or applicat...

Page 57: ...should also set up a virtual server for NetMeeting Refer to the Advanced Virtual Server page for information on how to set up a virtual server SIP Allows devices and applications using VoIP Voice ove...

Page 58: ...riends whom you have invited to play the games on that server Inbound Filters can be used for limiting access to a server on your network to a system or group of systems Filter rules can be used with...

Page 59: ...edit existing entries Name Enter a name for the rule that is meaningful to you Action The rule can either Allow or Deny messages Source IP Range Define the ranges of Internet addresses this rule appl...

Page 60: ...t The section lists the current Inbound Filter Rules An Inbound Filter Rule can be changed by clicking the Edit icon or deleted by clicking the Delete icon When you click the Edit icon the item is hig...

Page 61: ...gnated wireless area Beacon Period Beacons are packets sent by a wireless router to synchronize wireless devices Specify a Beacon Period value between 20 and 1000 The default value is set to 100 milli...

Page 62: ...reflections Select the option that works best for your installation Extra Wireless Protection Extra protection for neighboring 11b wireless networks Turn this option off to reduce the adverse effect o...

Page 63: ...equipment software and peripherals This router has optional UPnP capability and can work with other UPnP devices and software Enable UPnP If you need to use the UPnP functionality you can enable it he...

Page 64: ...ting transmission of identical content such as multimedia from a source to a number of recipients Enable Multicast Streams This option must be enabled if any applications on the LAN participate in a m...

Page 65: ...to allow WISH to prioritize your traffic Priority Classifiers HTTP Allows the router to recognize HTTP transfers for many common audio and video streams and prioritize them above other traffic Such st...

Page 66: ...ving interactive traffic such as gaming or VoIP running at a normal priority Add Edit WISH Rule A WISH Rule identifies a specific message flow and assigns a priority to that flow For most applications...

Page 67: ...The rule applies to a flow of messages for which host 2 s port number is within the range set here Save Update Record the changes you have made into the following list Clear Re initialize this area of...

Page 68: ...s security settings prevents the settings from being changed by any new external registrar using its PIN Devices can still be added to the wireless network using Wi Fi Protected Setup It is still poss...

Page 69: ...ither display the wireless network settings to guide you through manual configuration prompt you to enter the PIN for the device or ask you to press the configuration button on the device If the devic...

Page 70: ...ings System Firmware Dynamic DNS Windows Connect Now System Check Schedules Tools_Admin The Admin option is used to set a password for access to the Web based management By default there is no passwor...

Page 71: ...r admin who will have full access to the Web based management interface User Password Enter a password for the user user who will have read only access to the Web based management interface Gateway Na...

Page 72: ...that you will use to address the management interface from the Internet For example if you specify port 1080 here then to access the router from the Internet you would use a URL of the form http my d...

Page 73: ...From this section you can set the time zone that you are in and set the Time Server Daylight saving can also be configured to automatically adjust the time when needed Time Configuration Current Rout...

Page 74: ...are using schedules or logs this is the best way to ensure that the schedules and logs are kept accurate NTP Server Used Select a Network Time Server for synchronization You can type in the address o...

Page 75: ...your log files to a Syslog Server Enable Logging to Syslog Server Enable this option if you have a syslog server currently running on the LAN and wish to send log messages to it Syslog Server IP Addr...

Page 76: ...ations can be emailed to a designated email address and the following parameters are displayed Email Settings From Email Address This email address will appear as the sender when you receive a log fil...

Page 77: ...Schedule Select this option if you want logs to be sent by email according to a schedule Schedule If you selected the On Schedule option select one of the defined schedule rules If you do not see the...

Page 78: ...sure to save the configuration before performing a firmware upgrade Load Settings From Local Hard Drive Use this option to restore previously saved router configuration settings Restore To Factory De...

Page 79: ...upgrade file on your computer 2 Once you have found the file to be used click the Upload button below to start the firmware upgrade process This can take a minute or more 3 Wait for the router to rebo...

Page 80: ...ted to the router by wire Some firmware upgrades reset the configuration options to the factory defaults Before performing an upgrade be sure to save the current configuration from the Tools Admin scr...

Page 81: ...connect to your server no matter what your IP address is Enable Dynamic DNS Enable this option only if you have purchased your own domain name and registered with a dynamic DNS service provider The fo...

Page 82: ...red in hours If a dynamic DNS update fails for any reason for example when incorrect parameters are entered the router automatically disables the Dynamic DNS feature and records the failure in the log...

