Home
SMCWEBS-N User Guide - Edge-Core
Contents
1. Disable z The following items are displayed on this page IP Setting Type By default the access point WAN port is configured with DHCP enabled After you have network access to the access point you can use the web browser interface to modify the initial IP configuration if needed Options STATIC and DHCP Default DHCP 38 CHAPTER 6 Access Point Mode Network Settings Access Point Mode LAN Setting MAC Address The shared physical layer address for the Wireless N Access Point Repeater s LAN ports Hostname The hostname of the STATIC or DHCP client IP Address Valid IP addresses consist of four decimal numbers O to 255 separated by periods The default setting is 192 168 2 10 Subnet Mask Indicate the local subnet mask Default 255 255 255 0 LLTD Link Layer Topology Discovery LLTD is a Microsoft proprietary discovery protocol which can be used for both wired and wireless networks Options Disable Enable Default Enabled UPNP Allows the device to advertise its UPnP capabilities Default Disable 39 BASIC SETTINGS ACCESS POINT MODE WIRELESS CONFIGURATION The Access Point Mode wireless settings section displays configuration settings for the access point functionality of the Wireless N Access Point Repeater It includes the following sections Basic Settings on page 40 Advanced Settings on page 44 WLAN Security on page 49
2. yp 1 al LAN Switch 4 be Server ps IP 192 168 2 x Desktop PC IP 192 168 2 x 24 INSTALLING THE ACCESS POINT REPEATER This chapter describes how to install the access point SYSTEM REQUIREMENTS You must meet the following minimum requirements LOCATION SELECTION An Internet access device DSL or Cable modem with an Ethernet port connection An up to date web browser Internet Explorer 6 0 or above or Mozilla Firefox 2 0 or above Choose a proper place for the access point repeater In general the best location is at the center of your wireless coverage area within line of sight of all wireless devices Try to place the access point in a position that can best cover its service area For optimum performance consider these guidelines Mount the access point as high as possible above any obstructions in the coverage area Avoid mounting next to or near building support columns or other obstructions that may cause reduced signal or null zones in parts of the coverage area Mount away from any signal absorbing or reflecting structures such as those containing metal The access point can be mounted on any horizontal surface or a wall De CHAPTER 3 Installing the Access Point Repeater Mounting the Device MOUNTING THE DEVICE The Wireless N Access Point Repeater can be mounted on any horizontal surface or on a wall The following sections describe the mounting opti
3. The MAC address of the connected client station IP Address The IP address assigned to the client from the IP pool Expires in The time limit for the use of the IP address from the IP pool When the time limit expires the client has to request a new IP address 65 ETHERNET CLIENT MODE WIRELESS CONFIGURATION The Ethernet Client Mode wireless settings section displays configuration options for the Wireless N Access Point Repeater to function as a wireless client for connecting to another wireless network It includes the following sections Profile on page 66 Link Status on page 72 Site Survey on page 74 Statistics on page 75 PROFILE The Station Profile page shows the settings and current operation status of the station Figure 39 Station Profile Station Profile The Status page shows the settings and current operation status ofthe Station Profile List Profile SSID Channel Authentication Encryp ption Network Type PROFOO AP 4 Auto OPEN NONE infrastructure PRoF002 aP2 a OPEN NONE Ad Hoc lO PROFOOS AP3 Auto OPEN NONE Infrastructure Add Delete Edit Activate For a selected profile in the list you can click Activate to connect to the specified network click Edit to modify the configuration details or Delete to remove the profile from the list Click Add to manually set up details for a new wireless network 66 CHA
4. Broadcast keys are sent to stations using dynamic keying Dynamic broadcast key rotation is often used to allow the access point to generate a random group key and periodically update all key management capable wireless clients Dynamic Host Configuration Protocol Provides a framework for passing configuration information to hosts on a TCP IP network DHCP is based on 96 ENCRYPTION ETHERNET FTP HTTP IEEE 802 11B IEEE 802 11G INFRASTRUCTURE LAN MAC ADDRESS NTP OPEN SYSTEM GLOSSARY the Bootstrap Protocol BOOTP adding the capability of automatic allocation of reusable network addresses and additional configuration options Data passing between the access point and clients can use encryption to protect from interception and evesdropping A popular local area data communications network which accepts transmission from computers and terminals File Transfer Protocol A TCP IP protocol used for file transfer Hypertext Transfer Protocol HTTP is a standard used to transmit and receive all data over the World Wide Web A wireless standard that supports wireless communications in the 2 4 GHz band using Direct Sequence Spread Spectrum DSSS The standard provides for data rates of 1 2 5 5 and 11 Mbps A wireless standard that supports wireless communications in the 2 4 GHz band using Orthogonal Frequency Division Multiplexing OFDM The standard provides for data rates of 6 9 12 18 24 3
5. Figure 51 Figure 52 Figure 53 Figure 54 Figure 55 Figure 56 Figure 57 WDS Configuration Enabling WPS WPS Configuration Station List LAN Configuration DHCP Setup DHCP Clients Station Profile Profile System Configuration Infrastructure Profile System Configuration Ad Hoc Add Profile Security Policy WEP Security WPA Security Station Link Status Station Site Survey Station Statistics System Management Time Zone Settings Firmware Upgrade Configuration Settings System Status Statistics System Log RJ 45 Connector Straight through Wiring Crossover Wiring 15 FIGURES 59 60 61 62 63 64 64 66 67 67 69 70 71 72 74 75 77 78 79 80 81 82 83 89 91 91 Table 1 Table 2 Table 3 Table 4 Table 5 TABLES Key Hardware Features LED Behavior WMM Access Categories LED Indicators 10 100BASE TX MDI and MDI X Port Pinouts a Ee 18 20 47 85 90 SECTION I GETTING STARTED This section provides an overview of the Wireless N Access Point Repeater and describes how to install and mount the unit It also describes the basic settings required to access the management interface and run the setup Wizard This section includes these chapters Introduction on page 18 Network Planning on page 22 Installing the Access Point Repeater on page 25 Initial Configuration on page 28 a os INTRODUCTION The Wirel
6. Idle Timeout The following items are displayed in this section on this page Security Mode Configures the 802 1X security mode used by clients When using 802 1 either with WPA WPA2 or on its own be sure there is a configured RADIUS server in the connected wired network Default Disable 802 1X WEP Selects WEP keys for data encryption When enabled WEP encryption keys are automatically generated by the RADIUS server and distributed to all connected clients Default Disable RADIUS Server Configures RADIUS server settings IP Address Specifies the IP address of the RADIUS server Port The User Datagram Protocol UDP port number used by the RADIUS server for authentication messages Range 1024 65535 Default 1812 Shared Secret A shared text string used to encrypt messages between the access point and the RADIUS server Be sure that the same text string is specified on the RADIUS server Do not use blank Spaces in the string Maximum length 20 characters Session Timeout Number of seconds the access point waits for a reply from the RADIUS server before resending a request Range 1 60 seconds Default 0 Idle Timeout Sets the maximum time in seconds of client inactivity before a session is terminated 56 CHAPTER 7 Access Point Mode Wireless Configuration Wireless Distribution System WDS ACCESS POLICY The Wireless N Access Point Repeater provides a MAC address f
7. The WDS feature enables two basic functions to be configured in the wireless network Either a repeater function that extends the range of the wireless network or a bridge function that connects a remote LAN segment to an Internet connection Figure 5 Operating as a Wireless Bridge Wired Network WDS Link z lt 75T a gt es Access Point od Access Point NE Repeater JE Repeater f gt p p 3 w WN ss L Desktop PCs a Desktop PCs hes Figure 6 Operating as a Wireless Repeater Wired Network S Access Point Repeater z Access Point 6 z Repeater N s NOU Notebook PC TN Ss e s a i T b WP aT pre TNS Se a a a a es ES Aea oo a a a a a Notebook PC T 23 CHAPTER 2 Network Planning Wireless Client WIRELESS CLIENT The Wireless N Access Point Repeater can operate as a wireless client on one SSID interface which enables a connection to another Wi Fi network When the wireless client option is enabled the client SSID interface functions as an external gateway WAN port When the wireless client option is enabled as a LAN connection the other SSID interface and LAN ports all function as the local network within the same IP subnet Figure 7 Operating as a Wireless Client Internet Service Provider IN Cp sven le AN aN otk wnireles S Crem a new gt a PC qP ro om lt lt port IP 192 168 2 x
8. 15 2 TxStream 32 and auto 33 Default Auto Reverse Direction Grant RDG When Reverse Direction Grant is enabled the Wireless N Access Point Repeater can reduce the transmitted data packet collision by using the reverse direction protocol During TXOP Transmission Opportunity period the receiver could use remaining transmission time to transmit data to a sender The RDG improves transmission performance and scalability in a wireless environment Default Enabled Aggregate MSDU A MSDU This option enables Mac Service Data Unit MSDU aggregation Default Disable Auto Block ACK Select to block ACK Acknowledge Number or not during data transferring Default Enabled 43 CHAPTER 7 Access Point Mode Wireless Configuration Advanced Settings Decline BA Request Select to reject peer BA Request or not Default Disable ADVANCED SETTINGS The Advanced Settings page includes additional parameters concerning the wireless network and Wi Fi Multimedia settings Gi NoTE There are several variables to consider when selecting a radio mode that make it fully functional Simply selecting the mode you want is not enough to ensure full compatibility for that mode Information on these variables may be found in the HT Physcial Mode Setting section ADVANCED WIRELESS The Advanced Wireless section on the Wireless Settings Advanced page includes additional radio parameters Figure 20 Advanced Wireless
9. 42 CHAPTER 7 Access Point Mode Wireless Configuration Basic Settings HT PHYSICAL MODE The HT Physical Mode section on the Wireless Settings Advanced page includes additional parameters for 802 11n operation SETTINGS Figure 19 HT Physical Mode Settings HT Physical Mode Channel Bandwidth 20 O 20 40 Guard Interval OLong Auto MCS Reverse Direction Grant RDG Disable Enable Aggregation MSDU 4 MSDU Disable Enable Auto Block ACK Disable Enable Decline BA Request Disable Enable a The following items are displayed in this section on this page Channel Bandwidth The Wireless N Access Point Repeater provides a channel bandwidth of 40 MHz by default giving an 802 11g connection speed of 108 Mbps sometimes referred to as Turbo Mode and a 802 11n connection speed of up to 150 Mbps Setting the HT Channel Bandwidth to 20 MHz slows connection speed for 802 11g and 802 11n to 54 Mbps and 74 Mbps respectively and ensures backward compliance for slower 802 11b devices Default 20MHz Guard Interval The guard interval between symbols helps receivers overcome the effects of multipath delays When you add a guard time the back portion of useful signal time is copied and appended to the front Default Auto MCS The Modulation and Coding Scheme MCS is a value that determines the modulation coding and number of spatial channels Options value range O 7 1 Tx Stream 8
10. Before Contacting Technical Support Then use the default user name admin and password smcadmin to access the management interface 3 If all other recovery measure fail and the Access Point Repeater is still not functioning properly take any of these steps Reset the Access Point Repeater s hardware using the web interface or through a power reset 86 PORT INTERFACES AC POWER ADAPTER LED INDICATORS NETWORK MANAGEMENT TEMPERATURE HUMIDITY PHYSICAL SIZE WEIGHT RADIO EMC SAR HARDWARE SPECIFICATIONS LAN 1 4 1 10 100BASE TX port RJ 45 connector auto MDI X 100 ohm UTP cable Category 5 or better Input 100 240 VAC 50 60 Hz Output 5V 1A Power WLAN Wireless Local Area Network WPS Wi Fi Protected Setup LAN 1 4 Local Area Network Web browser Operating 0 to 40 C 32 to 104 F Storage 20 to 70 C 32 to 158 F 20 to 85 non condensing 136 X 90 8 X 28 5 mm 157 g 5 54 oz FCC Part 15C Section 15 247 EN 301 489 1 V1 8 1 2008 04 EN 301 489 17 V1 3 2 2008 04 LPOOO2 FCC Part 15B EN 55022 2006 A1 2007 EN 55024 1998 A1 2001 A2 2003 FCC IEEE C95 1 EN 50385 2002 OF APPENDIX B Hardware Specifications SAFETY EN 60950 1 2006 ENVIRONMENTAL ETSI EN 300 019 2 1 Class 1 2 Storage ETSI EN 300 019 2 2 Class 2 3 Packaged ETSI EN 300 019 2 3 Class 3 2 Operating 88 CABLES AND PINOUTS TWISTED PAIR CABLE A
11. Settings Advanced Wireless Settings The Advance Wireless Setting page is available to make detailed changes to the wireless configuration It includes items that are not available from the Basic Wireless Settings page such as DTIM Tx Power WMM and more Advanced Wireless BG Protection Mode Beacon Interval 100 ms range 20 999 default 100 Data Beacon Rate DTIM 4 ms range 1 255 default 1 Fragment Threshold 2346 range 256 2346 default 2346 RTS Threshold 2347 range 1 2347 default 2347 TX Power 100 range 1 100 default 100 Short Preamble Enable Disable Short Slot Enable Disab Tx Burst Enable Disable Packet Aggregate Enable Disable 44 CHAPTER 7 Access Point Mode Wireless Configuration Advanced Settings The following items are displayed in this section on this page BG Protection Mode Enables a backward compatible protection mechanism for 802 11b clients There are three modes Default Auto Auto The unit enables its protection mechanism for 802 11b clients when they are detected in the network When 802 11b clients are not detected the protection mechanism is disabled On Forces the unit to always use protection for 802 11b clients whether they are detected in the network or not Note that enabling b g Protection can slow throughput for 802 11g n clients by as much as 50 Off Forces the unit to neve
12. Wireless Distribution System WDS on page 57 Wi Fi Protected Setup WPS on page 60 Station List on page 62 The IEEE 802 11n interface includes configuration options for radio signal characteristics and wireless security features The Wireless N Access Point Repeater s radio can operate in six modes mixed 802 11b g n mixed 802 11b g mixed 802 11g n 802 11n only 802 11b only or 802 11g only Note that 802 11g is backward compatible with 802 11b and 802 11n is backward compatible with 802 11b g at slower data transmit rates The Wireless N Access Point Repeater supports four virtual access point VAP interfaces One VAP is the primary Network Name SSID and the the others are referred to as Multiple SSID1 SSID3 Each VAP functions aS a separate access point and can be configured with its own Service Set Identification SSID and security settings However most radio signal parameters apply to all VAP interfaces Traffic to specific VAPs can be segregated based on user groups or application traffic All VAPs can have up to 64 wireless clients whereby the clients associate with these VAPs the same as they would with a physical access point NoTE The radio channel settings for the access point are limited by local regulations which determine the number of channels that are available A0 CHAPTER 7 Access Point Mode Wireless Configuration Basic Settings The Basic Settings page allows
13. compatible clients Default Enabled WI FI MULTIMEDIA The Wireless N Access Point Repeater implements Quality of Service QoS using the Wi Fi Multimedia WMM standard Using WMM the access point is able to prioritize traffic and optimize performance when multiple applications compete for wireless network bandwidth at the same time WMM employs techniques that are a subset of the developing IEEE 802 11e QoS standard and it enables access points to interoperate with both WMM enabled clients and other devices that may lack any WMM functionality 46 CHAPTER 7 Access Point Mode Wireless Configuration Advanced Settings WMM defines four access categories ACs voice video best effort and background These categories correspond to traffic priority levels and are mapped to IEEE 802 1D priority tags see Table 3 The direct mapping of the four ACs to 802 1D priorities is specifically intended to facilitate interoperability with other wired network QoS policies While the four ACs are specified for specific types of traffic WMM allows the priority levels to be configured to match any network wide QoS policy WMM also specifies a protocol that access points can use to communicate the configured traffic priority levels to QoS enabled wireless clients Table 3 WMM Access Categories Access WMM Description 802 1D Category Designation Tags AC_VO AC3 Voice Highest priority minimum delay Time sensitive 7 6 data such as VoIP Voice
14. comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications This transmitter must not be co located or operating in conjunction with any other antenna or transmitter However there is no guarantee that interference will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference by one of the following measures Reorient or relocate the receiving antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device may not cause harmful interference and 2 this device must accept any interference received including interference that may cause undesired operation FCC Caution Any changes or modifications not expressly approved by
15. contradict the conditions of this License they do not excuse you from the conditions of this License If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations then as a consequence you may not distribute the Program at all For example if a patent license would not permit royalty free redistribution of the Program by all those who receive copies directly or indirectly through you then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program If any portion of this section is held invalid or unenforceable under any particular circumstance the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims this section has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system it is up to the author donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice This section is intended to make thoroughly clear what
16. for the medium may not be aware of each other The RTS CTS mechanism can solve this Hidden Node Problem Range 0 2347 bytes Fragment Threshold Configures the minimum packet size that can be fragmented when passing through the access point Fragmentation of the PDUs Package Data Unit can increase the reliability of transmissions because it increases the probability of a successful transmission due to smaller frame size If there is significant interference present or collisions due to high network utilization try setting the fragment size to send smaller fragments This will speed up the retransmission of smaller frames However it is more efficient to set the fragment size larger if very little or no interference is present because it requires overhead to send multiple frames Range 256 2346 bytes Default 2346 bytes 68 CHAPTER 9 Ethernet Client Mode Wireless Configuration Profile SECURITY POLICY Configures authentication and encryption to match the security of the wireless network For an infrastructure network four security modes are Supported including Open Shared WPA Personal and WPA2 Personal For an ad hoc network Open Shared and WPA NONE modes are supported Figure 42 Add Profile Security Policy Securty Policy Security Mode WPA Personal WPA2 Personal The following items are available for the Security Mode Open Open system authentication accepts any client attempting to connec
17. has to request a new IP address The lease time is expressed in weeks days or hours Options Forever Two weeks One week Two days One day Half day Two hours One hour Half hour Default One week DHCP CLIENTS SETTING The DHCP Clients page displays information on connected client stations that have been assigned IP addresses from the DHCP address pool Figure 38 DHCP Clients DHCP Client List ADHGCP client listis displayed in this section DHCP Clients Hosiname MAC Address IF Address i ai in T le da hs j amm I ys Raymond VAIO NB 00 1D BA F8 27 59 192 168 2100 53 65 93 ae 2358 39 x L J i T E EOE TE ES 6 days incl Wang NB 1 00 15 65 8C 68 C 192 166 2701 L EEEE E 17 days minglin lee NB OO TESCO 56 F AF 192 166 2102 Pips 00 00 00 IL IL IL p CHAPTER 8 Ethernet Client Mode Network Settings DHCP Clients Setting The following items are displayed on this page Host name The name of the connected client station MAC Address
18. informaci n relativa a servicios de soporte t cnico Francais Informations Support Technique sur www smc com Portugu s Informa es sobre Suporte T cnico em www smc com Italiano Le informazioni di supporto tecnico sono disponibili su www smc com Svenska Information om Teknisk Support finns tillgangligt pa www smc com Nederlands Technische ondersteuningsinformatie beschikbaar op www smc com Polski Informacje o wsparciu technicznym sa dostepne na www smc com e tina Technicka podpora je dostupna na www smc com Magyar M szaki tamogat informacio elerhet on www smc com fay 48 FA SC ARLA A i et www smc pre come if SBS PC aot ee BAAR FS a www smcnetworks com tw Tna MNIIAMIVONANWMuULNAtA la Www smc asia com ek 0 J eaa SAS wwwsmc asia comS 2 DHAID B amp L CH INTERNET E mail address www smc com Support By email Driver updates www smc com Support Downloads World Wide Web http www smc com SMCWEBS N
19. on devices that need to join the network PBC This has the same effect as pressing the physical WPS button that is located on the front of the Wireless N Access Point Repeater After checking this option and clicking Apply you have up to two minutes to activate WPS on devices that need to join the network STATION LIST Displays the station information which associated to this Wireless N Access Point Repeater Figure 35 Station List Station List This section allows you to view the stations that have associated with this device Wireless Network WAC Address Ai PSM MimoPS MCS BW SGI STEC 62 ETHERNET CLIENT MODE NETWORK SETTINGS The Ethernet Client Mode Network Settings pages allow you to manage basic system configuration settings ETHERNET CLIENT MODE LAN SETTINGS The Wireless N Access Point Repeater must have a valid IP address for management using a web browser and to support other features The unit has a default IP address of 192 168 2 10 You can use this IP address or assign another address that is compatible with your existing local network Click on Network Settings followed by LAN LAN SETUP Figure 36 LAN Configuration Local Area Network LAN Settings This section is provided to configure LAN settings like DHCP and other networking features LAN Setup WAC Address 00 22 ADAT TBE DC Hostname SMCWEBS N IP Address 192 168 2 10 Subnet Mask 2
20. options are TKIP and AES TKIP Use Temporal Key Integrity Protocol TKIP keys for encryption WPA specifies TKIP as the data encryption method to replace WEP TKIP avoids the problems of WEP static keys by dynamically changing data encryption keys AES Use Advanced Encryption Standard AES keys for encryption AES AES CCMP provides extremely robust data confidentiality using a 128 bit key and is specified as a standard requirement for WPA2 Before implementing WPA2 in the network be sure client devices are upgraded to WPA2 compliant hardware Pass Phrase The WPA pre shared Key can be entered as an ASCII string an easy to remember form of letters and numbers that can include spaces or Hexadecimal format Range 8 63 ASCII characters or exactly 64 Hexadecimal digits 71 CHAPTER 9 Ethernet Client Mode Wireless Configuration Link Status LINK STATUS The Link Status page displays the current status of the connection to the wireless network Figure 45 Station Link Status Station Link Status The Status page shows the settings and current operation status of the Station Status SMC_VAP_G 0 lt gt 00 13 F7 DC F7 58 Extra info Link is Up 1 gt 2412000 KHz Central Channel 1 Link Speed Tx Mbps 54 0 Rx Mbps 1 0 Throughput Tx Kbps 0 0 Rx Kbps 91 5 Link Quality Good 86 Signal Strength 1 Normal 52 Signal Strength 2 Normal 67 dBm format Signal Strength 3 Weak 34 Noise Leve
21. point A shared key can be used to authenticate each client attached to a wireless network Shared Key authentication must be used along with the 802 11 Wireless Equivalent Privacy algorithm Simple Network Time Protocol SNTP allows a device to set its internal clock based on periodic updates from a Network Time Protocol NTP server Updates can be requested from a specific NTP server or can be received via broadcasts sent by NTP servers Temporal Key Integrity Protocol A data encryption method designed as a replacement for WEP TKIP avoids the problems of WEP static keys by dynamically changing data encryption keys Trivial File Transfer Protocol A TCP IP protocol commonly used for software downloads Virtual Access Point Virtual AP technology multiplies the number of Access Points present within the RF footprint of a single physical access device With Virtual AP technology WLAN users within the device s footprint can associate with what appears to be different access points and their associated network services All the services are delivered using a single radio channel enabling Virtual AP technology to optimize the use of limited WLAN radio spectrum WPA employs 802 1X as its basic framework for user authentication and dynamic key management to provide an enhanced security solution for 802 11 wireless networks Wired Equivalent Privacy WEP is based on the use of security keys and the popular RC4 encryption algorithm Wirele
22. q LAN Tx bytes 1699698 Name lo Rx Packet lo Rx Byte lo Tx Facket lo Tx Byte o Name a Rx Facket 1209 Rx Byte 139192 Tx Facket 2765 Tx Byte 1750415 The following items are displayed on this page Memory total The total memory of this Wireless N Access Point Repeater Memory left The available memory of this Wireless N Access Point Repeater All Interfaces Displays the interface on which traffic is being monitored Rx packets Displays the total number of packets received by the specified interface Rx bytes Displays the total number of bytes transmitted by the specified interface Tx packets Displays the total number of packets transmitted by the specified interfaces OF s SYSTEM LOG CHAPTER 10 Administration Settings System Log Tx bytes Displays the total number of bytes transmitted by the specified interface The Wireless N Access Point Repeater supports a logging process that controls error messages saved to memory or sent to a Syslog server The logged messages serve as a valuable tool for isolating Wireless N Access Point Repeater and network problems The System Log page displays the latest messages logged in chronological order from the newest to the oldest Log messages saved in the Wireless N Access Point Repeater s memory are erased when the device is rebooted Figure 54 System Log System Log This section provid
23. the management interface using a web browser to enable the radio LAN LEDs are off Verify that the Access Point Repeater is powered on when port connected Be sure cables are plugged into both the Access Point Repeater and corresponding PC Verify that the proper cable type is used and its length does not exceed specified limits Check the cable connections for possible defects Replace the defective cable if necessary BEFORE CONTACTING TECHNICAL SUPPORT Check the following items before you contact local Technical Support 1 If the Access Point Repeater cannot be configured using a web browser Be sure to have configured the Access Point Repeater with a valid IP address subnet mask and default gateway Check that you have a valid network connection to the Access Point Repeater and that the Ethernet port or the wireless interface that you are using has not been disabled If you are connecting to the Access Point Repeater through the wired Ethernet interface check the network cabling between the management station and the Access Point Repeater If you are connecting to Access Point Repeater from a wireless client ensure that you have a valid connection to the Access Point Repeater 2 If you forgot or lost the password Set the Access Point Repeater to its default configuration by pressing the reset button on the back panel for 5 seconds or more 85 APPENDIX A Troubleshooting
24. 22 2D 81 86 DC Hostname SMCWEBS N LAN IP Address 192 168 2 10 su bnet Mask 255 255 255 0 The following items are displayed on this page System Info Displays the basic system information Firmware Version The version number of the current Wireless N Access Point Repeater software System Time Length of time the management agent has been up specified in hours and minutes Operation Mode The current operation mode LAN Configurations Displays the basic WAN information Connected Type Displays the WAN connected mode MAC Address The shared physical layer address for the Wireless N Access Point Repeater s LAN ports Hostname The hostname of the STATIC or DHCP client LAN IP Address Valid IP addresses consist of four decimal numbers 0 to 255 separated by periods The default setting is 192 168 2 10 Subnet Mask The mask that identifies the host address bits used for routing to the WAN port OF CHAPTER 10 Administration Settings Statistics STATISTICS The Wireless N Access Point Repeater Traffic Statistics Interfaces window displays received and transmitted packet statistics for all interfaces on the Wireless N Access Point Repeater Figure 53 Statistics Statistics This section displays various status information of the device Memory total M3728KB Memory left 1660 kB LAN Rx packets 1502 LAN Rx bytes 156459 LAN Tx packets 241
25. 3 page of the Wizard configures the wireless network name and SECURITY security options Figure 13 Wizard Step 3 Wireless Security and Encryption Settings Wireless Securty and Encryption Settings Setup Wizard z The Wireless Security and Encryption Settings page allows you to make detailed security configurations to prevent unauthorized access and monitoring select SSD ssip Choice SMC SMC Access Policy Poncy Disable m aaa a staton mac Lo E sgj s CHAPTER 4 Initial Configuration Setup Wizard The following items are displayed on this page SSID Choice The name of the wireless network service provided by the Wireless N Access Point Repeater Clients that want to connect to the network must set their SSID to the same as that of the Wireless N Access Point Repeater Default SMC Security Mode Specifies the security mode for the SSID Select the security method and then configure the required parameters For more information see WLAN Security on page 49 Options Disabled Open Shared WEP AUTO WPA PSK WPA2 PSK WPA PSK_WPA2 PSK WPA WPA2 WPA1_WPA2 802 1X Default Disable NoTE To keep your wireless network protected and secure you should implement the highest security possible For small networks it is recommended to select WPA2 PSK using AES encryption as the most secure option However if you have older wireless devices in the network that do not support AES
26. 55 255 255 0 The following items are displayed on this page MAC Address The shared physical layer address for the Wireless N Access Point Repeater s LAN ports Hostname The hostname of the STATIC or DHCP client IP Address Valid IP addresses consist of four decimal numbers 0 to 255 separated by periods The default setting is 192 168 2 10 Subnet Mask Indicate the local subnet mask Default 255 255 255 0 63 CHAPTER 8 Ethernet Client Mode Network Settings DHCP Clients Setting DHCP SETUP Figure 37 DHCP Setup DHCP Setup DHCP sever Enable Start IP Address 192 168 2 100 End IP Address 197 166 2199 Lease Time One week a The following items are displayed on this page DHCP Server Enable this feature to assign IP settings to wired and wireless clients connected to the Wireless N Access Point Repeater The IP address subnet mask default gateway and Domain Name Server DNS address are dynamically assigned to clients Options Enable Disable Default Enable Start End IP Address Specify the start and end IP addresses of a range that the DHCP server can allocate to DHCP clients Note that the address pool range is always in the same subnet as the unit s IP setting The maximum clients that the unit can support is 253 Lease Time Select a time limit for the use of an IP address from the IP pool When the time limit expires the client
27. 6 48 54 Mbps IEEE 802 11g is also backward compatible with IEEE 802 11b An integrated wireless and wired LAN is called an infrastructure configuration Local Area Network A group of interconnected computers and support devices The physical layer address used to uniquely identify network nodes Network Time Protocol NTP provides the mechanisms to synchronize time across the network The time servers operate in a hierarchical master Slave configuration in order to synchronize local clocks within the subnet and to national time standards via wire or radio A security option which broadcasts a beacon signal including the access point s configured SSID Wireless clients can read the SSID from the beacon and automatically reset their SSID to allow immediate connection to the nearest access point 97 ODFM SSID SESSION KEY SHARED KEY SNTP TKIP TFTP VAP Wi Fi PROTECTED ACCESS WEP GLOSSARY Orthogonal Frequency Division Multiplexing OFDM allows multiple users to transmit in an allocated band by dividing the bandwidth into many narrow bandwidth carriers Service Set Identifier An identifier that is attached to packets sent over the wireless LAN and functions as a password for joining a particular radio cell i e Basic Service Set BSS Session keys are unique to each client and are used to authenticate a client connection and correlate traffic passing between a specific client and the access
