SMC Networks SMC Barricade N Draft 11n Wireless 4-port Broadband Router SMCWBR14-N Bedienungsanleitung
- Schauen Sie die Anleitung online durch oderladen Sie diese herunter
- 99 Seiten
- 2.81 mb
Zur Seite of
Ähnliche Gebrauchsanleitungen
-
Network Router
SMC Networks SMCBR18VPN
73 Seiten 2.87 mb -
Network Router
SMC Networks SMC7904BRB2
2 Seiten 0.41 mb -
Network Router
SMC Networks SMCWBR14-N
99 Seiten 2.68 mb -
Network Router
SMC Networks SMC7904WBRB
139 Seiten 3.69 mb -
Network Router
SMC Networks SMC Barricade SMC7804WBRA
124 Seiten 9.91 mb -
Network Router
SMC Networks SMC7804WBRA
124 Seiten 2.19 mb -
Network Router
SMC Networks SMCWBR14-G2
132 Seiten 2.27 mb -
Network Router
SMC Networks SMC8126PL2-F
614 Seiten 8.38 mb
Richtige Gebrauchsanleitung
Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung SMC Networks SMC Barricade N Draft 11n Wireless 4-port Broadband Router SMCWBR14-N an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von SMC Networks SMC Barricade N Draft 11n Wireless 4-port Broadband Router SMCWBR14-N, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.
Was ist eine Gebrauchsanleitung?
Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung SMC Networks SMC Barricade N Draft 11n Wireless 4-port Broadband Router SMCWBR14-N die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.
Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung SMC Networks SMC Barricade N Draft 11n Wireless 4-port Broadband Router SMCWBR14-N. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.
Was sollte also eine ideale Gebrauchsanleitung beinhalten?
Die Gebrauchsanleitung SMC Networks SMC Barricade N Draft 11n Wireless 4-port Broadband Router SMCWBR14-N sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts SMC Networks SMC Barricade N Draft 11n Wireless 4-port Broadband Router SMCWBR14-N
- Den Namen des Produzenten und das Produktionsjahr des Geräts SMC Networks SMC Barricade N Draft 11n Wireless 4-port Broadband Router SMCWBR14-N
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts SMC Networks SMC Barricade N Draft 11n Wireless 4-port Broadband Router SMCWBR14-N
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen
Warum lesen wir keine Gebrauchsanleitungen?
Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von SMC Networks SMC Barricade N Draft 11n Wireless 4-port Broadband Router SMCWBR14-N zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von SMC Networks SMC Barricade N Draft 11n Wireless 4-port Broadband Router SMCWBR14-N und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service SMC Networks finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von SMC Networks SMC Barricade N Draft 11n Wireless 4-port Broadband Router SMCWBR14-N zu überspringen, wie es bei der Papierform passiert.
Warum sollte man Gebrauchsanleitungen lesen?
In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts SMC Networks SMC Barricade N Draft 11n Wireless 4-port Broadband Router SMCWBR14-N, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.
Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von SMC Networks SMC Barricade N Draft 11n Wireless 4-port Broadband Router SMCWBR14-N widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.
Inhaltsverzeichnis der Gebrauchsanleitungen
-
Seite 1
USER GUIDE SMCWBR14 -N Barricade™ N 2.4GHz Dr aft 11n Wir eles s 4-port Broadb and R outer[...]
-
Seite 2
i LIMITED W ARRANTY Limited W arranty S tatement: SMC Networks, Inc. (“SMC”) warrants its product s to be free from defects in workmanship and materials, und er normal use and service, for the a pplicable warranty term. All SMC product s carry a standard 90-day limited wa rranty from the date of purchase fro m SMC or its Authorized Reseller . S[...]
-
Seite 3
ii LOSS OF BU SINESS, OR OTHER FINANCIAL LOSS ARISING OUT OF OR IN CONN ECTION WITH THE SALE, INST ALLA TION, MAINTENANCE, USE, PERFORMANCE, F AILURE, OR INTERRUPTION OF ITS PRODUCTS, EVEN IF SMC OR ITS AUTHORIZED RESELLER HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES . SOME ST A TES DO NOT ALLOW THE EXCLUS ION OF IMPLIED WARR ANTIES OR THE L[...]