Page 83: ...uter is running and to get an idea of the quality of the connection to that computer based on the speed of the responses Host Name or IP Address Enter either the IP address of the target computer or e...

Page 84: ...ving www whitehouse gov Resolved to 205 161 7 102 Response from 205 161 7 102 received in 7 milliseconds Response from 205 161 7 102 received in 6 milliseconds Response from 205 161 7 102 received in...

Page 85: ...End Time of 8pm Add Edit Schedule Rule In this section you can add entries to the Schedule Rules List below or edit existing entries Name Give the schedule a name that is meaningful to you such as We...

Page 86: ...vents Save Saves the new or edited Schedule Rule in the following list When finished updating the Schedule Rules you must still click the Save Settings button at the top of the page to make the change...

Page 87: ...e router to support the LPD LPR protocol Printers are identified by a symbolic queue name This option is disabled by default enable it if required by the devices on the LAN This method of printing is...

Page 88: ...u specifically want Offset Enter an offset in inches or millimeters Resolution Select the resolution from Low to Highest The highest resolution is recommended for photo s that will be enlarged or just...

Page 89: ...and network connection details are displayed on the Device Info page The firmware version is also displayed here Some browsers have limitations that make it impossible to update the WAN status displa...

Page 90: ...nection Clicking the DHCP Release button unassigns the router s IP address The router will not respond to IP messages from the WAN side until you click the DHCP Renew button or power up the router aga...

Page 91: ...e screen continually updates to show all DHCP enabled computers and devices connected to the LAN side of your router The detection range is limited to the address range as configured in DHCP Server Co...

Page 92: ...e client Values are 11a 11b or 11g for 802 11a 802 11b or 802 11g respectively Rate The actual transmission rate of the client in megabits per second Signal This is a relative measure of signal qualit...

Page 93: ...configured for your router A value of 0 0 0 0 for gateway means there is no next hop and the IP address is directly connected to the router on the interface specified LAN or WAN A value of 0 0 0 0 in...

Page 94: ...est events are retained The Logs option allows you to view the router logs You can define what types of events you want to view and the level of events to view This router also has external Syslog Ser...

Page 95: ...h Clicking this button refreshes the display of log entries There may be new events since the last time you accessed the log Clear Clicking this button erases all log entries Email Now If you provided...

Page 96: ...ts sent from the router Received The number of packets received by the router TX Packets Dropped The number of packets that were dropped while being sent due to errors collisions or router resource li...

Page 97: ...ue to Ethernet collisions two or more devices attempting to use an Ethernet circuit at the same time Errors The number of transmission failures that cause loss of a packet A noisy radio frequency envi...

Page 98: ...s a conversation between a progam or application on a LAN side computer and a program or application on a WAN side computer Internal The IP address and port number of the LAN side application Protocol...

Page 99: ...nection be stopped CW Close Wait the server system has requested that the connection be stopped TW Time Wait Waiting for a short time while a connection that was in FIN Wait is fully closed LA Last AC...

Page 100: ...page displays full details of active local wireless sessions through your router when WISH has been enabled A WISH session is a conversation between a program or application on a wirelessly connected...

Page 101: ...me while a connection that was in Close Wait is fully closed CL Closed The connection is no longer active but the session is being tracked in case there are any retransmitted packets still pending Pri...

Page 102: ...Printing Shows the IP Address and TCP Port values that you need to enter when you configure your computer to use the printer in TCP Raw mode LPD LPR Printing Shows the IP Address and Queue Name values...

Page 103: ...MFP devices both printing and scanning features can be accessed from any PC on the network This MFP Print Server was designed to use a web based Printer Setup Wizard that makes network printer instal...

Page 104: ...rinter Setup Wizard that makes this process extremely simple to set up the PC for network printing From the SMCWGBR14 N home page LOGIN page select the Printer Icon to start the installation of your p...

Page 105: ...ds and loads the correct print driver and then configures the driver for network printing If the printer driver has been loaded onto the PC before the wizard will find it If this printer is new to thi...

Page 106: ...lect RUN in both instances The Wizard will execute showing progress with the following popup Once the printer driver is installed the Printer Setup Wizard will ask if you would like to make this print...

Page 107: ...used to quickly access the SMCWGBR14 N web page in the future especially to use the scan function on the MFP Finally the Printer Setup Wizard application will ask if you would like to print a test pa...

Page 108: ...ional MFP device to the Print Server you can access the scan feature now without loading any driver software From the SMCWGBR14 N home page LOGIN select the Scan Icon The following Scan page will be d...