28. 999 5 EG Wien Greek ue Tnv Tapouoa Manufacturer SnAwve oTi radio LAN device CUUUOPMUWVETAI TpOO TIO EA nVvIk OQUOIWOEIO ATIAITNOEIO KAI TIO AOITTEO OXETIKEO OIATACEIO THO OONyIaG 1999 5 Ek Hungarian Alul rott Manufacturer nyilatkozom hogy a Radio LAN device megfelel a vonatkoz Magyar alapveto k vetelm nyeknek s az 1999 5 EC ir nyelv egy b eldirasainak Italian Con la presente Manufacturer dichiara che questo Radio LAN device conforme ai Italiano requisiti essenziali ed alle altre disposizioni pertinenti stabilite dalla direttiva 1999 5 CE Latvian Ar So Manufacturer deklar ka Radio LAN device atbilst Direktivas 1999 5 EK butiskajam Latviski prasibam un citiem ar to saistitajiem noteikumiem Lithuanian Siuo Manufacturer deklaruoja kad Sis Radio LAN device atitinka esminius reikalavimus ir Lietuvi kitas 1999 5 EB Direktyvos nuostatas Maltese Hawnhekk Manufacturer jiddikjara li dan Radio LAN device jikkonforma mal ti ijiet Malti essenzjali u ma provvedimenti o rajn relevanti li hemm fid Dirrettiva 1999 5 EC Spanish Por medio de la presente Manufacturer declara que el Radio LAN device cumple con los Espa ol requisitos esenciales y cualesquiera otras disposiciones aplicables o exigibles de la Directiva 1999 5 CE Polish Niniejszym Manufacturer o wiadcza e Radio LAN device jest zgodny z zasadniczymi Polski wymogami oraz pozosta ymi stosownymi postanowieniami Dyrektywy 1999 5 EC Portuguese Manufacturer d
29. A ERE BER REM at a ZR eS SPREE TAT gt Or EA EIE a E BRS NADAS Be E SRELE PTE RIE Ba TVR BIRA E ESNE ERMER HEN ABE ARA TS E ZAMSH EAEE HER TEAR A AE gt PRR SRE PR ER E fE o BIRRA ERA NS I ig LSS gt P R H EE EERI L FHE o EC CONFORMANCE DECLARATION C The contact for SMC products in Europe is SMC Networks Europe C Fructuos Gelabert 6 8 22 28 Edificio Conata II 08970 Sant Joan Despi Barcelona Spain Marking by the above symbol indicates compliance with the Essential Requirements of the R amp TTE Directive of the European Union 1999 5 EC This equipment meets the following conformance standards EN 60950 1 2006 IEC 60950 1 Product Safety EN 55022 2006 A1 2007 Class B ITE EMC EN 55024 1998 A1 2001 A2 2003 ITE EMC EN 300 328 V1 7 1 2006 10 Technical requirements for 2 4 GHz radio equipment COMPLIANCES EN 301 489 1 V1 8 1 2008 04 EMC requirements for radio equipment EN 301 489 17 V1 3 2 2008 04 EMC requirements for radio equipment 50385 2002 Country specific SAR requirements This device is intended for use in the following European Community and EFTA countries Austria Belgium Bulgaria Cyprus Czech Republic Denmark Estonia Finland France Germany Greece Hungary Iceland Ireland Italy Latvia Lithuania Luxembourg Mal
30. Figure 1 Figure 2 Figure 3 Figure 4 Figure 5 Figure 6 Figure 7 Figure 8 Figure 9 Figure 10 Figure 11 Figure 12 Figure 13 Figure 14 Figure 15 Figure 16 Figure 17 Figure 18 Figure 19 Figure 20 Figure 21 Figure 22 Figure 23 Figure 24 Figure 25 Figure 26 Figure 27 Figure 28 Figure 29 Figure 30 Figure 31 FIGURES Top Panel Rear Panel LEDs Operating as an Access Point Operating as a Wireless Bridge Operating as a Wireless Repeater Operating as a Wireless Client Wall Mounting Login Page Home Page Wizard Step 1 Language Selection Wizard Step 2 Time and SNTP Settings Wizard Step 3 Wireless Security and Encryption Settings Login Page Home Page Operation Mode LAN Configuration Basic Settings HT Physical Mode Settings Advanced Wireless Settings Wi Fi Multimedia Settings WMM Configuration Multicast to Unicast Converter Security Mode Options Security Mode WEP Security Mode WPA PSK Security Mode WPA Security Mode 802 1X Access Policy Manual WDS MAC Address Configuration WDS Configuration Example Ja 19 20 20 22 23 23 24 26 29 29 30 31 31 35 36 37 38 41 43 44 47 48 49 50 51 52 54 56 57 58 58 Figure 32 Figure 33 Figure 34 Figure 35 Figure 36 Figure 37 Figure 38 Figure 39 Figure 40 Figure 41 Figure 42 Figure 43 Figure 44 Figure 45 Figure 46 Figure 47 Figure 48 Figure 49 Figure 50
31. MM Parameters Click the WMM Configuration button to set detailed WMM parameters Figure 22 WMM Configuration WMM Parameters of Access Point CWMin CVWMax Txop ACM AckPolicy Oh Oo ol o ol oa ol o CWMin CWMax Txop 15 e 0 1023 r w 4 i i ar The following items are displayed in the WMM Configuration window AIFSN Arbitration Inter Frame Space The minimum amount of wait time before the next data transmission attempt Specify the AIFS value in the range 0 15 microseconds e CWMin Minimum Contention Window The initial upper limit of the random backoff wait time before wireless medium access can be attempted The initial wait time is a random value between zero and the CWMin value Specify the CWMin value in the range 0 15 microseconds Note that the CWMin value must be equal or less than the CWMax value CWMax Maximum Contention Window The maximum upper limit of the random backoff wait time before wireless medium access can be attempted The contention window is doubled after each detected collision up to the CWMax value Specify the CWMax value in the range 0 15 microseconds Note that the CWMax value must be greater or equal to the CWMin value Txop Transmit Opportunity Limit The maximum time an AC transmit queue has access to the wireless medium When an AC queue is granted a transmit opportunity it can transmit data for a time up to the TxOpLimit This data
32. ONFIGURATION SETTINGS The Configuration Setting page allows you to save the Wireless N Access Point Repeater s current configuration or restore a previously saved configuration back to the device Figure 51 Configuration Settings Settings Management In this section you will be able to export or load a configuration file and reset settings to factory default Export Settings Export Configuration File Export Import Settings Load Factory Defaults Restore settings to factory default Load Default The following items are displayed on this page Export Settings Saves the current configuration to a file locally Import Settings Allows the user to load previously saved configuration files from a local source Load Factory Defaults Restores the factory defaults 80 CHAPTER 10 Administration Settings System Status SYSTEM STATUS The System Information page displays basic system information and the displayed settings are for status information only and are not configurable on this page This information is split into the three sections that follow Figure 52 System Status Displays the status ofthe device System Info Firmware Version V0 0 0 9 Feb 11 2010 System Time Fri 19 Mar 2070 11 51 01 Operation Mode Access Point LAN Configurations MAC Address 00
33. PTER 9 Ethernet Client Mode Wireless Configuration Profile PROFILE The profile settings page allows you to configure and save wireless settings CONFIGURATION for a specific wireless network connection Figure 40 Profile System Configuration Infrastructure Profi Name Profile 001 ssi Network Type Infrastructure CAM Constantly Awake Mode Power Saving Mode Power saving Mode RTS Threshold 247 Fragment Threshold Figure 41 Profile System Configuration Ad Hoc System Configuration Network Tye 802 11 Ad Hoc Channel k 11B Preamble Type Auto MP RTS Threshold E Used 2347 Fragment Threshold E used 2346 To Add a profile click the Add button and configure the following displayed items Profile Name A name that identifies the profile 0 32 ASCII characters are allowed no spaces can be used SSID The name of the wireless network to which the client will connect Network Type The type of wireless network Default Infrastructure Infrastructure An integrated wireless and wired LAN Select Infrastructure to associate to an AP Ge CHAPTER 9 Ethernet Client Mode Wireless Configuration Profile 802 11 Ad hoc A group of wireless devices connected as an independent wireless LAN Select Ad hoc to associate to a peer computer Power Saving Mode Only available when Infrastructure is selected as the network type CAM Constan
34. SMC Networks USER GUIDE 300Mbps Wireless N Access Point Repeater SMCWEBS N SMCWEBS N User Guide Networks SMC Networks U S A 20 Mason Irvine CA 92618 Phone 949 679 8000 SMC Networks Europe C Fructuos Gelabert 6 8 22 2a Edificio Conata Il 08970 Sant Joan Despi Barcelona Spain Phone 34 93 477 4920 March 2010 Pub 149100000065W E032010 AP RO2 Information furnished by SMC Networks Inc SMC is believed to be accurate and reliable However no responsibility is assumed by SMC for its use nor for any infringements of patents or other rights of third parties which may result from its use No license is granted by implication or otherwise under any patent or patent rights of SMC SMC reserves the right to change specifications at any time without notice Copyright 2010 by SMC Networks Inc 20 Mason Irvine CA 92618 All rights reserved Trademarks SMC is a registered trademark and Barricade EZ Switch TigerStack TigerSwitch and TigerAccess are trademarks of SMC Networks Inc Other product and company names are trademarks or registered trademarks of their respective holders WARRANTY AND PRODUCT REGISTRATION To register SMC products and to review the detailed warranty statement please refer to the Support Section of the SMC Website at http www smc com COMPLIANCES FEDERAL COMMUNICATION COMMISSION INTERFERENCE STATEMENT This equipment has been tested and found to
35. SSIGNMENTS For 10 100BASE TX connections a twisted pair cable must have two pairs of wires For 1OOOBASE T connections the twisted pair cable must have four pairs of wires Each wire pair is identified by two different colors For example one wire might be green and the other green with white stripes Also an RJ 45 connector must be attached to both ends of the cable NoTE Each wire pair must be attached to the RJ 45 connectors in a specific orientation CAUTION DO NOT plug a phone jack connector into the RJ 45 port Use only twisted pair cables with RJ 45 connectors that conform with FCC standards The following figure illustrates how the pins on the RJ 45 connector are numbered Be sure to hold the connectors in the same orientation when attaching the wires to the pins Figure 55 RJ 45 Connector po APPENDIX C Cables and Pinouts 10 100BASE TX Pin Assignments 10 100BASE TX PIN ASSIGNMENTS Use unshielded twisted pair UTP or shielded twisted pair STP cable for RJ 45 connections 100 ohm Category 3 or better cable for 10 Mbps connections Also be sure that the length of any twisted pair connection does not exceed 100 meters 328 feet The RJ 45 port on the access point supports automatic MDI MDI X operation so you can use straight through or crossover cables for all network connections to PCs switches or hubs In straight through cable pins 1 2 3 and 6 at one end of the cable are conn
36. T Physical Mode Settings Advanced Settings Advanced Wireless Wi Fi Multimedia Multicast to Unicast Converter WLAN Security Wired Equivalent Privacy WEP WPA Pre Shared Key WPA Enterprise Mode IEEE 802 1X and RADIUS Access Policy Wireless Distribution System WDS Wi Fi Protected Setup WPS Station List 11 CONTENTS 26 27 28 28 29 30 30 30 31 31 32 33 34 35 37 38 38 40 40 43 44 44 46 49 49 51 52 53 55 57 57 60 62 SECTION Ill 8 ETHERNET CLIENT MODE NETWORK SETTINGS 10 Ethernet Client Mode LAN Settings LAN Setup DHCP Setup DHCP Clients Setting ETHERNET CLIENT MODE WIRELESS CONFIGURATION Profile Profile Configuration Security Policy WEP Shard Key Security WPA WPA2 Personal Security Link Status Site Survey Statistics ADMINISTRATION SETTINGS System Management Firmware Upgrade Configuration Settings System Status Statistics System Log APPENDICES TROUBLESHOOTING Diagnosing LED Indicators Before Contacting Technical Support HARDWARE SPECIFICATIONS CABLES AND PINOUTS Twisted Pair Cable Assignments 10 100BASE TX Pin Assignments Straight Through Wiring Crossover Wiring LICENSE INFORMATION 12 CONTENTS 63 63 63 64 64 66 66 67 69 70 71 72 74 75 77 77 79 80 81 82 83 84 85 85 85 87 89 89 90 90 91 92 The GNU General Public License GLOSSARY INDEX 13 CONTENTS 92 96 100
37. THER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES END OF TERMS AND CONDITIONS 95 10BASE T 100BASE TX 1000BASE T ACCESS POINT AES AUTHENTICATION BACKBONE BEACON BROADCAST KEY DHCP GLOSSARY IEEE 802 3 2005 specification for 10 Mbps Ethernet over two pairs of Category 3 or better UTP cable IEEE 802 3 2005 specification for 100 Mbps Fast Ethernet over two pairs of Category 5 or better UTP cable IEEE 802 3ab specification for 1000 Mbps Gigabit Ethernet over four pairs of Category 5 or better UTP cable An internetworking device that seamlessly connects wired and wireless networks Access points attached to a wired network support the creation of multiple radio cells that enable roaming throughout a facility Advanced Encryption Standard An encryption algorithm that implements symmetric key cryptography AES provides very strong encryption using a completely different ciphering algorithm to TKIP and WEP The process to verify the identity of a client requesting network access IEEE 802 11 specifies two forms of authentication open system and Shared key The core infrastructure of a network The portion of the network that transports information from one central location to another central location where it is unloaded onto a local system A signal periodically transmitted from the access point that is used to identify the service set and to maintain contact with wireless clients
38. The Wireless N Access Point RepeaterWireless N Access Point Repeater offers a user friendly web based management interface for the configuration of all the unit s features Any PC directly attached to the unit can access the management interface using a web browser such as Internet Explorer version 6 0 or above CONNECTING TO THE LOGIN PAGE It is recommended to make initial configuration changes by connecting a PC directly to one of the Wireless N Access Point Repeater s LAN ports The Wireless N Access Point Repeater has a default IP address of 192 168 2 10 and a subnet mask of 255 255 255 0 You must set your PC IP address to be on the same subnet as the Access Point Repeater that is the PC and Access Point Repeater addresses must both start 192 168 2 x To access the Wireless N Access Point Repeater s management interface follow these steps 1 Use your web browser to connect to the management interface using the default IP address of 192 168 2 10 2 Log into the interface by entering the default username admin and password smcadmin then click Login NoTE It is strongly recommended to change the default user name and password the first time you access the web interface For information on changing user names and passwords See System Management on page 77 9S 2 CHAPTER 4 Initial Configuration Home Page and Main Menu Figure 9 Login Page HOME PAGE AND MAIN MENU After logging in to
39. Wireless N Access Point Repeater always broadcasts the SSID in its beacon signal Disabling the SSID broadcast increases security of the network because wireless clients need to already know the SSID before attempting to connect When set to disable the Network Name SSID and SSID1 SSID3 are automatically set to Hide Default Enabled AP Isolation The Wireless N Access Point Repeater will isolate communincation between all clients in order to protect them Normally for users who are at hotspots Default Disable MBSSID AP Isolation The Wireless N Access Point Repeater will isolate wireless clients from different SSID Default Disable BSSID The identifier MAC address of the Wireless N Access Point Repeater in the Basic Service Set BSS network Frequency Channel The radio channel that the Wireless N Access Point Repeater uses to communicate with wireless clients When multiple access points are deployed in the same area set the channel on neighboring access points at least five channels apart to avoid interference with each other For example you can deploy up to three access points in the same area using channels 1 6 11 Note that wireless clients automatically set the channel to the same as that used by the Wireless N Access Point Repeater to which it is linked Selecting Auto Select enables the Wireless N Access Point Repeater to automatically select an unoccupied radio channel Default AutoSelect
40. affic connecting to the Wireless N Access Point Repeater Options Start WSC Process Idle WPS Configured States if WPS for wireless clients has been configured for this device WPS SSID The service set identifier for the unit WPS Auth Mode The method of authentication used WPS Encryp Type The encryption type used for the unit WPS Default Key Index Displays the WEP default key 1 4 WPS Key ASCII Displays the WPS security key ASCII which can be used to ensure the security of the wireless network ai s CHAPTER 7 Access Point Mode Wireless Configuration Station List AP PIN Displays the PIN Code for the Wireless N Access Point Repeater The default is exclusive for each unit Reset WPS to Default Resets the WPS settings to factory default values WPS Config Configures WPS settings for the Wireless N Access Point Repeater WPS Mode Selects between methods of broadcasting the WPS beacon to network clients wanting to join the network PIN The Wireless N Access Point Repeater along with other WPS devices such as notebook PCs cameras or phones all come with their own eight digit PIN code When one device the WPS enrollee sends a PIN code to the Wireless N Access Point Repeater it becomes the WPS registrar After configuring PIN Code information you must press Apply to send the beacon after which you have up to two minutes to activate WPS
41. ained in this chapter Logging In on page 35 Operation Mode on page 37 34 LOGGING IN CHAPTER 5 Operation Mode Logging In It is recommended to make initial configuration changes by connecting a PC directly to the Wireless N Access Point Repeater s LAN port The Wireless N Access Point Repeater has a default IP address of 192 168 2 1 and a subnet mask of 255 255 255 0 If your PC is set to Obtain an IP address automatically that is set as a DHCP client you can connect immediately to the web interface Otherwise you must set your PC IP address to be on the same subnet as the Wireless N Access Point Repeater that is the PC and Wireless N Access Point Repeater addresses must both Start 192 168 2 x To access the configuration menu follow these steps 1 Use your web browser to connect to the management interface using the default IP address of 192 168 2 10 2 Log into the Wireless N Access Point Repeater management interface by entering the default user name admin and password smcadmin then click OK NoTE It is strongly recommended to change the default user name and password the first time you access the web interface For information on changing user names and passwords see Administration Settings on page 5 Figure 14 Login Page Tonnect to 1d ETN SMCWEBSY User name Password eoeeeene Remember my password Cancel 35 CHAPTER 5 Opera
42. ames dropped by the client due to a lack of resources in the device Duplicate Frames Received The number of duplicate data frames received by the client Reset Counters Click to set all the statistics counters back to zero 76 ADMINISTRATION SETTINGS The Wireless N Access Point Repeater s Administration Settings allow you to configure a management access password set the system time upgrade the system software display the system status and statistics Administration Settings contains the following sections System Management on page 77 Firmware Upgrade on page 79 Configuration Settings on page 80 System Status on page 81 Statistics on page 82 amp 6M System Log on page 83 SYSTEM MANAGEMENT The System Management commands allow you to change the language settings displayed in the interface and change the user name and password Figure 48 System Management System Management The System Management section is provided for configuration of administrative needs such as language type username password Time Zone Settings SNTP settings DNS etc Language Settings Select Language English v Web Interface Settings 77 CHAPTER 10 Administration Settings System Management The following items are displayed in the first two sections on this page Language Settings You can change the language displayed in web interface Select t
43. and appended to the front STBC Indicates if Space Time Block Coding STBC is being used STBC is a MIMO mechanism that allows a unit with only one antenna to leverage multiple antennas on other 802 11n devices to improve performance and range MCS The Modulation and Coding Scheme MCS is a value that determines the modulation coding and number of spatial channels Options value range O 7 1 Tx Stream 8 15 2 TxStream 32 and auto 33 SNR 0 1 The signal to noise ratio value for the MIMO spatial channels O and 1 73 SITE SURVEY CHAPTER 9 Ethernet Client Mode Wireless Configuration Site Survey Site survey page displays information of detected wireless networks You can select one of these networks to connect to or add it as a profile Figure 46 Station Site Survey station Site Survey site Survey page shows information of APs nearby You may choose one ofthese APs connecting or adding itto profile Site Survey ssi ssip Rssi channel Channel Encryption Authentication Stor ol E smc vaP c ie s CEN i E7 DC F7 58 1 NotUse OPEN Infrastructure 00 11 SMCWBR145 N 50 lotUse OP nfrastructure SMCWBR145 NL E0 02 E1 04 50 1 NotUse OPEN Infrastructure lo mor 00 12 l Pee awe ACCWL CF 2D FBFS 55 1 TKIP WPA Infrastructure s OQ al a Bag ha few Use e ee Infrastructure The following items are displayed on this page SSID The name of a detected wireless netwo
44. ated features This section summarizes the changes in each revision of this guide MARCH 2010 REVISION This is the second revision of this guide It includes the following changes Updated back cover address information Updated EU Conformance contact address Add Ethernet Client Mode function JANUARY 2010 REVISION This is the first revision of this guide SECTION CONTENTS WARRANTY AND PRODUCT REGISTRATION COMPLIANCES ABOUT THIS GUIDE CONTENTS FIGURES TABLES GETTING STARTED INTRODUCTION Key Hardware Features Description of Capabilities Package Contents Hardware Description LED Indicators Ethernet LAN Ports Power Connector Reset Button WPS Button NETWORK PLANNING LAN Access Point Wireless Bridge Wireless Client INSTALLING THE ACCESS POINT REPEATER System Requirements Location Selection Mounting the Device gt J0 10 14 16 17 18 18 18 19 19 20 21 21 21 21 22 22 23 24 25 25 25 26 SECTION Il Mounting on a Wall Mounting on a Horizontal Surface INITIAL CONFIGURATION Connecting to the Login Page Home Page and Main Menu Common Web Page Buttons Setup Wizard Step 1 Language Selection Step 2 Time Settings Step 3 Wireless Security Completion WEB CONFIGURATION OPERATION MODE Logging In Operation Mode ACCESS POINT MODE NETWORK SETTINGS Access Point Mode LAN Setting ACCESS POINT MODE WIRELESS CONFIGURATION Basic Settings H
45. bursting greatly improves the efficiency for high data rate traffic Specify a value in the range 0 65535 microseconds A8 CHAPTER 7 Access Point Mode Wireless Configuration WLAN Security ACM The admission control mode for the access category When enabled clients are blocked from using the access category Default Disable AckPolicy By default all wireless data transmissions require the sender to wait for an acknowledgement from the receiver WMM allows the acknowledgement wait time to be turned off for each Access Category AC 0 3 Although this increases data throughput it can also result in a high number of errors when traffic levels are heavy Default Acknowledge MULTICAST TO The Multicast to Unicast Converter section on the Wireless Settings UNICAST CONVERTER Advanced page allows you to enable multicast traffic conversion WLAN SECURITY Converting multicast traffic to unicast before sending to wireless clients allows a longer DTIM Data Beacon Rate interval to be set A longer DTIM interval prevents clients in power save mode having to activate their radios to receive the multicast data which saves battery life Figure 23 Multicast to Unicast Converter Multicast to Unicast Converter Multicast to Lnicast Enable Disable The following items are displayed in this section on this page Multicast to Unicast Enables multicast traffic streams to be converted to unicast traffic befo
46. cting to an available wireless network provided by another access point or wireless router This functionality allows to add any Ethernet enabled device like gaming consoles NAS storage servers or PCs laptops without built in wireless support into a wireless network In order to connect to a wireless network in Ethernet client mode it is necessary to know the following information the network name SSID the frequency channel 1 13 the type of security WEP WPA WPA2 and the security password if any For more information see Ethernet Client Mode Network Settings on page 63 gt 9 ACCESS POINT MODE NETWORK SETTINGS The Access Point Mode Network Settings pages allow you to manage basic system configuration settings ACCESS POINT MODE LAN SETTING The Wireless N Access Point Repeater must have a valid IP address for management using a web browser and to support other features The unit has a default IP address of 192 168 2 10 You can use this IP address or assign another address that is compatible with your existing local network Click on Network Settings followed by LAN Figure 17 LAN Configuration Local Area Network LAN Settings This section is provided to configure LAN settings like DHCP and other networking features LAN Setup IF Setting Type STATIC MAC Address 0022 2D 8420 34 Hostname SMCWEBS N IP Address 1927 166 2 10 Subnet Mask 255 255 755 0 Other Setup LLTO JEnable
47. dentification Number PIN The WPS PIN setup is optional to the PBC setup and provides more security The WPS button on the Wireless N Access Point Repeater can be pressed at any time to allow a single device to easily join the network The WPS Settings page includes configuration options for setting WPS device PIN codes and activating the virtual WPS button Click on Wireless Settings followed by WPS Figure 33 Enabling WPS Wi Fi Protected Setup Wi Fi Protected Setup or WPS is an easy way of securely connecting to the system Both FIN and PBC methods are available if you have enabled WEP and wish to enable WPS as well WEP settings will automatically be changed to WPA WPS Configuration lwes Disable 60 CHAPTER 7 Access Point Mode Wireless Configuration Wi Fi Protected Setup WPS The following items are displayed on this page WPS Enables WPS locks security settings and refreshes WPS configuration information Default Disable Figure 34 WPS Configuration WPS Summary WPS Current Status WPS Configured WPS Auth Mode WPS Encryp Type WPS Default Key Index WPS Key ASCII fap PIN 24135726 Reset WFS to Default WPS Progress wes mode PIN PBC pin LO ooo Apply WPS Status Idle The following items are displayed on this page WPS Summary Provides detailed WPS statistical information WPS Current Status Displays if there is currently any WPS tr
48. e Frames Received Reset Counters The following items are displayed on this page Frames Transmitted Successfully The number of data frames transmitted from the client and successfully received by the AP or network peer Frames Transmitted Successfully Without Retry The number of data frames transmitted from the client and successfully received by the AP or network peer without the need of a retransmit Frames Transmitted Successfully After Retry s The number of data frames transmitted from the client and successfully received by the AP or network peer after being retransmited Frames Fail To Receive ACK After All Retries The number of data frames transmitted from the client that were not successfully received by the AP or network peer 7S CHAPTER 9 Ethernet Client Mode Wireless Configuration Statistics RTS Frames Successfully Receive CTS The number of Request to Send frames transmitted from the client that resulted in a Clear to Send frame being successfully received RTS Frames Fail to Receive CTS The number of Request to Send frames transmitted from the client that did not result in a Clear to Send frame being received Frames Received Successfully The number of data frames successfully received by the client Frames Received With CRC Error The number of data frames received by the client that had CRC errors Frames Dropped Due To Out of Resource The number of data fr
49. eclara que este Radio LAN device est conforme com os requisitos Portugu s essenciais e outras disposi es da Directiva 1999 5 CE Slovak Manufacturer t mto vyhlasuje e Radio LAN device sp a z kladn po iadavky a v etky Slovensky pr slu n ustanovenia Smernice 1999 5 ES Slovenian Manufacturer izjavlja da je ta radio LAN device v skladu z bistvenimi zahtevami in ostalimi Slovensko relevantnimi dolo ili direktive 1999 5 ES PURPOSE AUDIENCE CONVENTIONS A RELATED PUBLICATIONS REVISION HISTORY ABOUT THIS GUIDE This guide gives specific information on how to install the Wireless N Access Point Repeater and its physical and performance related characteristics It also gives information on how to operate and use the management functions of the Wireless N Access Point Repeater This guide is for users with a basic working knowledge of computers You should be familiar with Windows operating system concepts The following conventions are used throughout this guide to show information NoTE Emphasizes important information or calls your attention to related features or instructions CAUTION Alerts you to a potential hazard that could cause loss of data or damage the system or equipment WARNING Alerts you to a potential hazard that could cause personal injury As part of the Wireless N Access Point Repeater s software there is an online web based help that describes all management rel
50. ected straight through to pins 1 2 3 and 6 at the other end of the cable Table 5 10 100BASE TX MDI and MDI X Port Pinouts PIN MDI Signal Namea MDI X Signal Name 1 Transmit Data plus TD Receive Data plus RD 2 Transmit Data minus TD Receive Data minus RD 3 Receive Data plus RD Transmit Data plus TD 6 Receive Data minus RD Transmit Data minus TD 4 5 7 8 Not used Not used a The and signs represent the polarity of the wires that make up each wire pair STRAIGHT THROUGH WIRING If the twisted pair cable is to join two ports and only one of the ports has an internal crossover MDI X the two pairs of wires must be straight through When auto negotiation is enabled for any RJ 45 port on this switch you can use either straight through or crossover cable to connect to any device type You must connect all four wire pairs as shown in the following diagram to Support Gigabit Ethernet connections 90 APPENDIX C Cables and Pinouts Crossover Wiring Figure 56 Straight through Wiring EIA TIA 568B RJ 45 Wiring Standard 10 100BASE TX Straight through Cable White Orange Stripe Orange White Green Stripe EndA Blue End B White Blue Stripe Green LIN W CONOOaRWN White Brown Stripe Brown CROSSOVER WIRING If the twisted pair cable is to join two ports and either both ports are labeled with an X MDI X o
51. encryption select TKIP as the encryption algorithm Access Policy The Wireless N Access Point Repeater provides a MAC address filtering facility The access policy can be set to allow or reject specific station MAC addresses This feature can be used to connect known wireless devices that may not be able to support the configured security mode Adda station MAC Enter the MAC address of the station that you want to filter MAC addresses must be entered in the format XXIXX IXXIXX IXX XX COMPLETION After completion of the Wizard the screen returns to the Home Page 32 SECTION Il WEB CONFIGURATION This section provides details on configuring the Wireless N Access Point Repeater using the web browser interface This section includes these chapters Operation Mode on page 37 Access Point Mode Network Settings on page 38 Access Point Mode Wireless Configuration on page 40 Ethernet Client Mode Network Settings on page 63 Ethernet Client Mode Wireless Configuration on page 66 Administration Settings on page 77 e e OPERATION MODE The Wireless N Access Point Repeater offers a user friendly web based management interface for the configuration of all the unit s features Any PC directly attached to the unit can access the management interface using a web browser such as Internet Explorer version 6 0 or above The following sections are cont
52. epeater 59 CHAPTER 7 Access Point Mode Wireless Configuration Wi Fi Protected Setup WPS Repeater Operates as a wireless repeater extending the range for remote wireless clients and connecting them to an AP connected to the wired network The MAC addresses of WDS peers must be configured on the Wireless N Access Point Repeater Physical The radio media coding used on all WDS links CCK corresponds to 11b OFDM corresponds to 11g and HTMIX corresponds to 11n Encryption Type The data encryption used on the WDS link Be sure that both ends of a WDS link are configured with the same encryption type and key Options None WEP TKIP AES Default None Encryption Key The encryption key for the WDS link The key type and length varies depending on the encryption type selected For WEP enter 5 alphanumeric characters or 10 hexadecimal digits for 64 bit keys or 13 alphanumeric characters or 26 hexadecimal digits for 128 bit keys For TKIP or AES enter a password key phrase of between 8 to 63 ASCII characters which can include spaces or specify exactly 64 hexadecimal digits AP MAC Address The MAC address of the other Wireless N Access Point Repeater in the WDS link Wi Fi PROTECTED SETUP WPS Wi Fi Protected Setup WPS is designed to ease installation and activation of security features in wireless networks WPS has two basic modes of operation Push button Configuration PBC and Personal I
53. es a system log ofthe device System Log i Ci es ci 2 SMCWEBS N Warn kernel Ralink gpio driver initialized fal 2 SMCWEBS N info kernel HDLC line discipline version Revis SMCWEBS N info kernel N HDLC line discipline registered 2 SMCWEBS N info kernel Serial 6250 16550 driver Revision 2 SMCWEBS HN info kernel sgerial 250 ttyS0 at I O Oxb0000500 2 SMCWEBS HN info kernel serial 250 ttySl at I O OxboO000c00 2 SMCWEBS N info kernel loop loaded max amp devices 2 SMCWEBS N Warn kernel rdm major 254 2 SMCWEBS N info kernel PPP generic driver version 2 4 2 2 SMCWEBS HN info kernel PPP BSD Compression module registere 2 SMCWEBS N info kernel NET Registered protocol family 24 2 SMCWEBS N hotice kernel number of CFI chips 1 2 SMCWEBS N notice kernel cfi_camdset 0002 Disabling erase s SMCWEBS N notice kernel Creating 5 MID partitions on Rali 2 SMCWEBS N notice kernel Ox00000000 0200030000 Bootloade 2 SMCWEBS N Notice kernel Ox00030000 0x00040000 Config 2 SMCWEBS N motice kernel Ox00040000 0x000050000 Factory SMCWEBS H Dotice kernel Ox00050000 0x00120000 Kernel SMCWEBS N notice kernel O200120000 0x00400000 RootFS SMCWEBS N info kernel block mtd version Revision 1 1 1 SMCWEBS N Warn kernel nf conntrack version 0 5 0 126 buck SMCWEBS H info Kernel bro topology change detected propaj SMCWEBS N
54. ess N Access Point Repeater SGMCWEBS N supports an access point service that extends a local wired network to wireless clients It is simple to configure and can be up and running in minutes KEY HARDWARE FEATURES The following table describes the main hardware features of the Access Point Repeater Table 1 Key Hardware Features Feature Description 4 LAN Ports Four 100BASE TX RJ 45 ports for local network connections WPS Button To set up a secure connection to a wireless device Reset Button For resetting the unit and restoring factory defaults LEDs Provides LED indicators for Power LAN ports WLAN and WPS status Mounting Options Can be mounted on any horizontal surface such as a desktop or shelf or on a wall using two screws DESCRIPTION OF CAPABILITIES Local network connection through four 10 100 Mbps Ethernet ports making it easy to create a network in small offices or homes Easy setup through a Web browser on any operating system that Supports TCP IP Compatible with all popular Internet applications The Access Point Repeater supports security features that provides WPA Wi Fi Protected Access and MAC filtering provide security over the wireless network zJ 2 CHAPTER 1 Introduction Package Contents PACKAGE CONTENTS The Wireless N Access Point Repeater package includes Wireless N Access Point Repeater SMCWEBS N RJ 45 Category 5 network cable AC power adapter SMC Warranty Informatio
55. ess and monitoring Select SSID sslD Choice Es LE 5 MC Security hlode SHARED Accesspoiey MEA Poney o WEA WPA PSK Add a station MAC WPA2 WPA2 PSK WPA PSK_WPA2 PSK WPA1_WPA2 802 1X The supported security mechanisms and their configuration parameters are described in the following sections OPEN SHARED WEP AUTO See Wired Equivalent Privacy WEP on page 51 WPA PSK WPA2 PSK WPA PSK_WPA2 PSK See WPA Pre Shared Key on page 52 WPA WPA2 WPA1_WPA2 See WPA Enterprise Mode on page 53 802 1X See IEEE 802 1X and RADIUS on page 55 50 CHAPTER 7 Access Point Mode Wireless Configuration WLAN Security WIRED EQUIVALENT WEP provides a basic level of security preventing unauthorized access to PRIVACY WEP the network and encrypting data transmitted between wireless clients and an access point WEP uses static shared keys fixed length hexadecimal or alphanumeric strings that are manually distributed to all clients that want to use the network When you select to use WEP be sure to define at least one static WEP key for user authentication or data encryption Also be sure that the WEP Shared keys are the same for each client in the wireless network Figure 25 Security Mode WEP security Mode Encrypt Type Wire Equivalence Protection WEP Default Key WEP Key 1 WEP Key 2 WEP Keys WEP Key 3 WEP Key 4 The follo
56. he language of your choice from the drop down list then click Apply Options English Traditional Chinese Simple Chinese or Korean Default English Web Interface Settings To protect access to the management interface you need to configure a new administrator s user name and password as soon as possible If a new user name and password are not configured then anyone having access to the Wireless N Access Point Repeater may be able to compromise the unit s security by entering the default values User Name The name of the user The default name for access to the unit is admin Length 3 16 characters case sensitive Password The password for management access The default password preset for access to the unit is smcadmin Length 3 16 characters case sensitive Time Zone Settings The System Management page allows you to manually configure time settings or enable the use of a Simple Network Time Protocol SNTP or NTP server Figure 49 Time Zone Settings Current Time Fri 19 Mar 2010 11 46 24 Sync with host Time Zone GMT 11 00 Midway Island Samoa time nist gov ONTP Server ex time nist goy nipO broad mitedu time stdtime gov tw SMTP synchronization hours 6 The following items are displayed in this section on this page Current Time Displays the current system time on the unit Sync with host Updates the unit s time from the web management PC s
57. iltering facility The access policy can be set to allow or reject specific station MAC addresses This feature can be used to connect known wireless devices that may not be able to support the configured security mode Figure 29 Access Policy Access Policy 00 55 44 33 22 11 Add a station MAC fs The following items are displayed in this section on this page Access Policy The access policy can be set to allow or reject specific station MAC addresses Adda station MAC Enter the MAC address of the station that you want to filter MAC addresses must be entered in the format KOC KKK KEKE WIRELESS DISTRIBUTION SYSTEM WDS The radio interface can be configured to operate in a mode that allows it to forward traffic directly to other Wireless Access Point Repeater units This feature can be used to extend the range of the wireless network to reach remote clients or to link disconnected network segments to an Internet connection To set up links between units you must configure the Wireless Distribution System WDS forwarding table by specifying the wireless MAC address of all units to which you want to forward traffic NotTE All units in a WDS wireless network must be configured with the same SSID and use the same radio channel Also each WDS link must be configured with the same encryption key on both units in the link Up to four WDS links can be specified for each unit in the WDS network The following fig
58. info kernel bro port 1i ra0 entering forwarding Mm gt a a a Lo Lo Co a ca et D D GOG GO O O O ci 3 D i D i i og oOooaogoaga ac G So 6 a i 0 o0 00 g 4 D DO DO D D O as se aa aa G G G 06 J D O DO O D D i GD O O oc G G G G G 6 Zi D D i a D D O 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 5 oooo D a0 0 0c D Oe ee io to Bo Bo Bo Bj i i The following items are displayed on this page System Log Displays the latest log messages in chronological order from the newest to the oldest Refresh Sends a request to add the latest entries to the System Log Table Clear Removes the current system log messages from the System Log Table 83 SECTION Ill APPENDICES This section provides additional information and includes these items Troubleshooting on page 85 Hardware Specifications on page 87 Cables and Pinouts on page 89 Glossary on page 96 Index on page 100 TROUBLESHOOTING DIAGNOSING LED INDICATORS Table 4 LED Indicators Symptom Action Power LAN LEDs are off The AC power adapter may be disconnected Check connections between the Access Point Repeater the power adapter and the wall outlet WLAN LED is off The access point radio has been disabled through it s web management interface Access
59. is believed to be a consequence of the rest of this License 94 10 11 APPENDIX D License Information The GNU General Public License If the distribution and or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries so that distribution is permitted only in or among countries not thus excluded In such case this License incorporates the limitation as if written in the body of this License The Free Software Foundation may publish revised and or new versions of the General Public License from time to time Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Program specifies a version number of this License which applies to it and any later version you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation If the Program does not specify a version number of this License you may choose any version ever published by the Free Software Foundation If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different write to the author to ask for permission F
60. l Strength 96 SNR 4599640 The following items are displayed on this page Status The service set identifier of the wireless network and the MAC address of the connected AP Extra Info Indicates if the link is active Channel Specifies the current channel in use Link Speed The current transmitting and receiving rates Throughput The transmitting and receiving throughputs Link Quality The strength of the receive signal compared to other interference and noise Signal Strength 1 3 The current receive signal strength indication 72 CHAPTER 9 Ethernet Client Mode Wireless Configuration Link Status Noise Level A value that indicates the amount of radio noise on the current channel dBm Format Displays the signal strength and noise values in dBm BW Channel Bandwidth The Wireless N Access Point Repeater provides a channel bandwidth of 40 MHz by default giving an 802 11g connection speed of 108 Mbps sometimes referred to as Turbo Mode and a 802 11n connection speed of up to 300 Mbps Setting the HT Channel Bandwidth to 20 MHz slows connection speed for 802 11g and 802 11n to 54 Mbps and 74 Mbps respectively and ensures backward compliance for slower 802 11b devices GI Guard Interval The guard interval between symbols helps receivers overcome the effects of multipath delays When you add a guard time the back portion of useful signal time is copied
61. mport configuration 80 information system 81 Introduction 18 IP address default 28 35 K Key Hardware Features 18 L LAN ports 21 language settings 30 78 Lazy Mode WDS 59 LED indicators 20 troubleshooting 85 license information 92 LLTD 39 location selection 26 logging system 83 login defaults 28 35 login page 28 M MAC address filtering 57 main menu 36 management interface login defaults 28 35 MCS setting 43 100 MDI MDI X operation 21 messages logging 83 mounting 2 7 mounting on a wall 26 multicast to unicast convertion 49 multiple SSID 42 N network name wireless 40 42 network statistics 82 O open system 49 Package Contents 19 password default 28 setting 78 PBC mode WPS 62 physical size 87 PIN code WPS 62 pinouts cable 89 PMK cache period 55 power connector 21 preamble short 46 pre authentication 55 protection mode 45 Q Quality of Service 46 R radio mode 41 radio settings 40 radio standards 8 7 RADIUS 55 repeater operation 23 Reset Button 21 restoring defaults 80 reverse direction grant 43 RJ 45 connector pins 89 RTS threshold 45 S screws for mounting 26 security wireless 49 setup wizard 30 shared secret RADIUS 56 slot time 46 slots 26 SNTP 78 software upgrade 79 INDEX specifications hardware 87 SSID 40 42 standards radio 87 station list wireless 62 Statistics 82 Statistics system 82 status of system 81 st
62. ms are displayed in this section on this page Security Mode Configures the WPA and WPA2 security modes used by clients When using WPA or WPA2 be sure there is a RADIUS server in the connected wired network and that the RADIUS settings are configured See IEEE 802 1X and RADIUS on page 55 for more information Default Disable WPA Clients using WPA with an 802 1X authentication method are accepted for authentication The default data encryption type for WPA is TKIP WPA2 Clients using WPA2 with an 802 1X authentication method are accepted for authentication The default data encryption type for WPA is AES WPA1_WPA2 Clients using WPA or WPA2 with an 802 1X authentication method are accepted for authentication The default data encryption type is TKIP AES WPA Algorithms Selects the data encryption type to use Default is determined by the Security Mode selected TKIP Uses Temporal Key Integrity Protocol TKIP keys for encryption WPA specifies TKIP as the data encryption method to replace WEP TKIP avoids the problems of WEP static keys by dynamically changing data encryption keys 54 CHAPTER 7 Access Point Mode Wireless Configuration WLAN Security AES Uses Advanced Encryption Standard AES keys for encryption WPA2 uses AES Counter Mode encryption with Cipher Block Chaining Message Authentication Code CBC MAC for message integrity The AES Counter Mode CBCMAC Pro
63. n Card Quick Installation Guide Inform your dealer if there are any incorrect missing or damaged parts If possible retain the carton including the original packing materials Use them again to repack the product in case there is a need to return it HARDWARE DESCRIPTION The Wireless N Access Point Repeater from herein refered to as Access Point Repeater connects to your PC or to a local area network using its RJ 45 Fast Ethernet LAN ports The Access Point Repeater includes an LED display on the front panel for system power and port indications that simplifies installation and network troubleshooting Figure 1 Top Panel AN LAN 19 CHAPTER 1 Introduction Hardware Description Figure 2 Rear Panel Antennas lt oN WPS LAN1 LAN2 LAN3 LAN4 DC IN RESET Reset Button WPS Button Power Socket Ethernet LAN RJ 45 Ports LED INDICATORS The Wireless N Access Point Repeater includes seven status LED indicators as described in the following figure and table Figure 3 LEDs ELINI Power WLAN WPS LAN1 LAN2 LAN3 LAN S E j Power 802 11n Link Activity WPS Authentication LAN Link Activity Table 2 LED Behavior LED Status Description Power On Blue The unit is receiving power and is operating normally Off There is no power currently being supplied to the unit 20 ETHERNET LAN PORTS POWER CONNECTOR RESET BUTTON WPS BUTTON CHAPTER 1 Introduction Hardware Desc
64. nd distribute such modifications or work under the terms of Section 1 above provided that you also meet all of these conditions a You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change b You must cause any work that you distribute or publish that in whole or in part contains or is derived from the Program or any part thereof to be licensed as a whole at no charge to all third parties under the terms of this License c Ifthe modified program normally reads commands interactively when run you must cause it when started running for such interactive use in the most ordinary way to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty or else saying that you provide a warranty and that users may redistribute the program under these conditions and telling the user how to view a copy of this License Exception if the Program itself is interactive but does not normally print such an announcement your work based on the Program is not required to print an announcement These requirements apply to the modified work as a whole If identifiable sections of that work are not derived from the Program and can be reasonably considered independent and separate works in themselves then this License and its terms do not apply to those sections when you distribute them as separate works But when you distribute the same
65. o LAN device tyyppinen laite on Suomi direktiivin 1999 5 EY oleellisten vaatimusten ja sit koskevien direktiivin muiden ehtojen mukainen Dutch Hierbij verklaart Manufacturer dat het toestel Radio LAN device in overeenstemming is Nederlands met de essenti le eisen en de andere relevante bepalingen van richtlijn 1999 5 EG Bij deze Manufacturer dat deze Radio LAN device voldoet aan de essenti le eisen en aan de overige relevante bepalingen van Richtlijn 1999 5 EC French Par la pr sente Manufacturer d clare que l appareil Radio LAN device est conforme aux Fran ais exigences essentielles et aux autres dispositions pertinentes de la directive 1999 5 CE COMPLIANCES Swedish H rmed intygar Manufacturer att denna Radio LAN device star verensst mmelse med Svenska de v sentliga egenskapskrav och vriga relevanta best mmelser som framg r av direktiv 1999 5 EG Danish Undertegnede Manufacturer erkl rer herved at f lgende udstyr Radio LAN device Dansk overholder de v sentlige krav og vrige relevante krav i direktiv 1999 5 EF German Hiermit erkl rt Manufacturer dass sich dieser diese dieses Radio LAN device in Deutsch bereinstimmung mit den grundlegenden Anforderungen und den anderen relevanten Vorschriften der Richtlinie 1999 5 EG befindet BMWi Hiermit erkl rt Manufacturer die bereinstimmung des Ger tes Radio LAN device mit den grundlegenden Anforderungen und den anderen relevanten Festlegungen der Richtlinie 1
66. o any such program or work and a work based on the Program means either the Program or any derivative work under copyright law that is to say a work containing the Program or a portion of it either verbatim or with modifications and or translated into another language Hereinafter translation is included without limitation in the term modification Each licensee is addressed as you Activities other than copying distribution and modification are not covered by this License they are outside its scope The act of running the Program is not restricted and the output from the Program is covered only if its contents constitute a work based on the Program independent of having been made by running the Program Whether that is true depends on what the Program does You may copy and distribute verbatim copies of the Program s source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and give any other recipients of the Program a copy of this License along with the Program You may charge a fee for the physical act of transferring a copy and you may at your option offer warranty protection in exchange for a fee You may modify your copy or copies of the Program or any portion of it thus forming a work based on the Program and copy a
67. ode to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange or c Accompany it with the information you received as to the offer to distribute corresponding source code This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer in accord with Subsection b above The source code for a work means the preferred form of the work for making modifications to it For an executable work complete source code means all the source code for all modules it contains plus any associated interface definition files plus the scripts used to control compilation and installation of the executable However as a special exception the source code distributed need not include anything that is normally distributed in either source or binary form with the major components compiler kernel and so on of the operating system on which the executable runs unless that component itself accompanies the executable If distribution of executable or object code is made by offering access to copy from a designated place then offering equivalent access to copy the source code from the same place counts as distribution of the source code even though third parties are not compelled to copy the source along with the object code You may not copy modify sublicense or distribute the Program except as expressly provided
68. ons MOUNTING ON A WALL The Wireless N Access Point Repeater should be mounted only to a wall or wood surface that is at least 1 2 inch plywood or its equivalent To mount the unit on a wall always use its wall mounting slots The unit must be mounted with the RJ 45 cable connector oriented upwards to ensure proper operation Figure 8 Wall Mounting mka amp d P i LLI as THI MARIINI Mounting Slots To mount on a wall follow the instructions below 1 Mark the position of the two screw holes on the wall For concrete or brick walls you will need to drill holes and insert wall plugs for the Screws 2 Insert two 20 mm M4 tap screws not included into the holes leaving about 2 3 mm 0 08 0 12 inches clearance from the wall Ji Line up the two mounting points on the unit with the screws in the wall then slide the unit down onto the screws until it is in a secured position 26 CHAPTER 3 Installing the Access Point Repeater Mounting the Device MOUNTING ON A To keep the Wireless N Access Point Repeater from sliding on the surface HORIZONTAL SURFACE the Wireless N Access Point Repeater has four rubber feet on the bottom of the unit It is recommended to select an uncluttered area on a sturdy surface such as a desktop or table The unit can also be protected by securing all attached cables to a table leg or other nearby fixed structure 27 INITIAL CONFIGURATION
69. or software which is copyrighted by the Free Software Foundation write to the Free Software Foundation we sometimes make exceptions for this Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally NO WARRANTY BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE THERE IS NO WARRANTY FOR THE PROGRAM TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE PROGRAM AS IS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU SHOULD THE PROGRAM PROVE DEFECTIVE YOU ASSUME THE COST OF ALL NECESSARY SERVICING REPAIR OR CORRECTION INNO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER OR ANY OTHER PARTY WHO MAY MODIFY AND OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE BE LIABLE TO YOU FOR DAMAGES INCLUDING ANY GENERAL SPECIAL INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS EVEN IF SUCH HOLDER OR O
70. over IP calls AC_VI AC2 Video High priority minimum delay Time sensitive 5 4 data such as streaming video AC_BE ACO Best Effort Normal priority medium delay and throughput 0 3 Data only affected by long delays Data from applications or devices that lack QoS capabilities AC_BK AC1 Background Lowest priority Data with no delay or 2 1 throughput requirements such as bulk data transfers The Wi Fi Multimedia section on the Wireless Settings Advanced page allows you to enable WMM and set detailed QoS parameters Figure 21 Wi Fi Multimedia Settings Wi Fi Multimedia WMM Enable Disable APSD Enable Disable WMM Parameters WMM Configuration The following items are displayed in this section on this page WMM Sets the WMM operational mode on the access point When enabled the QoS capabilities are advertised to WMM enabled clients in the network WMM must be supported on any device trying to associated with the access point Devices that do not support this feature will not be allowed to associate with the access point Default Enabled APSD When WMM is enabled Automatic Power Save Delivery APSD can also be enabled APSD is an efficient power management method that enables client devices sending WMM packets to enter a low power sleep state between receiving and transmitting data Default Disable 47 CHAPTER 7 Access Point Mode Wireless Configuration Advanced Settings W
71. ower Adjusts the power of the radio signals transmitted from the access point The higher the transmission power the farther the transmission range Power selection is not just a trade off between coverage area and maximum supported clients You also have to ensure that high power signals do not interfere with the operation of other radio devices in the service area Short Preamble Sets the length of the signal preamble that is used at the start of a data transmission Use a short preamble 96 microseconds to increase data throughput when it is supported by all connected 802 11g clients Use a long preamble 192 microseconds to ensure all 802 11b clients can connect to the network Default Disable Short Slot Sets the basic unit of time the access point uses for calculating waiting times before data is transmitted A short slot time 9 microseconds can increase data throughput on the access point but requires that all clients can support a short slot time that is 802 11g compliant clients must support a short slot time A long slot time 20 microseconds is required if the access point has to support 802 11b clients Default Enabled TX Burst A performance enhancement that transmits a number of data packets at the same time when the feature is supported by compatible clients Default Enabled Packet Aggregate A performance enhancement that combines data packets together when the feature is supported by
72. r 64 bit keys or enter 13 alphanumeric characters or 26 hexadecimal digits for 128 bit keys Default Hex no preset value WPA PRE SHARED Wi Fi Protected Access WPA was introduced as an interim solution for the Key vulnerability of WEP pending the adoption of a more robust wireless security standard WPA2 includes the complete wireless security standard but also offers backward compatibility with WPA Both WPA and WPA2 provide an enterprise and personal mode of operation For small home or office networks WPA and WPA2 provide a simple personal operating mode that uses just a pre shared key for network access The WPA Pre Shared Key WPA PSK mode uses a common password phrase for user authentication that is manually entered on the access point and all wireless clients Data encryption keys are automatically generated by the access point and distributed to all clients connected to the network Figure 26 Security Mode WPA PSK Security Mode WPA PSK w WPA WPA Algorithms COTKIP CIAES CITKIPAES Pass Phrase fd Key Renewal Interval seconds The following items are displayed in this section on this page Security Mode Configures the WPA PSK and WPA2 PSK security modes used by clients When using WPA PSK or WPA2 PSK be sure to define the Shared key for the Wireless N Access Point Repeater and all its clients Default Disable WPA PSK Clients using WPA with a Pre shared Key are accepted for authen
73. r neither port is labeled with an X MDI a crossover must be implemented in the wiring When auto negotiation is enabled for any RJ 45 port on this switch you can use either straight through or crossover cable to connect to any device type You must connect all four wire pairs as shown in the following diagram to Support Gigabit Ethernet connections Figure 57 Crossover Wiring EIA TIA 568B RJ 45 Wiring Standard 10 100BASE TX Crossover Cable White Orange Stripe Uf Orange N White Green Stripe N End A End B Blue gt White Blue Stripe Green LIN W ONOOQORAOUON a White Brown Stripe Brown a gj LICENSE INFORMATION This product includes copyrighted third party software subject to the terms of the GNU General Public License GPL GNU Lesser General Public License LGPL or other related free software licenses The GPL code used in this product is distributed WITHOUT ANY WARRANTY and is subject to the copyrights of one or more authors For details refer to the section The GNU General Public License below or refer to the applicable license as included in the source code archive THE GNU GENERAL PUBLIC LICENSE GNU GENERAL PUBLIC LICENSE Version 2 June 1991 Copyright C 1989 1991 Free Software Foundation Inc 59 Temple Place Suite 330 Boston MA 02111 1307 USA Everyone is permitted to copy and distribute verbatim copies of
74. r use protection for 802 11b clients This prevents 802 11b clients from connecting to the network Beacon Interval The rate at which beacon signals are transmitted from the access point The beacon signals allow wireless clients to maintain contact with the access point They may also carry power management information Range 20 999 TUs Default 100 TUs Data Beacon Rate DTIM The rate at which stations in sleep mode must wake up to receive broadcast multicast transmissions Known also as the Delivery Traffic Indication Map DTIM interval it indicates how often the MAC layer forwards broadcast multicast traffic which is necessary to wake up stations that are using Power Save mode The default value of one beacon indicates that the access point will save all broadcast multicast frames for the Basic Service Set BSS and forward them after every beacon Using smaller DTIM intervals delivers broadcast multicast frames in a more timely manner causing stations in Power Save mode to wake up more often and drain power faster Using higher DTIM values reduces the power used by stations in Power Save mode but delays the transmission of broadcast multicast frames Range 1 255 beacons Default 1 beacon Fragmentation Threshold Configures the minimum packet size that can be fragmented when passing through the access point Fragmentation of the PDUs Package Data Unit can increase the reliability of transmissions because it increases
75. r with other WPS devices in the WLAN 271 NETWORK PLANNING The Wireless N Access Point Repeater is designed as an access point that extends an existing wired network to support wireless users It also Supports use as a wireless repeater bridge that can extend the range of the network or connect to remote LANs This chapter explains some of the basic features of the Wireless N Access Point Repeater and shows some network topology examples in which the device is implemented LAN ACCESS POINT The Wireless N Access Point Repeater can provide an access point service for an existing wired LAN creating a wireless extension to the local network A Wi Fi wireless network is defined by its Service Set Identifier SSID or network name Wireless clients that want to connect to a network must set their SSID to the same SSID of the network service Figure 4 Operating as an Access Point Server eee 1 b gF a pi IP 192 168 2 x N Desktop PC IP 192 168 2 x Wireless AP Repeater Notebook PC Te IP 192 168 2 x ii 9D WIRELESS BRIDGE CHAPTER 2 Network Planning Wireless Bridge The IEEE 802 11 standard defines a Wireless Distribution System WDS for bridge connections between access points The Wireless N Access Point Repeater can use WDS to forward traffic on links between units Up to four WDS links can be specified for the Wireless N Access Point Repeater
76. raight through cables 90 system defaults 80 system log 83 system requirements 25 System Status 81 system time 78 T table mounting 27 temperature operating 87 time settings 78 time zone setting 78 TKIP encryption 53 traffic statistics 82 troubleshooting 85 twisted pair cable assignments 89 U upgrading software 79 UPNP 39 user interface login 35 username setting 78 username default 28 UTP cable pinouts 90 V VAP interfaces 40 W wall mounting 26 WDS operation 23 WDS settings 57 web browser 25 web IP address 28 35 web login 28 35 web main menu 36 WEP security 51 Wi Fi Multimedia 46 Wi Fi network operation 22 wireless client list 62 wireless network mode 41 wireless settings basic 40 WLAN security 49 WMM 46 WPA pre shared key 52 WPS button 21 WPS security 60 101 Networks U S A Office 20 Mason Irvine CA 92618 Phn 949 679 8000 European Office C Fructu s Gelabert 6 8 2 24 Edificio Conata Il 08970 Sant Joan Despi Barcelona SPAIN Phn 34 93 477 4920 TECHNICAL SUPPORT From U S A and Canada 24 hours a day 7 days a week Phn 800 SMC 4 YOU 949 679 8000 Fax 949 679 1481 English Technical Support information available at www smc com English For Asia Pacific Technical Support information available at www smc asia com Deutsch Technischer Support und weitere Information unter www smc com Espanol En www smc com Ud podr encontrar la
77. re delivery to wireless clients Default Disable The Wireless N Access Point Repeater s wireless interface is configured by default as an open system which broadcasts a beacon signal including the configured SSID Wireless clients with a configured SSID of ANY can read the SSID from the beacon and automatically set their SSID to allow immediate connection to the wireless network To implement wireless network security you have to employ one or both of the following functions Authentication It must be verified that clients attempting to connect to the network are authorized users Traffic Encryption Data passing between the unit and clients must be protected from interception and eavesdropping a d0 CHAPTER 7 Access Point Mode Wireless Configuration WLAN Security The Wireless N Access Point Repeater supports supports ten different security mechanisms that provide various levels of authentication and encryption depending on the requirements of the network The Wireless N Access Point Repeater supports four SSID interfaces Each SSID interface functions as a separate access point and can be configured with its own security settings Click on Wireless Settings followed by Basic Figure 24 Security Mode Options Wireless Secunty and Encryption Settings The Wireless Security and Encryption Settings page allows you to make detailed security configurations to prevent unauthorized acc
78. ription Table 2 LED Behavior Continued LED Status Description WLAN On Blinking Blue The 802 11n radio is enabled and transmitting or receiving data through wireless links Off The 802 11n radio is disabled WPS Blinking WPS authentication is in progress Off WPS authentication is not in progress LAN1 LAN4 On Blue The Ethernet LAN port is connected to a PC or server Blinking The Ethernet port is connected and is transmitting receiving data Off The Ethernet port is disconnected or has malfunctioned The Wireless N Access Point Repeater has four LOOBASE TX RJ 45 ports that can be attached directly to 1OBASE T 100BASE TX LAN segments These port support automatic MDI MDI X operation so you can use straight through cables for all network connections to PCs switches or hubs The Wireless N Access Point Repeater must be powered with its supplied power adapter Failure to do so results in voiding of any warrantly supplied with the product The power adapter automatically adjusts to any voltage between 100 240 volts at 50 or 60 Hz and supplies 5 volts DC power to the unit No voltage range settings are required This button is used to restore the factory default configuration If you hold down the button for 5 seconds or more any configuration changes you may have made are removed and the factory default configuration is restored to the Access Point Repeater Press to automatically configure the Wireless N Access Point Repeate
79. rk BSSID The MAC address of the detected AP RSSI The receive signal strength of the detected AP Channel The radio channel used by the detected AP Encryption The data encryption type used by the detected AP 6M Authentication The authentication method used by the detected AP Network Type The type of wireless network detected infrastructure or ad hoc Connect Click to attempt a connection to the selected wireless network Rescan Click to scan all radio channels for nearby wireless networks FA STATISTICS CHAPTER 9 Ethernet Client Mode Wireless Configuration Statistics Add Profile Click to add the selected network as a profile This action opens the Profile Configuration page see Profile Configuration on page 67 The statistics page displays the connection related statistics with detail counter information Figure 47 Station Statistics Station Statistics The Status page shows the settings and current operation status of the Station Transmit Statistics Frames Transmitted Successfully Frames Transmitted Successfully Without Retry Frames Transmitted Successfully After Retryis Frames Fail To Receive ACK After All Retries RTS Frames sucessfully Receive CTS RTS Frames Fail To Receive CTS Receive Statistics Frames Received Successfully 77111 Frames Received With CRC Error 241147 Frames Dropped Due To Outof Resource Duplicat
80. ryption type TKIP or AES is negotiated for each client Pass Phrase The WPA Preshared Key can be input as an ASCII string an easy to remember form of letters and numbers that can include spaces or Hexadecimal format Range 8 63 ASCII characters or exactly 64 Hexadecimal digits Key Renewal Interval Sets the time period for automatically changing data encryption keys and redistributing them to all connected clients Default 3600 seconds Wi Fi Protected Access WPA was introduced as an interim solution for the Mope vulnerability of WEP pending the adoption of a more robust wireless security standard WPA2 includes the complete wireless security standard but also offers backward compatibility with WPA Both WPA and WPA2 provide an enterprise and personal mode of operation For enterprise deployment WPA and WPA2 use IEEE 802 1X for user authentication and require a RADIUS authentication server to be configured on the wired network Data encryption keys are automatically generated and distributed to all clients connected to the network 53 CHAPTER 7 Access Point Mode Wireless Configuration WLAN Security Figure 27 Security Mode WPA security Mode WPA WPA Algorithms COTKIP AES CITKIPAES Key Renewal Interval seconds PMK Cache Period 10 minute Pre Authentication Disable Enable IF Address Port shared Secret session Timeout Idle Timeout The following ite
81. s wer Key Entry Method Hexadecimal wep Key 2 E wep Key 3 E wep Key 4 es The following items are displayed for WEP Shared key security WEP Key Length Sets the length of the WEP key Default 64 bit Options 64 bit 128 bit WEP Key Entry Method Specifies the method for entering the WEP key values Default Hexadecimal Options Hexadecimal Ascii Text Key 1 Key 4 Sets WEP key values The user must first choose between ASCII or Hexadecimal keys At least one key must be specified Each WEP key has an index number Enter key values that match the key type and length settings Standard keys are either 5 or 13 alphanumeric characters or 10 or 26 hexadecimal digits Default Key Sets the WEP key used for authentication Default 1 Range 1 4 F WPA WPA2 PERSONAL SECURITY CHAPTER 9 Ethernet Client Mode Wireless Configuration Profile For small home or office networks WPA and WPA2 provide a simple personal operating mode that uses a pre shared key for network access This mode uses a common password phrase for user authentication that is manually entered on an AP and all wireless client Figure 44 WPA Security Secunty Policy security Mode WPA Personal WPA Algorithms TKIP O AES Pass Phrase The following items are displayed for WPA personal security WPA Algorithms Configure the encryption algorithm for WPA WPA2 Personal security The selection
82. sections as part of a whole which is a work based on the Program the distribution of the whole must be on the terms of this License whose permissions for other licensees extend to the entire whole and thus to each and every part regardless of who wrote it Thus it is not the intent of this section to claim rights or contest your rights to work written entirely by you rather the intent is to exercise the right to control the distribution of derivative or collective works based on the Program In addition mere aggregation of another work not based on the Program with the Program or with a work based on the Program on a volume of a storage or distribution medium does not bring the other work under the scope of this License You may copy and distribute the Program or a work based on it under Section 2 in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following a Accompany it with the complete corresponding machine readable source code which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange or 93 APPENDIX D License Information The GNU General Public License b Accompany it with a written offer valid for at least three years to give any third party for a charge no more than your cost of physically performing source distribution a complete machine readable copy of the corresponding source c
83. ss devices without a valid WEP key will be excluded from network traffic 98 GLOSSARY WPA PSK WPA Pre shared Key WPA PSK can be used for small office networks with a limited number of users that may not need a high level of security WPA PSK provides a simple security implementation that uses just a pre shared password for network access 99 NUMERICS 10 100BASE TX pin assignments 90 802 11n settings 40 A access categories WMM 47 access point connections 22 Access Point Mode setting 37 Access Point Mode LAN Setting 38 access policy settings 57 AES encryption 53 aggregate MSDU 43 AP isolation 42 authentication options 50 B beacon interval 45 BG protection mode 45 C channel setting 42 common web page buttons 30 configuration settings 80 crossover cables 91 D data beacon rate 45 default IP address 28 35 default Key WEP 51 Description of Capabilities 18 desktop mounting 2 7 dimensions physical 87 DTIM setting 45 E encryption options 50 enterprise mode WPA 53 Ethernet client 24 Ethernet Client Mode 37 Ethernet Client Mode LAN Setting 63 Ethernet port 21 export configuration 80 extension channel setting 43 INDEX F factory default 21 factory defaults resetting 80 firmware upgrade 79 fragmentation threshold 45 frequency setting 42 G guard interval 43 H Hardware Description 19 home page 36 horizontal surface mounting 27 HT channel bandwidth 43 i
84. system time Time Zone Specifies the time zone in relation to Greenwich Mean Time GMT SNTP Server The IP address or URL of the NTP server to be used SNTP synchronization Sets the SNTP sycnronization in hours 78 CHAPTER 10 Administration Settings Firmware Upgrade FIRMWARE UPGRADE You can update the Wireless N Access Point Repeater firmware by using the Firmware Update facility Figure 50 Firmware Upgrade Firmware Upgrade This section allows you to upgrade to the latest firmware To upgrade the firmware connect your PC to one of the LAN ports via a standard Ethernet cable Click Browse and select the firmware image saved on your PC Then click Apply Firmware upgrade takes approximately 3 minutes Do NOT interrupt while the firmware upgrade is in process Firmware Upgrade software Version V0 0 0 9 Location Apply The following items are displayed on this page Firmware Upgrade Allows you to upload new firmware manually by specifying a file path Make sure the firmware you want to use is on the local computer by clicking Browse to search for the firmware to be used for the update Software Version The current version number of the firmware Browse Opens a directory on the local hard drive for specifying the path of the file to upload Apply Starts the upload procedure gt JO CHAPTER 10 Administration Settings Configuration Settings C
85. t to the access point without verifying its identity Shared Uses Wired Equivalent Privacy WEP to verify client identity by distributing a shared key to clients before attempting authentication WPA Personal Wi Fi Protected Access WPA employs a combination of technologies to provide an enhanced security solution for wireless networks The WPA Pre shared Key WPA PSK or WPA Personal mode for small networks uses a common password phrase that must be manually distributed to all clients that want to connect to a network WPA2 Personal A security enhancement to WPA that includes stronger encryption based on the AES algorithm which is considered fully secure The WPA2 Personal mode also requires a common password phrase that must be manually distributed to all clients that want to connect to a network 69 CHAPTER 9 Ethernet Client Mode Wireless Configuration Profile WEP SHARD KEY Wired Equivalent Privacy WEP provides a basic level of security SECURITY preventing unauthorized access to the network and encrypting data transmitted between wireless clients WEP uses static shared keys fixed length hexadecimal or alphanumeric strings that are manually distributed to all clients that want to use the network When WEP shared key security is enabled you must configure at least one key Figure 43 WEP Security Security mode SHARED o Wire Equivalence Protection WEP WEP KeyLength 64 bit 10 hex digits 5 ascii key
86. ta Netherlands Norway Poland Portugal Romania Slovakia Slovenia Spain Sweden Switzerland United Kingdom Note The user must use the configuration utility provided with this product to ensure the channels of operation are in conformance with the spectrum usage rules for European Community countries as described below This device will automatically limit the allowable channels determined by the current country of operation Incorrectly entering the country of operation may result in illegal operation and may cause harmful interference to other systems The user is obligated to ensure the device is operating according to the channel limitations indoor outdoor restrictions and license requirements for each European Community country as described in this document DECLARATION OF CONFORMITY IN LANGUAGES OF THE EUROPEAN COMMUNITY Czech Manufacturer t mto prohla uje Ze tento Radio LAN device je ve shod se z kladn mi Cesky po adavky a dal mi p slu n mi ustanoven mi sm rnice 1999 5 ES Estonian K esolevaga kinnitab Manufacturer seadme Radio LAN device vastavust direktiivi 1999 Eesti 5 EU p hin uetele ja nimetatud direktiivist tulenevatele teistele asjakohastele s tetele English Hereby Manufacturer declares that this Radio LAN device is in compliance with the essential requirements and other relevant provisions of Directive 1999 5 EC Finnish Valmistaja Manufacturer vakuuttaa t ten ett Radi
87. the party responsible for compliance could void the user s authority to operate this equipment IEEE 802 11b or 802 119 operation of this product in the U S A is firmware limited to channels 1 through 11 IMPORTANT NOTE FCC RADIATION EXPOSURE STATEMENT This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment This equipment should be installed and operated with minimum distance 20 cm between the radiator and your body COMPLIANCES IC STATEMENT This Class B digital apparatus complies with Canadian ICES 003 Operation is subject to the following two conditions 1 this device may not cause interference and 2 this device must accept any interference including interference that may cause undesired operation of the device Cet appareil num rique de la classe B conforme a la norme NMB 003 du Canada The device could automatically discontinue transmission in case of absence of information to transmit or operational failure Note that this is not intended to prohibit transmission of control or signaling information or the use of repetitive codes where required by the technology IMPORTANT NOTE IC RADIATION EXPOSURE STATEMENT This equipment complies with IC RSS 102 radiation exposure limits set forth for an uncontrolled environment This equipment should be installed and operated with minimum distance 20 cm between the radiator and your body TAIWAN NCC ARR BAH fs BUR B ERKE
88. the probability of a successful transmission due to smaller frame size If there is significant interference present or collisions due to high network utilization try setting the fragment size to send smaller fragments This will speed up the retransmission of smaller frames However it is more efficient to set the fragment size larger if very little or no interference is present because it requires overhead to send multiple frames Range 256 2346 bytes Default 2346 bytes RTS Threshold Sets the packet size threshold at which a Request to Send RTS signal must be sent to a receiving station prior to the sending station starting communications The access point sends RTS frames to a receiving station to negotiate the sending of a data frame 45 CHAPTER 7 Access Point Mode Wireless Configuration Advanced Settings After receiving an RTS frame the station sends a CTS clear to send frame to notify the sending station that it can start sending data If the RTS threshold is set to 0 the access point always sends RTS Signals If set to 2347 the access point never sends RTS signals If set to any other value and the packet size equals or exceeds the RTS threshold the RTS CTS Request to Send Clear to Send mechanism will be enabled The access points contending for the medium may not be aware of each other The RTS CTS mechanism can solve this Hidden Node Problem Range 1 2347 bytes Default 2347 bytes TX P
89. the web interface the Home page displays The Home page shows the main menu and the method to access the Setup Wizard Figure 10 Home Page SMC Networks SMCWEBS N Setup Wizard Operation Mode Network Settings Wireless Settings Administration Welcome to the SMCWEBS N Home Page If you wish to directly configure or view the status of this device please use the menu bar located above For basic configuration to get started enter Setup Wizard Enter Setup Wizard Copyright 2010 SMC Inc All Rights Reserved O a CHAPTER 4 Initial Configuration Common Web Page Buttons COMMON WEB PAGE BUTTONS SETUP WIZARD STEP 1 LANGUAGE SELECTION The list below describes the common buttons found on most web management pages Apply Applies the new parameters and saves them to memory Also displays a screen to inform you when it has taken affect Clicking Apply returns to the home page Cancel Cancels the newly entered settings and restores the previous settings Next Proceeds to the next step Previous Returns to the previous screen The Wizard is designed to help you configure the basic settings required to get the the Wireless N Access Point Repeater up and running There are only a few basic steps you need to set up the the Wireless N Access Point Repeater and provide a connection Follow these steps Select between English Traditional Chinese Simple Chinese or Korean Click Next
90. this license document but changing it is not allowed Preamble The licenses for most software are designed to take away your freedom to share and change it By contrast the GNU General Public License is intended to guarantee your freedom to share and change free software to make sure the software is free for all its users This General Public License applies to most of the Free Software Foundation s software and to any other program whose authors commit to using it Some other Free Software Foundation software is covered by the GNU Library General Public License instead You can apply it to your programs too When we speak of free software we are referring to freedom not price Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software and charge for this service if you wish that you receive source code or can get it if you want it that you can change the software or use pieces of it in new free programs and that you know you can do these things To protect your rights we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights These restrictions translate to certain responsibilities for you if you distribute copies of the software or if you modify it For example if you distribute copies of such a program whether gratis or for a fee you must give the recipients all the rights that you have You must make sure that they
91. tication The default data encryption type for WPA is TKIP WPA2 PSK Clients using WPA2 with a Pre shared Key are accepted for authentication The default data encryption type for WPA is AES WPA PSK_WPA2 PSK Clients using WPA or WPA2 with a Pre shared Key are accepted for authentication The default data encryption type is TKIP AES WPA Algorithms Selects the data encryption type to use Default is determined by the Security Mode selected 52 WPA ENTERPRISE CHAPTER 7 Access Point Mode Wireless Configuration WLAN Security TKIP Uses Temporal Key Integrity Protocol TKIP keys for encryption WPA specifies TKIP as the data encryption method to replace WEP TKIP avoids the problems of WEP static keys by dynamically changing data encryption keys AES Uses Advanced Encryption Standard AES keys for encryption WPA2 uses AES Counter Mode encryption with Cipher Block Chaining Message Authentication Code CBC MAC for message integrity The AES Counter Mode CBCMAC Protocol AES CCMP provides extremely robust data confidentiality using a 128 bit key Use of AES CCMP encryption is specified as a standard requirement for WPA2 Before implementing WPA2 in the network be sure client devices are upgraded to WPA2 compliant hardware TKIP AES Uses either TKIP or AES keys for encryption WPA and WPA2 mixed modes allow both WPA and WPA2 clients to associate to a common SSID In mixed mode the unicast enc
92. tion Mode Logging In The home page displays the main menu items at the top of the screen and the Setup Wizard See Setup Wizard on page 30 Figure 15 Home Page SMC Networks SMCWEBS N Setup Wizard Operation Mode Network Settings Wireless Settings Administration Welcome to the SMCWEBS N Home Page If you wish to directly configure or view the status of this device please use the menu bar located above For basic configuration to get started enter Setup Wizard Enter Setup Wizard Copyright 2010 SMC Inc All Rights Reserved NoTE The displayed pages and settings may differ depending on whether the unit is in Access Point or Ethernet Client Mode See Operation Mode on page 37 36 OPERATION MODE CHAPTER 5 Operation Mode Operation Mode The Operation Mode Configuration page allows you to set up the mode Suitable for your network environment Figure 16 Operation Mode Operation Mode The Operation Mode Configuration section allows you to select Access Point or Ethernet Client as suited to your network environment Operation Mode Configuration Access Point IS an access point mode that extends a wired LAN to wireless clients Operation Mode The following items are displayed on this page Access Point Mode An access point mode that extends a wired LAN to wireless clients Ethernet Client Mode In the Ethernet client mode the SMCWEBS N will act as a client conne
93. tly Awake Mode Power saving mode is disabled Power Saving Mode Enable the power save operation Channel The radio channel used to communicate with wireless peers in an Ad Hoc network The channel has to be the same for all peer computers Only available when Ad hoc is selected as the network type 11B Preamble Type Sets the length of the signal preamble that is used at the start of a data transmission Use a long preamble 192 microseconds to ensure connection to all 802 11b devices When set to Auto a short 96 microseconds or long preamble will be used depending on the capabilities of other Ad Hoc network devices Only available when Ad hoc is selected as the network type Default Auto RTS Threshold Sets the packet size threshold at which a Request to Send RTS signal must be sent to a receiving station prior to the sending station starting communications The access point sends RTS frames to a receiving station to negotiate the sending of a data frame After receiving an RTS frame the station sends a CTS clear to send frame to notify the sending station that it can start sending data If the RTS threshold is set to 0 the access point always sends RTS signals If set to 2347 the access point never sends RTS signals If set to any other value and the packet size equals or exceeds the RTS threshold the RTS CTS Request to Send Clear to Send mechanism will be enabled The access points contending
94. to 802 11b protocols and data transmission rates up to 11 Mbps 11g only Both 802 11g and 802 11n clients will be able to communicate with the Wireless N Access Point Repeater but the 802 11n clients will be limited to 802 11g protocols and data transmission rates up to 54 Mbps Any 802 11b clients will not be able to communicate with the Wireless N Access Point Repeater ae CHAPTER 7 Access Point Mode Wireless Configuration Basic Settings 11b g n mixed mode All 802 11b g n clients can communicate with the Wireless N Access Point Repeater up to 150 Mbps but data transmission rates may be slowed to compensate for 802 11b g clients 11n only Only 802 11n clients will be able to communicate with the Wireless N Access Point Repeater up to 150 Mbps 11g n mixed mode Both 802 11g and 802 11n clients can communicate with the Wireless N Access Point Repeater up to 150 Mbps but data transmission rates may be slowed to compensate for 802 11g clients Network Name SSID The name of the wireless network service provided by the Wireless N Access Point Repeater Clients that want to connect to the network must set their SSID to the same as that of the Wireless N Access Point Repeater Default SMC Range 1 32 characters Multiple SSID1 SSID3 Three additional VAP interface supported on the device Default no name configured Range 1 32 characters Broadcast Network Name SSID By default the
95. to proceed to the next step of the wizard Figure 11 Wizard Step 1 Language Selection Setup Wizard Please select language Language Settings Select Language English The following items are displayed on the first page of the Setup Wizard Select Language Selects English Traditional Chinese Simple Chinese or Korean as the interface language 30 CHAPTER 4 Initial Configuration Setup Wizard STEP 2 TIME The Step 2 page of the Wizard configures time zone and SNTP settings SETTINGS Select a time zone according to where the device is operated Click Next after completing the setup Figure 12 Wizard Step 2 Time and SNTP Settings Time Setting Setup Wizard nes pe Your Time Zone Settings can be input on this page Time Zone Settings Current Time Fri 19 Mar 2010 11 45 00 Sync with host Time Zone GMT 11 00 Midway Island Samoa time nist gov SNTP Server ex time nist gov ntp0 broad mit edu time stdtime gov tw sNTP synchronization hours 6 The following items are displayed on this page Current Time Receives a time and date stamp from an SNTP server Time Zone Select the time zone that is applicable to your region SNTP Server Enter the address of an SNTP server to receive time updates SNTP synchronization hours Specify the interval between SNTP server updates STEP 3 WIRELESS The Step
96. tocol AES CCMP provides extremely robust data confidentiality using a 128 bit key Use of AES CCMP encryption is specified as a standard requirement for WPA2 Before implementing WPA2 in the network be sure client devices are upgraded to WPA2 compliant hardware TKIP AES Uses either TKIP or AES keys for encryption WPA and WPA2 mixed modes allow both WPA and WPA2 clients to associate to a common SSID In mixed mode the unicast encryption type TKIP or AES is negotiated for each client Key Renewal Interval Sets the time period for automatically changing data encryption keys and redistributing them to all connected clients Default 3600 seconds PMK Cache Period WPA2 provides fast roaming for authenticated clients by retaining keys and other security information in a cache so that if a client roams away from an access point and then returns reauthentication is not required This parameter sets the time for deleting the cached WPA2 Pairwise Master Key PMK security information Default 10 minutes Pre Authentication When using WPA2 pre authentication can be enabled that allows clients to roam to another access point and be quickly associated without performing full 802 1 authentication Default Disable IEEE 802 1X AND IEEE 802 1X is a standard framework for network access control that uses RADIUS a central RADIUS server for user authentication This control feature prevents unauthorized access to the ne
97. too receive or can get the source code And you must show them these terms so they know their rights We protect your rights with two steps 1 copyright the software and 2 offer you this license which gives you legal permission to copy distribute and or modify the software Also for each author s protection and ours we want to make certain that everyone understands that there is no warranty for this free software If the software is modified by someone else and passed on we want its recipients to know that what they have is not the original so that any problems introduced by others will not reflect on the original authors reputations Finally any free program is threatened constantly by software patents We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses in effect making the program proprietary To prevent this we have made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification follow a OF APPENDIX D License Information The GNU General Public License GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION 1 This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License The Program below refers t
98. twork by requiring an 802 1X client application to submit user credentials for authentication The 802 1X standard uses the Extensible Authentication Protocol EAP to pass user credentials either digital certificates user names and passwords or other from the client to the RADIUS server Client authentication is then verified on the RADIUS server before the client can access the network Remote Authentication Dial in User Service RADIUS is an authentication protocol that uses software running on a central server to control access to RADIUS aware devices on the network An authentication server contains a database of user credentials for each user that requires access to the network The WPA and WPAZ2 enterprise security modes use 802 1X as the method of user authentication IEEE 802 1X can also be enabled on its own as a security mode for user authentication When 802 1X is used a RADIUS server must be configured and be available on the connected wired network 55 CHAPTER 7 Access Point Mode Wireless Configuration WLAN Security NoTE This guide assumes that you have already configured RADIUS server s to support the access point Configuration of RADIUS server software is beyond the scope of this guide refer to the documentation provided with the RADIUS server software Figure 28 Security Mode 802 1X Security Mode v o02 1x WEP WEP Disable Enable IF Address Fort Session Timeout shared Secret fs
99. under this License Any attempt otherwise to copy modify sublicense or distribute the Program is void and will automatically terminate your rights under this License However parties who have received copies or rights from you under this License will not have their licenses terminated so long as such parties remain in full compliance You are not required to accept this License since you have not signed it However nothing else grants you permission to modify or distribute the Program or its derivative works These actions are prohibited by law if you do not accept this License Therefore by modifying or distributing the Program or any work based on the Program you indicate your acceptance of this License to do so and all its terms and conditions for copying distributing or modifying the Program or works based on it Each time you redistribute the Program or any work based on the Program the recipient automatically receives a license from the original licensor to copy distribute or modify the Program subject to these terms and conditions You may not impose any further restrictions on the recipients exercise of the rights granted herein You are not responsible for enforcing compliance by third parties to this License If as a consequence of a court judgment or allegation of patent infringement or for any other reason not limited to patent issues conditions are imposed on you whether by court order agreement or otherwise that
100. uration of WDS parameters for the purpose of bridging or creating a repeater application Wireless Distribution System WDS WDS Mode Bridge Mode Physical CCK Encryption Type Encryption Key AP MAC Address Encryption Type Encryption Key AP MAC Address Encryption Type Encryption Key AP MAC Address The WDS settings configure WDS related parameters Up to four MAC addresses can be specified for each unit in the WDS network WDS links may either be manually configured Bridge and Repeater modes or auto discovered Lazy mode The following items are displayed on this page WDS Mode Selects the WDS mode of the SSID Options Disable Lazy Bridge Repeater Default Disable Disable WDS is disabled Lazy Operates in an automatic mode that detects and learns WDS peer addresses from received WDS packets without the need to configure a WDS MAC list entry This feature allows the Wireless N Access Point Repeater to associate with other Wireless N Access Point Repeaters in the network and use their WDS MAC list Lazy mode requires one other Wireless N Access Point Repeater within the wireless network that is configured in Bridge or Repeater mode and has a configured MAC address list Bridge Operates as a standard bridge that forwards traffic between WDS links links that connect to other units in Repeater or Lazy mode The MAC addresses of WDS peers must be configured on the Wireless N Access Point R
101. ures illustrate an example WDS network Figure 30 shows the manual set up of MAC addresses for units in the WDS network Figure 31 shows the basic configuration required on each unit in the WDS network 57 CHAPTER 7 Access Point Mode Wireless Configuration Wireless Distribution System WDS Figure 30 Manual WDS MAC Address Configuration Wired Network NO MAC 00 22 2D 62 EA 44 a MAC 00 22 2D 62 EA 11 5N K ae eg ae WDS MAC List i p 00 22 2D 62 EA 22 d e 00 22 2D 62 EA 33 k 00 22 2D 62 EA 44 MAC 00 22 2D 62 EA 22 ee a _ _ gt MAC 00 22 2D 62 EA 33 00 22 2D 62 EA 11 a WDS MAC List 00 22 2D 62 EA 11 Figure 31 WDS Configuration Example Wired Network WDS Link _ _ gt a Ss m gt gt gt NSM Si WDS Mode Lazy Nk DHCP Server Disable WDS Mode Bridge N Lle DHCP eror eee SS LAN IP Address 192 168 2 4 z LAN IP Address 192 168 2 10 WDS Mode Repeater _ WDS Mode Lazy DHCP Server Disable 7T a 7T a 7 T DHCP Server Disable LAN IP Address 192 168 2 2 LAN IP Address 192 168 2 3 NoTE When using WDS Lazy mode in the network at least one unit must be set to Bridge or Repeater mode 58 CHAPTER 7 Access Point Mode Wireless Configuration Wireless Distribution System WDS Figure 32 WDS Configuration Wireless Distribution System WDS The Wireless Distribution page allows config
102. wing items are displayed in this section on this page Security Mode Configures the WEP security mode used by clients When using WEP be sure to define at least one static WEP key for the Wireless N Access Point Repeater and all its clients Default Disable OPEN Open system authentication accepts any client attempting to connect the Wireless N Access Point Repeater without verifying its identity In this mode the default data encryption type is WEP SHARED The shared key security uses a WEP key to authenticate clients connecting to the network and for data encryption WEP AUTO Allows wireless clients to connect to the network using Open WEP uses WEP for encryption only or Shared WEP uses WEP for authentication and encryption Encrypt Type Selects WEP for data encryption OPEN mode only Default Key Selects the WEP key number to use for authentication or data encryption If wireless clients have all four WEP keys configured to the same values you can change the encryption key to any of the settings without having to update the client keys Default 1 Range 1 4 51 CHAPTER 7 Access Point Mode Wireless Configuration WLAN Security WEP Keys 1 4 Sets WEP key values The user must first select ASCII or hexadecimal keys Each WEP key has an index number Enter key values that match the key type and length settings Enter 5 alphanumeric characters or 10 hexadecimal digits fo
103. you to configure the wireless network name Service Set Identifier or SSID and set the wireless security method Click on Wireless Settings followed by Basic Figure 18 Basic Settings Basic Wireless Settings This section allows you to configure basic wireless features such as SSID settings as well as HT Physical Mode settings lwiretess On off Network Mode Tib g n mixed mode Network Name SSID SMC Hide LJ mutipie s8101 Hide L mutipie s8102 Hide L mutipie ss103 Hide L Broadcast Network Name SSID Enable Disable AP Isolation O Enable Disable Messio AP Isolation O Enable Disable B3510 00 222D 834 E238 Frequency Channel AutoSelect The following items are displayed on this page Wireless On Off Enables or Disable the radio Default Enable Network Mode Defines the radio operating mode Default 11g n Mixed 11b g mixed mode Both 802 11b and 802 11g clients can communicate with the Wireless N Access Point Repeater up to 108 Mbps but data transmission rates may be slowed to compensate for 802 11b clients Any 802 11n clients will also be able to communicate with the Wireless N Access Point Repeater but they will be limited to 802 11g protocols and data transmission rates 11b only All 802 11b 802 11g and 802 11n clients will be able to communicate with the Wireless N Access Point Repeater but the 802 11g and 802 11n clients will be limited
Download Pdf Manuals
Related Search
Related Contents
BP-302 取扱説明書 カタログⅢ GRESNET - Fixcer 取扱説明書(PDF:2619KB) BRILLIANCE - Crem International UK Ltd St. Leonhard Montre bracelet en inox avec cadran design USER MANUAL - Personal Information Lorex LDC7081 surveillance camera Copyright © All rights reserved.
Failed to retrieve file