-
Seite 4
iii Compliances Federal Communica tion Commission In terference St atement This equipment has b een tested and found to compl y with the li mits for a Class B digital devic e, pursuant to Part 15 of the FCC Rules. These limits are designed to p rovide reasonable protecti on against harmful interf erence in a residenti al installation. This equipmen[...]
-
Seite 5
2 Table of Contents Getting Started with the SMCWBR14-N 3 P a c k a g e C o n t e n t s 4 Minimum System Requirements 4 Wireless LAN Networking 5 I n t r o d u c t i o n 9 F e a t u r e s 9 Hardware Overview 10 Rear Panel 10 L E D s 1 1 Installation Considerations 12 Getting Started 1 2 Using the Configuration Menu 13 B a s i c 1 4 A d v a n c e d [...]
-
Seite 6
3 Getting S tarted with the SMCWBR14-N Congratulations on purchasing the SMCWBR14-N. This manual provides information for setting up and configuring the SMCWBR14-N. This manual is intended for both home users and professionals. The following conventions are used in this manual: THE NOTE SYMBOL INDICA TES ADDITIONAL INFORM A TION ON THE TOPIC A T HA[...]
-
Seite 7
4 Package Content s z Barricade™ N Broadband Router (SMCWBR14-N) z Yellow RJ-45 Ethernet Cable z Power Adapter (5.0V, 2.5A) z Documentation CD z Quick Installation Guide z Warranty registration card Using a power supply with a different voltage than the one included with your product will cause damage and void the warranty for this product. Minim[...]
-
Seite 8
5 Wireless LAN Networking This section provides background information on wireless LAN networking technolog y . Consult the Glossary for definitions of the terminology used in this section. T HE INFORMA TION IN THIS SECT ION IS FOR YOUR REFERENCE. C HANGING NETWORK SETT INGS AND P ARTICULARL Y SECURITY SETTTINGS SHOULD ONL Y BE DO NE BY AN AUTHORIZ[...]
-
Seite 9
6[...]
-
Seite 10
7 When a number of wireless stations are connecte d using a single access p oint, you have a Basic Service Set (BSS). In the ESS diagram below , communication is done through the access points, which relay dat a packet s to other wireless stations or devices con nected to the wired network. Wireless stations can then access resources, such as a pri[...]
-
Seite 11
8 In an ESS environ ment, users are able to move from one acc ess point to another without losing th e connection. In the diagram below , when the user moves from BSS (1) to BSS (2) the WLAN client devices automatically switches to the channel used in BSS (2). Roaming in an ESS network diagram[...]
-
Seite 12
9 Introduction The SMCWBR14-N is a high-performance, wireless router that supports high-speed wireless networking at home, at work or in public places. Unlike most routers, the SMCWBR14-N provides data transfers at up to 300Mbps when using 11n (Draft) connection. This router is also backwards compatible with 802.11g or 11b devices. This means that [...]
-
Seite 13
10 Hardware Overview Back Panel POWER The Power input connector is a single jack socket to supply power to the SMCWBR14-N. Please use the Power Adapter provided in the SMCWBR14-N package. RESET Pressing the reset button restores the router to its original fa ctory default settings. WLAN ON/OFF The WLAN ON/OFF slide switch can be used to turn the wi[...]
-
Seite 14
11 Front Panel LED’s POWER A solid green LED indicates the SMCWBR14-N is receiving power – normal operation. If the LED is off there is no power to device or failure. LAN1-4 A solid green LED indicates the corresponding LAN port connection is established. The LED blinks when data is transmitted. If the LED is off there is no link for correspond[...]
-
Seite 15
12 Installation Considerations The SMCWBR14-N lets you access your network, using a wireless connection, from virt ually anywhere within its operating range. Keep in mind, however, that the number, thickness and lo cation of walls, ceilings, or other objects t hat the wireless signals must pass through, may limit the range. Typical ranges vary depe[...]
-
Seite 16
13 Using the Configuration Menu Whenever you want to configure your SMCWBR 14-N, you can access the Configuration Menu through your PC by opening the Web-browser and typi ng in the IP Addre ss of the SMCWBR14-N. The SMCWBR14-N default IP address is: http://192.168.2.1 ¾ Open the Web browser. ¾ Type in the IP Address of the Router ( http://192.168[...]