Page 109: ...106 Step 1 Press Preview Scan to initiate a quick scan to check the position and alignment of the scan document Note Preview Scan is unavailable when using Automatic Document Feeder...

Page 110: ...elect either Color or Black White File Format Select the desired file format Now press the Scan button Step 3 is the process of scanning the final image This image is displayed on a new page as shown...

Page 111: ...p 4 is saving the image To save the image move the mouse over the image area and right click to bring up options for saving the image to your PC The image will be saved in the file format selected in...

Page 112: ...2 N A DJ840 N A DJ F380 YES Inkjet1200D N A LJ1012 N A LJ1022 N A LJ1320 N A LJ3015 NO OJd135 2002 NO OJk60 2002 NO OJ4110 YES OJ4215 YES OJ5510 YES OJ5610 YES OJ6110 YES OJ6210 YES OJ7130 YES OJ7210...

Page 113: ...0 N A IP1600 N A MP390 NO MP450 NO MP730 NO Epson Printer Models Tested MODEL NUMBER SCANNING SUPPORTED Stylus 1280 N A Stylus C84 N A Stylus C86 N A Stylus C88 N A Stylus CX3810 YES Stylus CX4800 YES...

Page 114: ...be made in both directions ADSL Asymmetric Digital Subscriber Line Advanced Encryption Standard AES Government encryption standard Alphanumeric Characters A Z and 0 9 Antenna Used to transmit and rec...

Page 115: ...is available on the network B Backward Compatible The ability for new devices to communicate and interact with older legacy devices to guarantee interoperability Bandwidth The maximum amount of bytes...

Page 116: ...ace It supports a 32 bit data path DMA and consumes less voltage CAT 5 Category 5 Used for 10 100 Mbps or 1Gbps Ethernet connections Client A program or user that requests data from a server Collision...

Page 117: ...text Default A predetermined value or setting that is used by a program when no user input has been entered for this value or setting Demilitarized zone DMZ A single computer or group of computers th...

Page 118: ...smissions at the sane time Dynamic DNS service Dynamic DNS is provided by companies to allow users with Dynamic IP addresses to obtain a Domain Name that will always by linked to their changing IP add...

Page 119: ...outside of the local network Firmware Programming that is inserted into a hardware device that tells it how to function Fragmentation Breaking up data into smaller pieces to make it easier to store FT...

Page 120: ...t Transfer Protocol is used to transfer files from HTTP servers web servers to HTTP clients web browsers HTTPS HTTP over SSL is used to encrypt and decrypt HTTP transmissions Hub A networking device t...

Page 121: ...at the packet processing layer of network communication Internet Service Provider An ISP provides access to the Internet to individuals or companies Intranet A private network Intrusion Detection A ty...

Page 122: ...ng Diode Legacy Older devices or technology Local Area Network A group of computers in a building that usually access files from a server LPR LPD Line Printer Requestor Line Printer Daemon A TCP IP pr...

Page 123: ...that can be transmitted on a packet based network like the Internet Multicast Sending data from one device to many devices on a network N NAT Network Address Translation allows many private IP addres...

Page 124: ...posed to sending the entire routing table at a regular interval which is how RIP functions P Password A sequence of characters that is used to authenticate requests to resources on a network Personal...

Page 125: ...ronize communication timing between devices on a network Q QoS Quality of Service R RADIUS Remote Authentication Dial In User Service allows for remote users to dial into a central server and be authe...

Page 126: ...session between two computers Session layer The fifth layer of the OSI model which coordinates the connection and communication between applications on both ends Simple Mail Transfer Protocol Used fo...

Page 127: ...nterface for collecting in one place the logs from different sources Originally written for UNIX it is now available for other operating systems including Windows T TCP Transmission Control Protocol T...

Page 128: ...the other UPnP Universal Plug and Play URL Uniform Resource Locator is a unique address for files accessible on the Internet USB Universal Serial Bus UTP Unshielded Twisted Pair V Virtual Private Net...

Page 129: ...Fi Protected Access An updated version of security for wireless networks that provides authentication as well as encryption Wide Area Network The larger network that your LAN is connected to which ma...

Page 130: ...ntenna used to concentrate wireless signals on a specific location Z 1 802 11 A family of specifications for wireless local area networks WLANs developed by a working group of the Institute of Electri...

Page 131: ...SMCWBR11 G SMCWGBR14 N...

Reviews: