all | frequencies |
|
|
|
|
exhibits | applications |
---|---|---|---|---|---|---|---|
manuals |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
1 |
|
User Manual Part 1 | Users Manual | 1.41 MiB | May 05 2003 | |||
1 |
|
User Manual Part 2 | Users Manual | 2.66 MiB | May 05 2003 | |||
1 |
|
User Manual Part 3 | Users Manual | 2.62 MiB | May 05 2003 | |||
1 |
|
User Manual Part 4 | Users Manual | 1.41 MiB | May 05 2003 | |||
1 | Test Report | |||||||
1 | Cover Letter(s) | |||||||
1 | Cover Letter(s) | |||||||
1 | Attestation Statements | |||||||
1 | External Photos | |||||||
1 | Internal Photos | |||||||
1 | ID Label/Location Info | |||||||
1 | ID Label/Location Info | |||||||
1 | Operational Description | |||||||
1 | RF Exposure Info | July 05 2003 | ||||||
1 | Test Report | |||||||
1 | Test Setup Photos |
1 | User Manual Part 1 | Users Manual | 1.41 MiB | May 05 2003 |
Barricade ADSL Router Wireless Broadband Router with built-in ADSL Modem N Compatible with all leading DSLAMs N Firewall (hacker attack logging, DoS, and client filtering) N Supports DMT line modulation N Four auto-negotiating 10/100 Ethernet ports N Built-in print server N PPTP, L2TP, and IPSec pass through N Multiple user Internet access with a single-user account N Supports PPPoE and PPPoA N Plug & Play installation N Web-based management User Guide SMC7404WBRA Wireless Broadband Router with built-in ADSL Modem From SMCs line of award-winning connectivity solutions 38 Tesla Irvine, CA 92618 Phone: (949) 679-8000 March 2003 Part No: 750.9077 R01 Pub No: 150000018500E R01 Information furnished is believed to be accurate and reliable. However, no responsibility is assumed by our company for its use, nor for any infringements of patents or other rights of third parties which may result from its use. No license is granted by implication or otherwise under any patent or patent rights of our company. We reserve the right to change specifications at any time without notice. Copyright 2003 by SMC Networks, Inc. 38 Tesla Irvine, CA 92618 All rights reserved. Printed in Taiwan Trademarks:
SMC is a registered trademark; and Barricade is a trademark of SMC Networks, Inc. Other product and company names are trademarks or registered trademarks of their respective holders. LIMITED WARRANTY Limited Warranty Statement: SMC Networks, Inc. (SMC) warrants its products to be free from defects in workmanship and materials, under normal use and service, for the applicable warranty term. All SMC products carry a standard 90-day limited warranty from the date of purchase from SMC or its Authorized Reseller. SMC may, at its own discretion, repair or replace any product not operating as warranted with a similar or functionally equivalent product, during the applicable warranty term. SMC will endeavor to repair or replace any product returned under warranty within 30 days of receipt of the product. The standard limited warranty can be upgraded to a Limited Lifetime* warranty by registering new products within 30 days of purchase from SMC or its Authorized Reseller. Registration can be accomplished via the enclosed product registration card or online via the SMC Web site. Failure to register will not affect the standard limited warranty. The Limited Lifetime warranty covers a product during the Life of that Product, which is defined as the period of time during which the product is an Active SMC product. A product is considered to be Active while it is listed on the current SMC price list. As new technologies emerge, older technologies become obsolete and SMC will, at its discretion, replace an older product in its product line with one that incorporates these newer technologies. At that point, the obsolete product is discontinued and is no longer an Active SMC product. A list of discontinued products with their respective dates of discontinuance can be found at:
http://www.smc.com/index.cfm?action=customer_service_warranty. All products that are replaced become the property of SMC. Replacement products may be either new or reconditioned. Any replaced or repaired product carries either a 30-day limited warranty or the remainder of the initial warranty, whichever is longer. SMC is not responsible for any custom software or firmware, configuration information, or memory data of Customer contained in, stored on, or integrated with any products returned to SMC pursuant to any warranty. Products returned to SMC should have any customer-installed accessory or add-on components, such as expansion modules, removed prior to returning the product for replacement. SMC is not responsible for these items if they are returned with the product. Customers must contact SMC for a Return Material Authorization number prior to returning any product to SMC. Proof of purchase may be required. Any product returned to SMC without a valid Return Material Authorization (RMA) number clearly marked on the outside of the package will be returned to customer at customers expense. For warranty claims within North America, please call our toll-free customer support number at (800) 762-4968. Customers are responsible for all shipping charges from their facility to SMC. SMC is responsible for return shipping charges from SMC to customer. i LIMITED WARRANTY WARRANTIES EXCLUSIVE: IF AN SMC PRODUCT DOES NOT OPERATE AS WARRANTED ABOVE, CUSTOMERS SOLE REMEDY SHALL BE REPAIR OR REPLACEMENT OF THE PRODUCT IN QUESTION, AT SMCS OPTION. THE FOREGOING WARRANTIES AND REMEDIES ARE EXCLUSIVE AND ARE IN LIEU OF ALL OTHER WARRANTIES OR CONDITIONS, EXPRESS OR IMPLIED, EITHER IN FACT OR BY OPERATION OF LAW, STATUTORY OR OTHERWISE, INCLUDING WARRANTIES OR CONDITIONS OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. SMC NEITHER ASSUMES NOR AUTHORIZES ANY OTHER PERSON TO ASSUME FOR IT ANY OTHER LIABILITY IN CONNECTION WITH THE SALE, INSTALLATION, MAINTENANCE OR USE OF ITS PRODUCTS. SMC SHALL NOT BE LIABLE UNDER THIS WARRANTY IF ITS TESTING AND EXAMINATION DISCLOSE THE ALLEGED DEFECT IN THE PRODUCT DOES NOT EXIST OR WAS CAUSED BY CUSTOMERS OR ANY THIRD PERSONS MISUSE, NEGLECT, IMPROPER INSTALLATION OR TESTING, UNAUTHORIZED ATTEMPTS TO REPAIR, OR ANY OTHER CAUSE BEYOND THE RANGE OF THE INTENDED USE, OR BY ACCIDENT, FIRE, LIGHTNING, OR OTHER HAZARD. LIMITATION OF LIABILITY: IN NO EVENT, WHETHER BASED IN CONTRACT OR TORT (INCLUDING NEGLIGENCE), SHALL SMC BE LIABLE FOR INCIDENTAL, CONSEQUENTIAL, INDIRECT, SPECIAL, OR PUNITIVE DAMAGES OF ANY KIND, OR FOR LOSS OF REVENUE, LOSS OF BUSINESS, OR OTHER FINANCIAL LOSS ARISING OUT OF OR IN CONNECTION WITH THE SALE, INSTALLATION, MAINTENANCE, USE, PERFORMANCE, FAILURE, OR INTERRUPTION OF ITS PRODUCTS, EVEN IF SMC OR ITS AUTHORIZED RESELLER HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OF IMPLIED WARRANTIES OR THE LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES FOR CONSUMER PRODUCTS, SO THE ABOVE LIMITATIONS AND EXCLUSIONS MAY NOT APPLY TO YOU. THIS WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS, WHICH MAY VARY FROM STATE TO STATE. NOTHING IN THIS WARRANTY SHALL BE TAKEN TO AFFECT YOUR STATUTORY RIGHTS.