-
Seite 17
14 Basic The Basic tab provides the following configuration options: INTERNET, WIRELESS and NETWORK SETTINGS. Basic_Internet Setup Wizard If you are new to networking and have never configured a router before, click on Setup W izard and the router will guide you through a few simple step s to get your network up and running. Manual Configure If you[...]
-
Seite 18
15 Basic_Wireless The wireless section is used to configure the wireless settings for your router. Note that changes made in this section may also need to be duplicated on wireless clients that you want to connect to your wireless network. To protect your privacy, use the wireless security mode to configure the wireless security features. This devi[...]
-
Seite 19
16 Enable Wireless This option allows you to enable/disable the wireless AP function. The wireless ca n also be turned ON/OFF by the slide switch on the back panel. When the wireless is e nabled, the following parameters are in effect. Wireless Network Name When you are browsing for available wireless networks, this i s the name that will appear in[...]
-
Seite 20
17 WEP network, you must know the key. The key is a string of characters that you create. When using WEP, you must determine the level of encryption. The type of encryption determines the key length. 128-bit encryption requires a longer key than 64-bit encryption. Keys are defined by entering in a string in HEX (hexadecimal - using characters 0-9, [...]
-
Seite 21
18 This option works with a RADIUS Server to authenticate wireless clients. Wireless clients should have established the necessary credentials before attempting to authenticate to the Server through this Gateway. Furthermore, it may be necessary to configure the RADIUS Server to allow this Gateway to authenticate users. Authentication Timeout: Amou[...]
-
Seite 22
19 Basic_ Network Settings Use this section to configure the internal network setti ngs of your router. The IP Address that is configure d here is the IP Address that you u se to access the Web-based managemen t interface. If you change the IP Address here, you may need t o adjust your PC’s networ k settings to access the networ k again.[...]
-
Seite 23
20 Router Settings These are the settings of the LAN (Local Area Network) interface for the router . The router's local network (LAN) settings are configured based on the IP Address and Subnet Mask assigned in this section. The IP address is also u sed to access this Web-based management interface. It is recommended that you use the default se[...]
-
Seite 24
21 Make this router the preferred destination for p ackets that are not otherwise destined. Allow RIP up dates from W AN For security , disable this option unless required by the ISP . RIP Password RIP V ersion 2 supports the use of a p assword to limit access to routers through the RIP protocol. If the ISP or other LAN router requires a RIP passwo[...]
-
Seite 25
22 this falls within the "managed range" be sure to create a reservation for this address and match it to the relevant computer (see S tatic DHCP Client below). DHCP Lease T ime The amount of time that a computer may have an IP address before it is required to renew the lease. The lease fun ctions just as a lease on an apartment would. Th[...]
-
Seite 26
23 Windows 98 Windows Me Go to the S tart menu, select Run, type in winipcfg , and hit Enter . A popup window will be displayed. Select the appropriate adapter from the pull-down menu and you will see the Adapter Address. This is the MAC address of the device. Windows 2000 Windows XP Go to your S tart menu, select Programs, select Accessories, and [...]
-
Seite 27
24 Advanced The Advanced tab provides the following configuration options: Virtual Server, Special Applications, Gaming, StreamEngine, Routing, Access Control, WEB Filter, MAC Address Filter, Firewall, Inbound Filter, Advanced Wireless and Advanced Network. Advanced_Virtual Server The Virtual Server option gives Internet users access to services on[...]
-
Seite 28
25 2. Enter the IP Address of the machine on your LAN (for example: 192.168.2.50 3. Enter the Private Port as [80] 4. Enter the Public Port as [8888] 5. Select the Protocol (for example TCP ). 6. Ensure the schedule is set to Always 7. Click Save to add the settings to the V irtual Servers List 8. Repeat these steps for each V irtual Server Rule yo[...]
-
Seite 29
26 Add/Edit Virtual Server In this section you can add an entry to the V irtual Servers List below or edit an existing entry . Enable Entries in the list can be either active (enabled) or inactive (disabled). Save Saves the new or edited virtual server entry in the following list. When finished updating the virtual server entries, you must still cl[...]
-
Seite 30
27 Advanced_Special Applications An application rule is used to open single or multiple ports on your router when the router senses data sent to the Internet on a "trigger" port or port range. An application rule applies to all computers on your internal network. Parameters for an Application Rule Example: Y ou need to configure your rout[...]
-
Seite 31
28 Enter the outgoing port range used by your application (for ex ample 650 0-6700 ). T rigger Protocol Select the outbound protocol used by your application (for example Both ). Input Port Range Enter the port range that you want to open up to Internet traf fic (for example 6000-6200 ). Input Protocol Select the protocol used by the Internet traf [...]
-
Seite 32
29 Advanced_Gaming Multiple connections are required by some applicat ions, such as internet games, video conferencing, Internet telephony, and others. These applications have difficulties working through NAT (Network Address Translation). This section is used to ope n multiple ports or a range of ports in your router and redirect data through thos[...]
-
Seite 33
30 Give the rule a name that is meaningful to you, for example Game Server . Y ou can also select from a list of popular games, and many of the remaining configuration values will be f illed in accordingly . However , yo u should check whether the port values have changed since this list was created, and you must fill in the IP address field. IP Ad[...]
-
Seite 34
31 Advanced_StreamEngine The StreamEngine feature helps improve your netwo rk gaming performance by prioritizing the data flows of network applications. StreamEngine Setup Enable StreamEngine Enable this option for better performance and experience with online games and other interactive applications, such as V oIP .[...]
-
Seite 35
32 Automatic Classification This option is enabled by default so that your router will automatically determine which programs should have network priority . Dynamic Fragment ation This option should be enabled when you have a slow Internet uplink. It helps to reduce the impact that large low priority network p ackets can have on more urgent ones by[...]
-
Seite 36
33 that every flow defined in a rule receives the expected priority and avoids indeterminate prioritization that could reduce QoS ef fectiveness. Name Create a name for the rule that is meaningful to you. Priority The priority of the message flow is entered here -- 1 receives the highest priority (most urgent) and 255 receives the lowest priority ([...]
-
Seite 37
34 Advanced_Routing Add/Edit Route Adds a new route to the IP routing table or edits an existing route. Enable: Specifies whether the entry will be enabled or disabled. Destination IP: The IP address of packets that will take this route. Netmask: One bits in the mask specify which bits of the IP address must match. Gateway: Specifies the next hop t[...]
-
Seite 38
35 Save: Saves the new or edited route in the following list. When finished updating the r outing table, you must still click the Save Settings button at the top of the page to make the changes effective and permanent. Routes List The section shows the current routing table entries. Certain required routes are pred efined and cannot be changed. Rou[...]
-
Seite 39
36 Advanced_Access Control The Access Control section allows you to control ac cess in and out of devices on your network. Use this feature as Parental Controls to only grant access to ap proved sites, limit web access based on time or dates, and/or block access from applications such as peer-to-peer utilities or games. Enable By default, the Acces[...]
-
Seite 40
37 This section shows the currently defined access control policies. A policy can be changed by clicking the Edit icon, or deleted by clicking the Delete icon. When you click the Edit icon, the Policy Wizard starts and guides you through the process of changing a policy. You can enable or disable specific policies in the list by clicking t he "[...]
-
Seite 41
38 Advanced_WEB Filter This section is where you add the Web sites to be used for A ccess Control. The Web sites listed here are used when the Web Filter option is enabled in Access Control . The Web Filter section is one of two means by which you can specify the web sites you want to allow. You also have the alternative of using the Sentinel Paren[...]
-
Seite 42
39 Enable Entries in the Allowed Web Site List can be activated or deactivated with this che ckbox. New entries are activated by default. Save Saves the new or edited Allowed Web Site in the following list. When finished updating the Allowed Web Site List, you must still click the Save Settings button at the top of the page to make the changes effe[...]
-
Seite 43
40 Advanced_MAC Address Filter The MAC address filter section can be used to filter network access by machines based on the un ique MAC addresses of their network adapter(s). It is most useful to prevent unauthorized wireless dev ices from connecting to your network. A MAC address is a unique ID assigned by the manufacturer of the network adapter. [...]
-
Seite 44
41 Filter Wired Clients When this is selected, the MAC address filters will be applied to wired network client s. Add/Edit MAC Address In this section, you can add entries to the MAC Address List below, or edit existing en tries. Enable MAC address entries can be activated or deactivated with this checkbox. MAC Address Enter the MAC address of the [...]
-
Seite 45
42 Advanced_Firewall The router provides a tight firewall by virtue of the way NAT works. Unless you configure the router to the contrary, the NAT does not respond to unsolicited incoming requests on any port, thereby making your LAN invisible to Internet cyber attackers. However, some network applications cannot run with a tight firewall. Those ap[...]
-
Seite 46
43 Firewall Settings Enable SPI SPI ("stateful p acket inspection" also known as "dynamic p acket filtering") helps to prevent cyber att acks by tracking more state per session. It validates that the traffic passing through that session confor ms to the protocol. When the protocol is TCP , SPI checks that packet sequ ence number[...]
-
Seite 47
44 DMZ means "Demilitarized Zone." If an application has troub le working from behind the router , you can expose one computer to the Internet and run the application o n that computer . When a LAN host is configured as a DMZ host, it becomes the destination for all in coming packet s that do not match some other incoming session or rule.[...]
-
Seite 48
45 Non-UDP/TCP/ICMP LAN Sessions When a LAN application that uses a protocol other than UDP , TCP , or ICMP initiates a session to the Internet, the router's NA T can track such a session, even though it does not recognize the protocol. This feature is useful because it enables cert ain applications (most importantly a single VPN connection to[...]
-
Seite 49
46 Allows FTP client s and servers to transfer data across NA T . Refer to the Advanced → Virtual Server p age if you want to host an FTP server . H.323 (Netmeeting) Allows H.323 (specifically Microsoft Netmeeting) client s to communicate across NA T . Note that if you want your buddies to call you, you should also set up a virtual server for Net[...]
-
Seite 50
47 Advanced_Inbound Filter When you use the Virtual Server, Gaming, or Remote Administration features to open specific ports to traffic from the Internet, you could be increasing the ex posure of your LAN to cyber attacks from the Internet. In these cases, you can use Inbound Filter s to limit that exposure by specifying the IP addresses of interne[...]
-
Seite 51
48 Add/Edit Inbound Filter Rule Here you can add entries to the Inbound Filter Rules List below, or edit existing entries. Name Enter a name for the rule that is meaningful to you. Action The rule can either Allow or Deny messages. Source IP Range Define the ranges of Internet addresses this rule applies to. For a single IP address, enter the same [...]
-
Seite 52
49 Advanced_Advanced Wireless Transmit Power Normally the wireless transmitter operates at 100% power. In some circumstances, however, there might be a need to isolate specific frequencies to a smaller area. By reducing th e power of the radio, you can prevent transmissions fr om reaching beyond your corporate/home office or designated wireless are[...]
-
Seite 53
50 detect the beacons and awaken to receive the broadcast and multicast messages. The default value is 1. Valid settings are between 1 and 255. 802.11d Enable Enables 802.11d operation. 802.11d is a wireless specification for operation in additional regulatory domains. This supplement to the 802.11 specifications define s the physical layer require[...]
-
Seite 54
51 Advanced_Network UPnP UPnP is short for Universal Plug and Play, which is a networking architecture that pr ovides compatibility among networking equipment, software, and peripherals. This router ha s optional UPnP capability, and can work with other UPnP devices and software. Enable UPnP If you need to use the UPnP functionality, you can enable[...]
-
Seite 55
52 WAN Port Speed Normally, this is set to "auto". If you have trouble connecting to the WAN, try the other settings. Multicast Streams The router uses the IGMP protocol to support efficient multicasting -- transmission of identica l content, such as multimedia, from a source to a number of recipients. Enable Multicast Streams This option[...]
-
Seite 56
53 Tools The Tools tab provides the following configuration options: A dmin, Time, Syslog, Email Settings, System, Firmware, Dynamic DNS, Windows Connect Now, System Check & Schedules. Tools_Admin The Admin option is used to set a password for access to the Web -based management. By default there is no password configured. It is highl y recomme[...]
-
Seite 57
54 management interface. User Password Enter a password for the user "user" , who will have read-only access to the Web-based management interface. Gateway Name The name of the router can be changed here. Enable Remote Management Enabling Remote Management allows you to ma nage the router from anywhere on the Internet. Disabling Remote Ma[...]
-
Seite 58
55 Tools_Time The Time Configuration option allows you to configure, update, and maintain the corre ct time on the router's internal system clock. From this section you can set the time zone that you are in and set the Time Server. Daylight saving can also be configured to automatically adjust the time when needed.[...]
-
Seite 59
56 Time Configuration Current Router Time Displays the time currently maintained by the router. If this is not correct, use the follow ing options to configure the time correctly. Time Zone Select your local time zone from pull down menu. Enable Daylight Saving Check this option if your location observes daylight saving time. Daylight Saving Offset[...]
-
Seite 60
57 Tools_Syslog This section allows you to archive your log files to a Syslog Server. Enable Logging to Syslog Server Enable this option if you have a syslog server currently running on the LAN and wish to send log messages to it. Syslog Server IP Address Enter the LAN IP address of the Syslog Server.[...]
-
Seite 61
58 Tools_Email Settings The Email feature can be used to send the system log files, r outer alert messages, and firmware update notification to your email address. Enable Enable Email Notification When this option is enabled, router activity logs or firmware upgrade notifications can be emailed to a designated email address, and the following p ara[...]
-
Seite 62
59 Password Enter the password associated with t he account. V erify Password Re-type the password associated with the account. Email Log When Full or on Schedule On Log Full Select this option if you want logs to be sent by email when the log is full. On Schedule Select this option if you want logs to be sent by email according to a schedule. Sche[...]
-
Seite 63
60 Tools_System This section allows you to manage the router's configuration settings, reboot the router, and restor e the router to the factory default settings. Restoring the unit to the factory default sett ings will erase all settings, including any rules that you've created. Save Settings To Local Hard Drive This option allows you to[...]
-
Seite 64
61 Tools_Firmware The Firmware Upgrade section can be used to update to the latest firmware code to improve functionality and performance. To check for the latest firmware, click the Check Online Now button. If you would like to be notified when new firmware is released, place a checkmark in the box next to Email Notification of Newer Firmware Vers[...]
-
Seite 65
62 Firmware upgrade cannot be performed from a wireless device. T o perform an upgrade, ensure that you are using a PC that is connected to the router by wire. Some firmware upgrades reset the configuration options to the factory default s. Before performing an upgrade, be sure to save the current configuration from the T ools -> Admin screen. U[...]
-
Seite 66
63 Tools_Dynamic DNS The Dynamic DNS feature allows you to host a server (Web, FTP, Game Server, etc.) using a domain name that you have purchased (www.whateveryournam eis.com) with your dynamically assigned IP address. Most broadband Internet Service Provider s assign dynamic (changing) IP addresses. When you use a Dynamic DNS service prov ider, y[...]
-
Seite 67
64 Enter the password or key provided by your se rvice provider . If the Dynamic DNS provider supplies only a key , enter that key in all three fields. V erify Password or Key Re-type the password or key provided by your service provider . If the Dynamic DNS provider supplies only a key , enter that key in all three fields. Timeout The time between[...]
-
Seite 68
65 Tools_System Check Ping Test "Ping" is an Internet utility function that sends a series of shor t messages to a target computer and reports the results. You can use it to test whether a computer is runn ing, and to get an idea of the quality of the connection to that computer, based on the speed of the responses. Host Name or IP Addres[...]
-
Seite 69
66 Tools_Schedules Schedules can be created for use with enforcing rules. For example, if you want to restrict web access to Mon-Fri from 3pm to 8pm, you could create a schedule selecting Mon, Tue, Wed, Thu, and Fri and enter a Start Time of 3pm and End Time of 8pm. Add/Edit Schedule Rule In this section you can add entries to the Schedul e Rules L[...]
-
Seite 70
67 The end time is entered in the same format as the start time. The hour in the first box and the minutes in the second box. The end time is used for most other rules, but is not normally used for email events. Save Saves the new or edited Schedule Rule in the following list. When finished updating the Schedule Rules, you must still click the Save[...]
-
Seite 71
68 Status The Status tab provides the following configuration options: Device Info, Wireless, Routing, Logs, Statistics and Active Sessions. Status_Device info All of your Internet and network con nection deta ils are displa yed on the Devi ce Info page. T he firmware version is also displayed here. Some browsers have limitations that make it impos[...]
-
Seite 72
69[...]
-
Seite 73
70 Depending on the type of WAN connection, you can take one of the following sets of actions: DHCP Connection Clicking the DHCP Release button unassigns th e router's IP address. The router will not respond to IP messages from the WAN side until you click the DHCP Renew button or power-up the router again. Clicking the DHCP Renew button cause[...]
-
Seite 74
71 Status_Wireless The wireless section allows you to view the wireless clients that are connected to your wireless router. MAC Address The Ethernet ID (MAC address) of the wireless client. IP Address The LAN-side IP address of the client. Mode The transmission standard being used by the client. Values are 11a, 11b, or 11g for 802.11a, 802.11b, or [...]
-
Seite 75
72 Status_Routing The routing section displays all of the routing details co nfigured for your router. A value of 0.0.0.0 for gateway means there is no next hop, and the IP address is directly connected to the router on the interface specified: LAN or WAN. A value of 0.0.0.0 in both the destination IP and netmask means that this is the default rout[...]
-
Seite 76
73 Status_Logs The router automatically logs (records) events of possibl e interest in its int ernal memory. If there is not enough internal memory for all events, logs of older events are deleted, but logs of the latest events are retained. The Logs option allows you to view the router logs. You can define what types of events you want to view and[...]
-
Seite 77
74 Click this button after changing Log Options to make them effective and permanent. Refresh Clicking this button refreshes the display of log entries. There may be new events since the last time you accessed the log. Clear Clicking this button erases all log entries. Email Now If you provided email information with the T ools -> Email screen, [...]
-
Seite 78
75 Status_Statistics The Statistics page displays all of the LAN, WAN, and Wireless packet transmit and receive statistics. Sent The number of packets sent from the router. Received The number of packets received by the router. TX Packets Dropped The number of packets that were dropped while being sent, due to errors, collisio ns, or router resourc[...]
-
Seite 79
76 Errors The number of transmission failures that cause loss of a packet. A noisy radio-frequency environment can cause a high error rate on the wireless LAN.[...]
-
Seite 80
77 Status_Active Sessions The Active Sessions page displays full details of ac tive sessions through your router. A session is a conversation between a progam or application on a LAN-side computer and a program or application on a WAN-side computer. Internal The IP address and port number of the LAN-side application. Protocol The communications pro[...]
-
Seite 81
78 • SS: SYN Sent -- One of the systems is attempting to start a connection. • EST: Established -- the connection is passing data. • FW: FIN Wait -- The client system has requested that the connection be stopped. • CW: Close Wait -- the server system has requested that the connection be stopped. • TW: Time Wait -- Waiting for a short time[...]
-
Seite 82
79 Glossary A Access Control List ACL. This is a database of network devices that are allowed to access resources on t he network. Access Point AP. Device that allows wireless clients to connect to it and access the network ActiveX A Microsoft specification for the interaction of software components. Ad-hoc network Peer-to-Peer network between wire[...]
-
Seite 83
80 American Standard Code for Information Interchange. This system of characters is most commonly used for text files Attenuation The loss in strength of digital and an alog signals. The loss is greater when the signal is being transmitted over long distances. Authentication To provide credentials, like a Password, in order to verify that the perso[...]
-
Seite 84
81 A time during processes when something causes the process to slowdown or stop all together Broadband A wide band of frequencies available for transmitting data Broadcast Transmitting data in all directions at once Browser A program that allows you to access resources on the web and provides them to you graphically C Cable modem A device that all[...]
-
Seite 85
82 The second layer of the OSI model. Controls the movement of data on the physical link of a network Database Organizes information so that it can be managed updated, as well as easily accessed by users or applications. DB-25 A 25 ping male connector for attaching Exte rnal modems or RS-232 serial devices DB-9 A 9 pin connector for RS-232 connecti[...]
-
Seite 86
83 "Demilitarized Zone". A computer that logically sits in a "no-mans land" between the LAN and the WAN. The DMZ computer trades some of the protection of the router's security mechanisms for the convenience of being directly addressable from the Internet. DNS Domain Name System: Translates Domain Names to IP addresses Doma[...]
-
Seite 87
84 A way of sending data through light impulses over glass or plastic wire or fiber File server A computer on a network that stores data so that the other computers on the network can all access it File sharing Allowing data from computers on a network to be accessed by other computers on the network with different levels of access rights Firewall [...]
-
Seite 88
85 A standard that provides consistency of voice and video transmissions and compatibility for videoconferencing devices Half-duplex Data cannot be transmitted and received at the same time Hashing Transforming a string of characters into a shorter string with a predefined length Hexadecimal Characters 0-9 and A-F Hop The action of data packets bei[...]
-
Seite 89
86 Infrastructure In terms of a wireless network, this is when wire less clients use an Access Point to gain access to the network Internet A system of worldwide networks which use TCP/IP to allow for resources to be accessed from computers around the world Internet Explorer A World Wide Web browser created and provided by Microsoft Internet Protoc[...]
-
Seite 90
87 Java A programming language used to create programs and applets for web pages K Kbps Kilobits per second Kbyte Kilobyte L LAN Local Area Network Latency The amount of time that it takes a packet to get from the one point to another on a net work. Also referred to as delay LED Light Emitting Diode Legacy Older devices or technology Local Area Net[...]
-
Seite 91
88 MDIX Medium Dependent Interface Crossover, is an Ethernet port for a connection to a crossover cable MIB Management Information Base is a set of objects that can be managed by using SNMP Modem A device that Modulates digital signals from a co mputer to an analog signal in order to transmit the signal over phone lines. It also Demodulates the ana[...]
-
Seite 92
89 Network Time Protocol Used to synchronize the time of all the computers in a network NIC Network Interface Card NTP Network Time Protocol O OFDM Orthogonal Frequency-Division Multiplexing is the modulation technique for both 802.11a and 802.11g OSI Open Systems Interconnection is the reference model for how data should travel between two devices[...]
-
Seite 93
90 Port A logical channel endpoint in a netw ork. A computer might have only on e physical channel (its Ethernet channel) but can have multiple ports (l ogical channels) each identified by a number. PPP Point-to-Point Protocol is used for two computers to communicate with each over a serial interface, like a phone line PPPoE Point-to-Point Protocol[...]
-
Seite 94
91 RJ-45 The most commonly used connection method for Ethernet RS-232C The interface for serial communication between computers and other related devices RSA Algorithm used for encryption and authentication S Server A computer on a network that provides services and resources to other computers on the network Session key An encryption and decryptio[...]
-
Seite 95
92 Secure Shell is a command line interface that allows for secure connections to remote computers SSID Service Set Identifier is a name for a wireless network Stateful inspection A feature of a firewall that monitors outgoing and incoming traffic to make sure that only valid responses to outgoing requests are allowed to p ass though the firewall S[...]
-
Seite 96
93 Universal Plug and Play A standard that allows network devices to discover each other and configure themselves to be a part of the network Upgrade To install a more recent version of a software or firmware product Upload To send a request from one computer to another and have a file transmitted from the requesting computer to the other UPnP Univ[...]
-
Seite 97
94 Windows Connect Now. A Microsoft method for configuring and bootstrapping wireless networking hardware (access points) and wireless clients, in cluding PCs and other devices. WDS Wireless Distribution System. A system that enables the interconnection of access points wirelessly. Web browser A utility that allows you to view content and interact [...]
-
Seite 98
95 Y Yagi antenna A directional antenna used to concentrate wireless signals on a specif ic location Z # 1 802.11 A family of specifications for wireless lo cal area networks (WLANs) developed by a working group of the Institute of Electrical and Electronics Engineers (IEEE).[...]
-
Seite 99
TE CHNICAL SUPPORT F rom U .S.A. and C anada (2 4 hours a da y , 7 days a w eek) Phn: (800) SMC -4- Y OU / (9 49) 6 79-8000 F ax: (94 9) 6 79- 1481 ENGLISH T echnical Support inf ormation av ailable at www .smc.com FRENCH Inf ormations Support T echnique sur www .smc.c om DEUTSCH T echnischer Support und weit ere Inf ormation unter www .smc.com SP [...]