* SMC will provide warranty service for one year following discontinuance from the active SMC price list. Under the limited lifetime warranty, internal and external power supplies, fans, and cables are covered by a standard one-year warranty from date of purchase. SMC Networks, Inc. 38 Tesla Irvine, CA 92618 ii COMPLIANCES Mobile of end product Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures:
Reorient or relocate the receiving antenna. Connect the equipment into an outlet on a circuit different from that to which the receiver Increase the separation between the equipment and receiver. is connected. Consult the dealer or an experienced radio/TV technician for help. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment. IMPORTANT NOTE:
FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. Industry Canada - Class B This digital apparatus does not exceed the Class B limits for radio noise emissions from digital apparatus as set out in the interference-causing equipment standard entitled Digital Apparatus, ICES-003 of Industry Canada. Cet appareil numrique respecte les limites de bruits radiolectriques applicables aux appareils numriques de Classe B prescrites dans la norme sur le matrial brouilleur: Appareils Numriques, NMB-003 dicte par lIndustrie. iii COMPLIANCES Australia AS/NZS 3548 (1995) - Class B SMC contact for products in Australia is:
SMC-Australia L9, 123 Epping Rd., North Ryde, NSW Australia Phone: 61-2-88757887 Fax: 61-2-88757777 EC Conformance Declaration - Class B This information technology equipment complies with the requirements of the Council Directive 89/336/EEC on the Approximation of the laws of the Member States relating to Electromagnetic Compatibility and 73/23/EEC for electrical equipment used within certain voltage limits and the Amendment Directive 93/68/EEC. For the evaluation of the compliance with these Directives, the following standards were applied:
RFI Emission: Limit class B according to EN 55022:1998 Limit class B for harmonic current emission according to EN 61000-3-2/
1995 Limitation of voltage fluctuation and flicker in low-voltage supply system according to EN 61000-3-3/1995 Immunity:
Product family standard according to EN 55024:1998 Electrostatic Discharge according to EN 61000-4-2:1995
(Contact Discharge: 4 kV, Air Discharge: 8 kV) Radio-frequency electromagnetic field according to EN 61000-4-3:1996
(80 - 1000 MHz with 1 kHz AM 80% Modulation: 3 V/m) Electrical fast transient/burst according to EN 61000-4-4:1995 (AC/DC power supply: 1 kV, Data/Signal lines: 0.5 kV) Surge immunity test according to EN 61000-4-5:1995
(AC/DC Line to Line: 1 kV, AC/DC Line to Earth: 2 kV) Immunity to conducted disturbances, Induced by radio-frequency fields:
EN 61000-4-6:1996 (0.15~80 MHz with 1 kHz AM 80% Modulation: 3 V/m) Power frequency magnetic field immunity test according to EN 61000-4-8:1993 (1 A/m at frequency 50 Hz) Voltage dips, short interruptions and voltage variations immunity test according to EN 61000-4-11:1994 (>95% Reduction @10 ms, 30%
Reduction @500 ms, >95% Reduction @5000 ms) LVD:
EN 60950 (A1/1992; A2/1993; A3/1993; A4/1995; A11/1997) iv COMPLIANCES Safety Compliance Wichtige Sicherheitshinweise (Germany) 1. Bitte lesen Sie diese Hinweise sorgfltig durch. 2. Heben Sie diese Anleitung fr den spteren Gebrauch auf. 3. Vor jedem Reinigen ist das Gert vom Stromnetz zu trennen. Verwenden Sie keine Flssigoder Aerosolreiniger. Am besten eignet sich ein angefeuchtetes Tuch zur Reinigung. 4. Die Netzanschlu steckdose soll nahe dem Gert angebracht und leicht zugnglich sein. 5. Das Gert ist vor Feuchtigkeit zu schtzen. 6. Bei der Aufstellung des Gertes ist auf sicheren Stand zu achten. Ein Kippen oder Fallen knnte Beschdigungen hervorrufen. 7. Die Belftungsffnungen dienen der Luftzirkulation, die das Gert vor berhitzung schtzt. Sorgen Sie dafr, da diese ffnungen nicht abgedeckt werden. 8. Beachten Sie beim Anschlu an das Stromnetz die Anschluwerte. 9. Verlegen Sie die Netzanschluleitung so, da niemand darber fallen kann. Es sollte auch nichts auf der Leitung abgestellt werden. 10. Alle Hinweise und Warnungen, die sich am Gert befinden, sind zu beachten. 11. Wird das Gert ber einen lngeren Zeitraum nicht benutzt, sollten Sie es vom Stromnetz trennen. Somit wird im Falle einer berspannung eine Beschdigung vermieden. 12. Durch die Lftungsffnungen drfen niemals Gegenstnde oder Flssigkeiten in das Gert gelangen. Dies knnte einen Brand bzw. elektrischen Schlag auslsen. 13. ffnen sie niemals das Gert. Das Gert darf aus Grnden der elektrischen Sicherheit nur von authorisiertem Servicepersonal geffnet werden. 14. Wenn folgende Situationen auftreten ist das Gert vom Stromnetz zu trennen und von einer qualifizierten Servicestelle zu berprfen:
a. Netzkabel oder Netzstecker sind beschdigt. b. Flssigkeit ist in das Gert eingedrungen. c. Das Gert war Feuchtigkeit ausgesetzt. d. Wenn das Gert nicht der Bedienungsanleitung entsprechend funktioniert oder Sie mit Hilfe dieser Anleitung keine Verbesserung erzielen. e. Das Gert ist gefallen und/oder das Gehuse ist beschdigt. f. Wenn das Gert deutliche Anzeichen eines Defektes aufweist. 15. Zum Netzanschlu dieses Gertes ist eine geprfte Leitung zu verwenden. Fr einen Nennstrom bis 6 A und einem Gertegewicht grer 3 kg ist eine Leitung nicht leichter als H05VV-F, 3G, 0.75 mm2 einzusetzen. Der arbeitsplatzbezogene Schalldruckpegel nach DIN 45 635 Teil 1000 betrgt 70 dB(A) oder weniger. v COMPLIANCES vi TABLE OF CONTENTS 1 2 3 Introduction . 1-1 About the Barricade . 1-1 Features . 1-1 Applications . 1-2 Installation . 2-1 Package Contents . 2-1 System Requirements . 2-2 Hardware Description . 2-3 LED Indicators . 2-4 ISP Settings . 2-5 Connect the System . 2-5 Connect the ADSL Line . 2-5 Phone Line Configuration . 2-6 Connect the Power Adapter . 2-8 Configuring Client PC . 3-1 TCP/IP Configuration . 3-1 Windows 95/98/Me . 3-2 Disable HTTP Proxy . 3-5 Obtain IP Settings from Your ADSL Router . 3-7 Windows NT 4.0 . 3-8 Disable HTTP Proxy . 3-10 Obtain IP Settings from Your Barricade . 3-11 Windows 2000 . 3-13 Disable HTTP Proxy . 3-14 Obtain IP Settings from Your Barricade . 3-15 Windows XP . 3-17 Disable HTTP Proxy . 3-19 Obtain IP Settings from Your Barricade . 3-19 Configuring Your Macintosh Computer . 3-21 Disable HTTP Proxy . 3-23 Obtain IP Settings from Your Barricade . 3-25 vii TABLE OF CONTENTS Configuring the Barricade . 4-1 Navigating the Web Browser Interface . 4-2 Making Configuration Changes . 4-2 Setup Wizard . 4-3 Time Zone . 4-3 Internet Sharing . 4-4 Disable Internet Sharing - Parameter Setting . 4-5 Disable Internet Sharing - Finish . 4-6 PPPoE & PPPoA - Parameter Setting . 4-7 PPPoE & PPPoA - Finish . 4-8 Multiple Protocol over ATM Mode - Parameter Setting . 4-10 Multiple Protocol over ATM Mode - Finish . 4-11 Advanced Setup . 4-13 System Settings . 4-15 Time Zone . 4-15 Password Settings . 4-16 Remote Management . 4-17 DNS . 4-18 WAN . 4-19 PPPoE (PPP over Ethernet) . 4-19 ATM . 4-21 ISP . 4-22 LAN . 4-23 Wireless . 4-25 Channel and SSID . 4-26 Encryption . 4-28 MAC Address Filtering . 4-29 NAT . 4-30 Address Mapping . 4-30 Virtual Server . 4-31 Routing System . 4-33 Static Route . 4-33 RIP . 4-34 Routing Table . 4-36 4 viii TABLE OF CONTENTS Firewall . 4-37 Access Control . 4-38 URL Blocking . 4-40 Schedule Rule . 4-41 Intrusion Detection . 4-42 DMZ . 4-46 SNMP . 4-47 Community . 4-47 Trap . 4-48 ADSL . 4-49 Parameters . 4-49 Status . 4-50 Tools . 4-53 Configuration Tools . 4-53 Firmware Upgrade . 4-54 Reset . 4-55 Status . 4-56 Finding the MAC address of a Network Card . 4-57 Windows 95/98/ME . 4-57 Windows NT4/2000/XP . 4-57 Linux . 4-57 5 Configuring Printer Services . 5-1 Printer Server Setup in Windows 95/98/Me . 5-1 Printer Server Setup in Windows NT . 5-4 Printer Server Setup in Windows 2000 . 5-6 Printer Server Setup in Windows XP . 5-8 Printer Server Setup in Unix Systems . 5-18 ix TABLE OF CONTENTS A B Troubleshooting . A-1 Cables . B-1 Ethernet Cable . B-1 Specifications . B-1 Wiring Conventions . B-1 RJ-45 Port Connection . B-2 Pin Assignments . B-3 Straight-Through Wiring . B-3 Crossover Wiring . B-4 ADSL Cable . B-5 Specifications . B-5 Wiring Conventions . B-5 C Specifications . C-1 Glossary x CHAPTER 1 INTRODUCTION Congratulations on your purchase of the Barricade Wireless Broadband Router with built-in ADSL Modem (SMC7404WBRA). We are proud to provide you with a powerful yet simple communication device for connecting your local area network (LAN) to the Internet. For those who want to surf the Internet in the most secure way, this Router provides a convenient and powerful solution. About the Barricade The Barricade provides Internet access to multiple users by sharing a single-user account. Support is provided for both wired and wireless devices. New technology provides wireless security via WEP (Wired Equivalent Privacy) encryption and MAC address filtering. It is simple to configure and can be up and running in minutes. Features Internet connection via an RJ-11 WAN port. Local network connection via four 10/100 Mbps Ethernet ports. On-board IEEE 802.11b 11 Mbps wireless network adapter. DHCP for dynamic IP configuration, and DNS for domain name mapping. Firewall with Stateful Packet Inspection, client privileges, intrusion detection, and NAT. 1-1 INTRODUCTION NAT also enables multi-user Internet access via a single user account, and virtual server functionality (providing protected access to Internet services such as Web, FTP, e-mail, and Telnet). VPN pass-through (IPSec-ESP Tunnel mode, L2TP, PPTP). User-definable application sensing tunnel supports applications requiring multiple connections. Easy setup through a Web browser on any operating system that supports TCP/IP. Compatible with all popular Internet applications. Applications Many advanced networking features are provided by the Barricade:
Wireless and Wired LAN The Barricade provides connectivity to wired 10/100 Mbps devices, and wireless IEEE 802.11b compatible devices, making it easy to create a network in small offices or homes. Internet Access This device supports Internet access through an ADSL connection. Since many ADSL providers use PPPoE or PPPoA to establish communications with end users, the Barricade includes built-in clients for these protocols, eliminating the need to install these services on your computer. Shared IP Address The Barricade provides Internet access for up to 253 users via a single shared IP address. Using only one ISP account, multiple users on your network can browse the Web at the same time. 1-2 APPLICATIONS Virtual Server If you have a fixed IP address, you can set the Barricade to act as a virtual host for network address translation. Remote users access various services at your site using a constant IP address. Then, depending on the requested service (or port number), the Barricade can route the request to the appropriate server (at another internal IP address). This secures your network from direct attack by hackers, and provides more flexible management by allowing you to change internal IP addresses without affecting outside access to your network. DMZ Host Support Allows a networked computer to be fully exposed to the Internet. This function is used when NAT and firewall security prevent an Internet application from functioning correctly. Security The Barricade supports security features that deny Internet access to specified users, or filter all requests for specific services that administrator does not want to serve. The Barricades firewall also blocks common hacker attacks, including IP Spoofing, Land Attack, Ping of Death, IP with zero length, Smurf Attack, UDP port loopback, Snork Attack, TCP null scan, and TCP SYN flooding. WEP
(Wired Equivalent Privacy), SSID, and MAC filtering provide security over the wireless network. 1-3 INTRODUCTION Virtual Private Network (VPN) The Barricade supports three of the most commonly used VPN protocols PPTP, L2TP, and IPSec. These protocols allow remote users to establish a secure connection to their corporate network. If your service provider supports VPNs, then these protocols can be used to create an authenticated and encrypted tunnel for passing secure data over the Internet (i.e., a traditionally shared data network). The VPN protocols supported by the Barricade are briefly described below. Point-to-Point Tunneling Protocol Provides a secure tunnel for remote client access to a PPTP security gateway. PPTP includes provisions for call origination and flow control required by ISPs. L2TP merges the best features of PPTP and L2F Like PPTP, L2TP requires that the ISPs routers support the protocol. IP Security Provides IP network-layer encryption. IPSec can support large encryption networks (such as the Internet) by using digital certificates for device authentication. 1-4 CHAPTER 2 INSTALLATION Before installing the Barricade Broadband Router with built-in ADSL Modem, verify that you have all the items listed under Package Contents. If any of the items are missing or damaged, contact your local distributor or Service Provider where you acquired the router. Also be sure that you have all the necessary cabling before installing the Barricade. After installing the Barricade, refer to Configuring the Barricade on page 4-1. Package Contents After unpacking the Barricade, check the contents of the box to be sure you have received the following components:
Barricade ADSL Router (SMC7404WBRA) Power adapter One CAT-5 Ethernet cable Telephone patch cable Documentation CD This User Guide Immediately inform your retailer or Service Provider in the event of any incorrect, missing, or damaged parts. If possible, please retain the carton and original packing materials in case there is a need to return the product. 2-1 INSTALLATION System Requirements You must meet the following minimum requirements:
Internet access from your Internet Service Provider (ISP) using an ADSL modem. A PC using a fixed IP address or dynamic IP address assigned via DHCP, as well as a gateway server address and DNS server address from your service provider. A computer equipped with a 10 Mbps, 100 Mbps, or 10/100 Mbps Fast Ethernet card, a USB-to-Ethernet converter, or an IEEE 802.11b wireless network adapter. TCP/IP network protocols installed on each PC that will access the Internet. A Java-enabled Web browser, such as Microsoft Internet Explorer 4.0 or above or Netscape Communicator 4.0 or above installed on one PC at your site for configuring the Barricade. 2-2 HARDWARE DESCRIPTION Hardware Description The Barricade contains an integrated ADSL modem and connects to the Internet or to a remote site using its RJ-11 WAN port. It connects directly to your PC or to a local area network using any of the four RJ-45 Fast Ethernet LAN ports or via a wireless network adapter. Access speed to the Internet depends on your service type. Full-rate ADSL provides up to 8 Mbps downstream and 640 Kbps upstream. G.lite (or splitterless) ADSL provides up to 1.5 Mbps downstream and 512 Kbps upstream. However, you should note that the actual rate provided by specific service providers may vary dramatically from these upper limits. Data passing between devices connected to your local area network can run at up to 100 Mbps over the Fast Ethernet ports and 11 Mbps over the built-in wireless network adapter. The Barricade includes an LED display on the front panel for system power and port indications that simplifies installation and network troubleshooting. It also provides the following ports on the rear panel:
Item LAN Ports Parallel Printer Port Reset Button Power Inlet WAN Port Description Fast Ethernet ports (RJ-45). Connect devices on your local area network to these ports (i.e., a PC, hub, or switch). One parallel printer port that can be connected to a printer. This printer can then be shared by all LAN users. Use this button to reset the power and restore the default factory settings. To reset without losing configuration settings, see Reset on page 4-55. Connect the included power adapter to this inlet. Warning: Using the wrong type of power adapter may cause damage. WAN port (RJ-11). Connect your ADSL line to this port. 2-3 INSTALLATION LED Indicators Verify Status Check the power and port LED indicators. LED Power Ethernet
(4 LEDs) ADSL Syn ADSL Data Condi-
tion On Off On Flashing Off On Flashing Off Flashing Off Status The Barricade is receiving power. Normal operation. Power off or failure. Ethernet Link. Sending/Receiving data. No Link. ADSL connection is functioning correctly. Startup. ADSL connection is not established. Sending/Receiving data. No data transferring. 2-4 ISP SETTINGS ISP Settings Please collect the following information from your ISP before setting up the Barricade (for PPPoE, PPPoA or fixed IP users only):
For PPPoE and PPPoA users An ISP account user name and password ISP authentication type or script (if not PAP/CHAP) For fixed IP users IP address and subnet mask IP address for your ISPs Gateway Server and Domain Name Server Connect the System The Barricade can be positioned at any convenient location in your office or home. No special wiring or cooling requirements are needed. You should, however, comply with the following guidelines:
Keep the Barricade away from any heating devices. Do not place the Barricade in a dusty or wet environment. You should also remember to turn off the power, remove the power cord from the outlet, and keep your hands dry when you install the Barricade. Connect the ADSL Line Run standard telephone cable from the wall jack providing ADSL service to the WAN port on your Barricade. When inserting an ADSL RJ-11 plug, be sure the tab on the plug clicks into position to ensure that it is properly seated. If you are using splitterless ADSL service, add low-pass filters between the ADSL wall jack and your telephones. (These filters pass voice 2-5 INSTALLATION signals through but filter data signals out.) Phone Line Configuration Installing a Full-rate Connection If you are using a full-rate (G.dmt) connection, your service provider will attach the outside ADSL line to a data/voice splitter. In this case you can connect your phones and computer directly to the splitter as shown below:
Plain Old Telephone System (POTS) Residential Connection Point (NID) Voice Splitter Data ADSL Router or Ethernet hub or switch Figure 2-1. Installing with a Splitter 2-6 CONNECT THE SYSTEM Installing a Splitterless Connection If you are using a splitterless (G.lite) connection, then your service provider will attach the outside ADSL line directly to your phone system. In this case you can connect your phones and computer directly to the incoming ADSL line, but you will have to add low-pass filters to your phones as shown below:
Plain Old Telephone System (POTS) Residential Connection Point (NID) Voice Filter Voice
& Data Voice
& Data ADSL Router Data or Ethernet hub or switch Figure 2-2. Installing without a Splitter Attach to Your Network Using Ethernet Cabling The four LAN ports on the Barricade auto-negotiate the connection speed to 10 Mbps Ethernet or 100 Mbps Fast Ethernet, as well as the transmission mode to half duplex or full duplex. 2-7 INSTALLATION Use twisted-pair cabling to connect any of the four LAN ports on the Barricade to an Ethernet adapter on your PC. Otherwise, cascade any of the LAN ports on the Barricade to an Ethernet hub or switch, and then connect your PC or other network equipment to the hub or switch. When inserting an RJ-45 connector, be sure the tab on the connector clicks into position to ensure that it is properly seated. Warning:Do not plug a phone jack connector into an RJ-45 port. This may damage the Barricade. Notes: 1. Use 100-ohm shielded or unshielded twisted-pair cable with RJ-45 connectors for all Ethernet ports. Use Category 3, 4, or 5 for connections that operate at 10 Mbps, and Category 5 for connections that operate at 100 Mbps. 2.Make sure each twisted-pair cable length does not exceed 100 meters (328 feet). Connect the Power Adapter Plug the power adapter into the power socket on the rear of the Barricade, and the other end into a power outlet. Check to confirm the power indicator on the front panel is lit. If the power indicator is not lit, refer to Troubleshooting on page A-1. In case of a power input failure, the Barricade will automatically restart and begin to operate once the input power is restored. If the Barricade is properly configured, it will take about 30 seconds to establish a connection with the ADSL service provider after powering up. During this time the Sync indicator will flash. After the ADSL connection has been established, the ADSL Sync LED will stay on. 2-8 CHAPTER 3 CONFIGURING CLIENT PC After completing hardware setup by connecting all your network devices, you need to configure your computer to connect to the Barricade. First determine how your ISP issues your IP address. Many ISPs issue these numbers automatically using Dynamic Host Configuration Protocol
(DHCP). Other ISPs provide a static IP address and associated numbers, which you must enter manually. How your ISP assigns your IP address determines how you need to configure your computer. See this section for Windows 95/98/Me configuration. See Windows NT 4.0 on page 3-8, Windows 2000 on page 3-13, Windows XP on page 3-17, or Configuring Your Macintosh Computer on page 3-21 depending on your operating system. TCP/IP Configuration To access the Internet through the Barricade, you must configure the network settings of the computers on your LAN to use the same IP subnet as the Barricade. The default network settings for the Barricade are:
IP Address: 192.168.2.1 Subnet Mask: 255.255.255.0 Note: These settings can be changed to fit your network requirements, but you must first configure at least one computer to access the Barricades Web configuration interface in order to make the required changes. (See Configuring the Barricade on page 4-1 for instruction on configuring the Barricade.) 3-1 CONFIGURING CLIENT PC Windows 95/98/Me You may find that the instructions in this section do not exactly match your version of Windows. This is because these steps and screenshots were created from Windows 98. Windows 95 and Windows Millennium Edition are similar, but not identical, to Windows 98. 1. On the Windows desktop, click Start/Settings/Control Panel. 2. In Control Panel, double-click the Network icon. 3-2 3. 4. In the Network window, under the Configuration tab, double-click the TCP/IP item listed for your network card. In the TCP/IP window, select the IP Address tab. If Obtain an IP address automatically is already selected, your computer is already configured for DHCP. Click Cancel to close each window, and skip to Disable HTTP Proxy on page 3-5. If not, locate your IP address and subnet mask. Record the numbers in the space provided on the following page. 5. Click the Gateway tab and record the numbers listed under the Installed gateways field. WINDOWS 95/98/ME 3-3 CONFIGURING CLIENT PC 6. Click the DNS Configuration tab. Locate the DNS servers listed under the DNS Server Search Order field. Record any listed addresses. 7. After writing down your settings, check to make sure you have recorded them correctly. Click OK to close the window. 8. Windows may need your Windows 95/98/Me CD to copy some files. After it finishes copying, it will prompt you to restart your system. Click Yes and your computer will shut down and restart. TCP/IP Configuration Setting IP Address Subnet Mask Primary DNS Server Secondary DNS Server Default Gateway Host Name ____.____.____.____ ____.____.____.____ ____.____.____.____ ____.____.____.____ ____.____.____.____ ____.____.____.____ 3-4 WINDOWS 95/98/ME Disable HTTP Proxy You need to verify that the HTTP Proxy feature of your Web browser is disabled. This is so that your browser can view the Barricades HTML configuration pages. The following steps are for Internet Explorer and Netscape. Determine which browser you use and follow the appropriate steps. Internet Explorer 1. Open Internet Explorer. 2. Click the Stop button, then click Tools/Internet Options. 3. In the Internet Options window, click the Connections tab. Next, click the LAN Settings... button. 4. Clear all the checkboxes. 5. Click OK, and then click OK again to close the Internet Options window. 3-5 CONFIGURING CLIENT PC Netscape 1. Open Netscape. 2. Click the Stop button, and then click Edit/Preferences... 3. In the Preferences window, under the Category field double-click Advanced, then click Proxies. Select Direct connection to the Internet. Click OK. 4. Repeat these steps for each Windows 95/98/Me computer connected to your Barricade. 3-6 WINDOWS 95/98/ME Obtain IP Settings from Your ADSL Router Now that you have configured your computer to connect to your Barricade, it needs to obtain new network settings. By releasing old DHCP IP settings and renewing them with settings from your Barricade, you can also verify that you have configured your computer correctly. 1. On the Windows desktop, click Start/Run... 2. Type WINIPCFG and click OK. It may take a second or two for the IP Configuration window to appear. 3. In the IP Configuration window, select your network card from the drop-down menu. Click Release and then click Renew. Verify that your IP address is now 192.168.2.xxx, your Subnet Mask is 255.255.255.0 and your Default Gateway is 192.168.2.1. These values confirm that your Barricade is functioning. Click OK to close the IP Configuration window. 3-7 CONFIGURING CLIENT PC Windows NT 4.0 After completing the hardware setup by connecting your network devices, you need to configure your computer to connect to the Barricade. First determine how your ISP issues your IP address. Many ISPs issue these numbers automatically using Dynamic Host Configuration Protocol
(DHCP). Other ISPs provide a static IP address and associated numbers, which you must enter manually. How your ISP assigns your IP address determines how you need to configure your computer. Follow these instructions:
1. On the Windows desktop, click Start/Settings/Control Panel. 2. Double-click the Network icon. 3-8 WINDOWS NT 4.0 3. In the Network window, Select the Protocols tab. Double-click TCP/IP Protocol. 4. When the Microsoft TCP/IP Properties window open, select the IP Address tab. 5. 6. In the Adapter drop-down list, be sure your Ethernet adapter is selected. If Obtain an IP address automatically is already selected, your computer is already configured for DHCP. Click Cancel to close each window, and skip to Disable HTTP Proxy on page 3-10. 7. In the TCP/IP Properties window, under the IP Address tab, locate your IP Address, Subnet Mask, and Default Gateway. Record these values in the spaces provided on the following page. 3-9 CONFIGURING CLIENT PC 8. Click the DNS tab to see the primary and secondary DNS servers. Record these values in the spaces provided below. 9. After writing down your IP settings, click the IP address tab. Select the Obtain IP address automatically radio button and click OK. Click OK again to close the Network window. 10. Windows may copy some files, and will then prompt you to restart your system. Click Yes and your computer will shut down and restart. TCP/IP Configuration Setting IP Address Subnet Mask Default Gateway Primary DNS Server Secondary DNS Server Host Name ____.____.____.____ ____.____.____.____ ____.____.____.____ ____.____.____.____ ____.____.____.____ ____.____.____.____ Disable HTTP Proxy You need to verify that the HTTP Proxy feature of your Web browser is disabled. This is so that your browser can view the Barricades HTML configuration pages. Determine which browser you use and refer to Internet Explorer on page 3-5 or Netscape on page 3-6. 3-10 WINDOWS NT 4.0 Obtain IP Settings from Your Barricade Now that you have configured your computer to connect to your Barricade, it needs to obtain new network settings. By releasing old DHCP IP settings and renewing them with settings from your Barricade, you will verify that you have configured your computer correctly. 1. On the Windows desktop, click Start/Programs/
Command Prompt. 2. In the Command Prompt window, type IPCONFIG /RELEASE and press the ENTER key. 3-11 CONFIGURING CLIENT PC 3. Type IPCONFIG /RENEW and press the ENTER key. Verify that your IP Address is now 192.168.2.xxx, your Subnet Mask is 255.255.255.0 and your Default Gateway is 192.168.2.1. These values confirm that your Barricade is functioning. 4. Type EXIT and press the ENTER key to close the Command Prompt window. Your computer is now configured to connect to the Barricade. 3-12 Windows 2000 1. On the Windows desktop, click Start/Settings/
Network and Dial-Up Connections. 2. Click the icon that corresponds to the connection to your Barricade. 3. The connection status screen will open. Click Properties. 4. Double-click Internet Protocol (TCP/IP). WINDOWS 2000 3-13 CONFIGURING CLIENT PC 5. 6. If there is IP Address information on the Internet Protocol (TCP/IP) Properties window, it should be recorded. Use the spaces below to record the current settings. If Obtain an IP address automatically and Obtain DNS server address automatically are already selected, your computer is already configured for DHCP. Click Cancel to close each window, and skip to Disable HTTP Proxy on page 3-14. 7. Select Obtain an IP address automatically and Obtain DNS server address automatically. Click OK or Close to close each window. TCP/IP Configuration Setting IP Address Subnet Mask Default Gateway Preferred DNS Server Alternate DNS Server ____.____.____.____ ____.____.____.____ ____.____.____.____ ____.____.____.____ ____.____.____.____ Disable HTTP Proxy You need to verify that the HTTP Proxy feature of your Web browser is disabled. This is so that your browser can view the Barricades HTML configuration pages. Determine which browser you use and refer to Internet Explorer on page 3-5 or Netscape on page 3-6. 3-14 WINDOWS 2000 Obtain IP Settings from Your Barricade Now that you have configured your computer to connect to your Barricade, it needs to obtain new network settings. By releasing old DHCP IP settings and renewing them with settings from your Barricade, you can verify that you have configured your computer correctly. 1. On the Windows desktop, click Start/Programs/
Accessories/Command Prompt. 2. In the Command Prompt window, type IPCONFIG/RELEASE and press the ENTER key. 3-15 CONFIGURING CLIENT PC 3. Type IPCONFIG /RENEW and press the ENTER key. Verify that your IP Address is now 192.168.2.xxx, your Subnet Mask is 255.255.255.0 and your Default Gateway is 192.168.2.1. These values confirm that your ADSL Router is functioning. 4. Type EXIT and press the ENTER key to close the Command Prompt window. Your computer is now configured to connect to the Barricade. 3-16 WINDOWS XP Windows XP 1. On the Windows desktop, click Start/Control Panel. 2. In the Control Panel window, click Network and Internet Connections. 3. The Network Connections window will open. Double-click the connection for this device. 4. On the connection status screen, click Properties. 3-17 CONFIGURING CLIENT PC 5. Double-click Internet Protocol (TCP/IP). 6. 7. If there is IP Address information on the Internet Protocol (TCP/IP) Properties window, it should be recorded. Use the spaces below to record the current settings. If Obtain an IP address automatically and Obtain DNS server address automatically are already selected, your computer is already configured for DHCP. Click Cancel to close each window, and skip to Disable HTTP Proxy on page 3-19. 8. Select Obtain an IP address automatically and Obtain DNS server address automatically. Click OK or Close to close each window. TCP/IP Configuration Setting IP Address Subnet Mask Default Gateway Preferred DNS Server Alternate DNS Server ____.____.____.____ ____.____.____.____ ____.____.____.____ ____.____.____.____ ____.____.____.____ 3-18 WINDOWS XP Disable HTTP Proxy You need to verify that the HTTP Proxy feature of your Web browser is disabled. This is so that your browser can view the Barricades HTML configuration pages. Determine which browser you use and refer to Internet Explorer on page 3-5 or Netscape on page 3-6. Obtain IP Settings from Your Barricade Now that you have configured your computer to connect to your Barricade, it needs to obtain new network settings. By releasing old DHCP IP settings and renewing them with settings from your Barricade, you can verify that you have configured your computer correctly. 1. On the Windows desktop, click Start/Programs/Accessories/
Command Prompt. 3-19 CONFIGURING CLIENT PC 2. In the Command Prompt window, type IPCONFIG/RELEASE and press the ENTER key. 3. Type IPCONFIG /RENEW and press the ENTER key. Verify that your IP Address is now 192.168.2.xxx, your Subnet Mask is 255.255.255.0 and your Default Gateway is 192.168.2.1. These values confirm that your ADSL Router is functioning. Type EXIT and press the ENTER key to close the Command Prompt window. Your computer is now configured to connect to the Barricade. 3-20 CONFIGURING YOUR MACINTOSH COMPUTER Configuring Your Macintosh Computer You may find that the instructions here do not exactly match your operating system. This is because these steps and screenshots were created using Mac OS 8.5. Mac OS 7.x and above are similar, but may not be identical to Mac OS 8.5. Follow these instructions:
1. Pull down the Apple Menu
. Click Control Panels/TCP/IP. 3-21 CONFIGURING CLIENT PC 2. 3. In the TCP/IP window, make sure Ethernet is selected in the Connect via: field. If Using DHCP Server is already selected in the Configure field, your computer is already configured for DHCP. Close the TCP/IP window, and skip to Disable HTTP Proxy on page 3-23. 4. If there is IP Address information on the TCP/IP screen, it should be recorded. Use the spaces below to record the current settings. 5. After writing down your IP settings, select Using DHCP Server in the Configure field and close the window. 6. Another box will appear asking whether you want to save your settings. Click Save. TCP/IP Configuration Setting IP Address Subnet mask Router address Name server address ____.____.____.____ ____.____.____.____ ____.____.____.____ ____.____.____.____ 3-22 CONFIGURING YOUR MACINTOSH COMPUTER Disable HTTP Proxy You need to verify that the HTTP Proxy feature of your Web browser is disabled. This is so that your browser can view the Barricades HTML configuration pages. The following steps are for Internet Explorer and Netscape. Determine which browser you use and follow the appropriate steps. Internet Explorer 1. Open Internet Explorer and click the Stop button. Click Edit/Preferences. 2. In the Internet Explorer Preferences window, under Network, select Proxies. 3. Uncheck all checkboxes and click OK. 3-23 CONFIGURING CLIENT PC Netscape 1. Open Netscape and click the Stop button. Click Edit/Preferences. 2. In the Preferences window, in the left-hand column labeled Category, select Advanced. Under the Advanced category, select Proxies. 3. Select Direct Connection to the Internet and click OK. 3-24 CONFIGURING YOUR MACINTOSH COMPUTER Obtain IP Settings from Your Barricade Now that you have configured your computer to connect to your Barricade, it needs to obtain new network settings. By releasing old DHCP IP settings and renewing them with settings from your Barricade, you can verify that you have configured your computer correctly. 1. Pull down the Apple Menu
. Click Control Panels/TCP/IP. 3-25
1 | User Manual Part 2 | Users Manual | 2.66 MiB | May 05 2003 |
CONFIGURING CLIENT PC 2. Your new settings are shown in the TCP/IP window. Verify that your IP Address is now 192.168.2.xxx, your Subnet Mask is 255.255.255.0 and your Default Gateway is 192.168.2.1. These values confirm that your Barricade is functioning. 3. Close the TCP/IP window. Now your computer is configured to connect to the Barricade. 3-26 CHAPTER 4 CONFIGURING THE BARRICADE After you have configured TCP/IP on a client computer, use a Web browser to configure the Barricade. The Barricade can be configured by any Java-supported browser including Internet Explorer 4.0 or above, or Netscape Navigator 4.0 or above. Using the Web management interface, you may configure the Barricade and view statistics to monitor network activity. To access the Barricades management interface, enter the IP address of the Barricade in your web browser:
http://192.168.2.1
(The Barricade automatically switches to Port 88 for management access.) Then click LOGIN. (By default, there is no password.) 4-1 CONFIGURING THE BARRICADE Navigating the Web Browser Interface The Barricades management interface consists of a Setup Wizard and an Advanced Setup section. Setup Wizard: Use the Setup Wizard if you want to quickly set up the Barricade. Go to Setup Wizard on page 4-3. Advanced Setup: Advanced Setup supports more advanced functions like hacker attack detection, IP and MAC address filtering, virtual server setup, virtual DMZ host, as well as other functions. Go to Advanced Setup on page 4-13. Making Configuration Changes Configurable parameters have a dialog box or a drop-down list. Once a configuration change has been made on a page, click the APPLY or NEXT button at the bottom of the page to enable the new setting. Note: To ensure proper screen refresh after a command entry, be sure that Internet Explorer 5.0 is configured as follows: Under the menu Tools/Internet Options/General/Temporary Internet Files/Settings, the setting for Check for newer versions of stored pages should be Every visit to the page. 4-2 SETUP WIZARD Setup Wizard Time Zone Click on the Setup Wizard picture. The first item in the Setup Wizard is Time Zone. For accurate timing of log entries and system events, you need to set the time zone. Select your time zone from the drop-down list, and click NEXT. If your area requires it, check to enable the clock for daylight saving changes, and enter the Daylight Saving Time start and end dates for your location. 4-3 CONFIGURING THE BARRICADE Internet Sharing Select the operation mode protocol. For Disable Internet Sharing see the following page, and click NEXT. To select one of the other modes, go to PPPoE & PPPoA - Parameter Setting on page 4-7, or go to Multiple Protocol over ATM Mode -
Parameter Setting on page 4-10. 4-4 SETUP WIZARD Disable Internet Sharing - Parameter Setting Enter VPI/VCI value in the provided spaces, then click NEXT. Parameter VPI/VCI Description Data flows are broken up into fixed length cells, each of which contains a Virtual Path Identifier
(VPI) that identifies the path between two nodes, and a Virtual Circuit Identifier (VCI) that identifies the data channel within that virtual path. Each virtual circuit maintains a constant flow of cells between the two end points. When there is no data to transmit, empty cells are sent. And when data needs to be transmitted, it is immediately inserted into the cell flows. 4-5 CONFIGURING THE BARRICADE Disable Internet Sharing - Finish The Finish page allows you to view the connection status, as well as other information. Click APPLY. Parameter Protocol VPI/VCI AAL5 Encapsulation Description Indicates the protocol used. Virtual Path Identifier (VPI) and Virtual Circuit Identifier (VCI). Go to VPI/VCI on page 4-5 for detailed description. Shows the packet encapsulation type. Go to Encapsulation on page 4-20 for detailed description. Your Barricade is now set up. If you cannot make a connection to the Internet, go to Troubleshooting on page A-1. 4-6 SETUP WIZARD PPPoE & PPPoA - Parameter Setting Enter the PPPoE (Point-to-Point Protocol over Ethernet) information in the provided spaces, and click NEXT. Parameter Username Password Retype Password DNS VPI/VCI Description Enter the ISP assigned user name. Enter your password. Confirm the password. Enter a Domain Name Server IP address. Virtual Path Identifier (VPI) and Virtual Circuit Identifier (VCI). Go to VPI/VCI on page 4-5 for detailed description. 4-7 CONFIGURING THE BARRICADE PPPoE & PPPoA - Finish The Finish page allows you to view the connection status, as well as other information. Click APPLY. Parameter ADSL Operation Mode
(WAN) Protocol VPI/VCI AAL5 Encapsulation ISP Parameters Username Password Description Indicates the protocol used Virtual Path Identifier (VPI) and Virtual Circuit Identifier (VCI). Go to VPI/VCI on page 4-5 for detailed description. Shows the packet encapsulation type. Go to Encapsulation on page 4-20 for detailed description. The ISP assigned user name. The password (hidden). 4-8 Parameter DHCP Parameters Default Gateway Subnet Mask Name Server 1 Name Server 2 Name Server 3 Start IP Address Number of IP SETUP WIZARD Description The default gateway IP address. If the Barricade cannot find the destination address within its local network, it will forward the packets to the Default Gateway (usually supplied by your ISP). The network subnet mask. Primary name server IP address. Alternate name server IP address. Alternate name server IP address. Start IP address of DHCP assigned IP addresses. Number of IPs available for assignment by the DHCP server. Your Barricade is now set up. If you cannot make a connection to the Internet, go to Troubleshooting on page A-1. 4-9 CONFIGURING THE BARRICADE Multiple Protocol over ATM Mode - Parameter Setting Enter ATM (Asynchronous Transfer Mode) information in the provided spaces, and click NEXT. Parameter DNS WAN IP Subnet Mask VPI/VCI Description Enter a Domain Name Server IP address. Enter an IP address for the Barricade WAN interface. Enter a subnet mask. Virtual Path Identifier (VPI) and Virtual Circuit Identifier (VCI). Go to VPI/VCI on page 4-5 for detailed description. Default Gateway Enter a default gateway IP address. If the Barricade cannot find the destination address within its local network, it will forward the packets to the Default Gateway (usually supplied by your ISP). 4-10 SETUP WIZARD Multiple Protocol over ATM Mode - Finish The Finish page allows you to view the connection status, as well as other information. Click APPLY. Parameter ADSL Operation Mode (WAN) Description Protocol VPI/VCI AAL5 Encapsulation Indicates the protocol used. Virtual Path Identifier (VPI) and Virtual Circuit Identifier (VCI). Go to VPI/VCI on page 4-5 for detailed description. Shows the packet encapsulation type. Go to Encapsulation on page 4-20 for detailed description. Network Layer Parameters (WAN) IP Address Subnet Mask Default Gateway Shows the WAN IP address. Shows the WAN subnet mask. Shows the WAN default gateway. 4-11 CONFIGURING THE BARRICADE Parameter DHCP Parameters Default Gateway Subnet Mask Name Server 1 Name Server 2 Name Server 3 Start IP Address Number of IP Description The default gateway IP address. If the Barricade cannot find the destination address within its local network, it will forward the packets to the Default Gateway (usually supplied by your ISP). The network subnet mask. Primary name server IP address. Alternate name server IP address. Alternate name server IP address. Start IP Address of DHCP assigned IP addresses. Number of IPs available for assignment by the DHCP server. Your Barricade is now set up. If you cannot make a connection to the Internet, go to Troubleshooting on page A-1. 4-12 ADVANCED SETUP Advanced Setup Click on the Advanced Setup picture. The left-hand side displays the main menu and the right-hand side shows descriptive information. The main menu links are used to navigate to other menus that display configuration parameters and statistics. The Barricades advanced management interface contains eleven main menu items System, WAN, LAN, Wireless, NAT, Routing system, Firewall, SNMP, ADSL, Tools, and Status. Use the Web management interface to define system parameters, manage and control the Barricade and its ports, or monitor network conditions. 4-13 CONFIGURING THE BARRICADE The following table briefly describes the Advanced Setup menu items. Menu System WAN LAN Wireless NAT Description Sets the local time zone, the password for administrator access, the IP address of a PC that will be allowed to manage the Barricade remotely, and the IP address of a Domain Name Server. Specifies the Internet connection settings. Sets the TCP/IP configuration for the Barricade LAN interface and DHCP clients. Sets wireless parameters and encryption settings. Shares a single ISP account with multiple users, sets up virtual servers. Routing System Sets routing parameters and displays the current routing table. Firewall Configures a variety of security and specialized functions including: Access Control, URL blocking, Internet access control scheduling, Intruder detection, and DMZ. Community string and trap server setting. Sets the ADSL operation type and shows the ADSL status. Contains options to backup & restore the current configuration, restore all configuration settings to the factory defaults, update system firmware, or reset the system. Provides WAN connection type and status, firmware and hardware version numbers, system IP settings, as well as DHCP, NAT, firewall information. Displays the number of attached clients, the firmware versions, the physical MAC address for each media interface, and the hardware version and serial number. Shows the security and DHCP client log. SNMP ADSL Tools Status 4-14 SYSTEM SETTINGS System Settings Time Zone Select your local time zone from the drop-down list, and configure the time server for the Router. This information is used for log entries and client filtering. If your area requires it, check to enable the clock for daylight saving changes, and enter the Daylight Saving Time start and end dates for your location. 4-15 CONFIGURING THE BARRICADE Password Settings Use this page to restrict access based on a password. By default, there is no password. For security you should assign one before exposing the Barricade to the Internet. Passwords can contain from 3 ~ 12 alphanumeric characters and are not case sensitive. Note: If your password is lost, or you cannot gain access to the user interface, press the reset button (colored blue) on the rear panel
(holding it down for at least five seconds) to restore the factory defaults. (The default is no password.) Enter a maximum Idle Time Out (in minutes) to define a maximum period of time for which the login session is maintained during inactivity. If the connection is inactive for longer than the maximum idle time, it will perform system logout, and you have to login to the Web management system again. (Default: 10 minutes.) 4-16 SYSTEM SETTINGS Remote Management By default, management access is only available to users on your local network. However, you can also manage the Barricade from a remote host by entering the IP address of a remote computer on this screen. Check the Enabled checkbox to enable this function. Enter the Host Address and click APPLY. Notes: 1. To access your Barricade from a remote location, you will need to know the IP address of the WAN interface shown under the Status page. 2. If you check Enabled and specify an IP address of 0.0.0.0, any host can manage the Barricade. 4-17 CONFIGURING THE BARRICADE DNS Domain Name Servers (DNS) are used to map a domain name
(e.g., www.smc.com) to the equivalent numerical IP address
(e.g., 64.147.25.20). Your ISP should provide the IP address of one or more Domain Name Servers. Enter those addresses on this page, and click APPLY. 4-18 WAN WAN Specify the WAN connection type provided by your Internet Service Provider (ISP). PPPoE (PPP over Ethernet) Enter the PPPoE (Point-to-Point over Ethernet) interface parameters on this page. Click APPLY. Parameter Enable/Disable IP Address Subnet Mask Description Enables/disables the PPPoE Interface. If your IP address is assigned by the ISP each time you connect, leave this field all zeros. Otherwise, enter your ISP supplied static IP address here. If your subnet mask is assigned by the ISP each time you connect, leave this field all zeros. Otherwise, enter your subnet mask here. 4-19 CONFIGURING THE BARRICADE Parameter VPI/VCI Encapsulation Description Virtual Path Identifier (VPI) and Virtual Circuit Identifier (VCI). Go to VPI/VCI on page 4-5 for detailed description. Specifies how to handle multiple protocols at the ATM transport layer. VC-MUX: Point-to-Point Protocol over ATM Virtual Circuit Multiplexer (null encapsulation) allows only one protocol running per virtual circuit with less overhead. LLC: Point-to-Point Protocol over ATM Logical Link Control allows multiple protocols running over one virtual circuit
(uses slightly more overhead). Idle Time (Minute) ISP Name Enter the maximum idle time for the Internet connection. After this time has been exceeded the connection will be terminated. Choose the ISP to whom this connection will apply. 4-20 WAN ATM Enter ATM (Asynchronous Transfer Mode) interface information on this page. Click APPLY. Parameter Protocol Description Disable: Disables the connection. 1483 Bridging: Bridging is a standardized layer 2 technology. It is typically used in corporate networks to extend the physical reach of a single LAN segment and increase the number of stations on a LAN without compromising performance. Bridged data is encapsulated using the RFC1483 protocol to enable data transport. PPPoA: Point-to-Point Protocol over ATM is a method of encapsulating data for transmission to a far point. 1483 Routing: 1483 Routing allows a simple, low-cost connection to the Internet via a standard 10BASE-T port. The router looks up the network address for each packet seen on the LAN port. If the address is listed in the routing table as local, it is filtered. If the address is listed under the ADSL port, it is forwarded. Or if the address is not found, then it is automatically forwarded to the default router (i.e., the ADSL router at the head end). 4-21 CONFIGURING THE BARRICADE Parameter IP Address Subnet Mask VPI/VCI Description IP address of the ATM interface. Subnet mask of the ATM interface. Virtual Path Indicator/Virtual Channel Indicator: Each connection must have a unique pair of VPI/VCI settings. Go to VPI/VCI on page 4-5 for detailed description. Encapsulation Specifies how to handle multiple protocols at the ATM transport layer. Go to Encapsulation on page 4-20 for detailed description. ISP Enter the Internet Service Provider (ISP) name, user name, and password for each ISP connection you have. 4-22 LAN LAN Use the LAN menu to configure the LAN IP address and to enable the DHCP server for dynamic client address allocation. Parameter LAN IP IP Address IP Subnet Mask DHCP Server Lease Time Description The IP address of the Barricade. The subnet mask of the network. To dynamically assign an IP address to client PCs, enable the DHCP (Dynamic Host Configuration Protocol) Server. Set the DHCP lease time. 4-23 CONFIGURING THE BARRICADE Parameter IP Address Pool Start IP Address End IP Address Domain Name Description Specify the start IP address of the DHCP pool. Do not include the gateway address of the Barricade in the client address pool. If you change the pool range, make sure the first three octets match the gateways IP address, i.e., 192.168.2.xxx. Specify the end IP address of the DHCP pool. If your network uses a domain name, enter it here. otherwise leave this field blank Remember to configure your client PCs for dynamic address allocation.
(See Configuring Client PC on page 3-1 for details.) 4-24
1 | User Manual Part 3 | Users Manual | 2.62 MiB | May 05 2003 |
WIRELESS Wireless The Barricade also operates as a wireless-to-wired bridge, allowing wireless computers to access resources available on the wired LAN, and to access the Internet. To configure the Barricade as a wireless access point for wireless clients (either stationary or roaming), all you need to do is enable the wireless function, define the radio channel, the domain identifier, and the encryption options. Check Enable and click APPLY. 4-25 CONFIGURING THE BARRICADE Channel and SSID You must specify a common radio channel and SSID (Service Set ID) to be used by the Barricade Wireless Router and all of your wireless clients. Be sure you configure all of your clients to the same values. Parameter ESSID Description Extended Service Set ID. The ESSID must be the same on the Barricade and all of its wireless clients. Transmission Rate The default is Fully Automatic. The transmission rate is automatically adjusted based on the receiving data error rate. Usually the connection quality will vary depending on the distance between the wireless router and wireless adapter. You can also select a lower transmission data rate to maximize the radio communication range. 4-26 WIRELESS Parameter Basic Rate Channel Description The highest rate specified will be the rate that the Barricade will use when transmitting broadcast/multicast and management frames. Available options are: All (1, 2, 5.5, and 11Mbps), and 1, 2Mbps (default is 1, 2Mbps). The radio channel must be the same on the Barricade and all of your wireless clients. The Barricade will automatically assign itself a radio channel, or you may select one manually. 4-27 CONFIGURING THE BARRICADE Encryption If you are transmitting sensitive data across wireless channels, you should enable encryption. You must use the same set of encryption keys for the Barricade and all of the wireless clients. Choose between standard 64-bit WEP (Wired Equivalent Privacy) or the more robust 128-bit encryption. You may automatically generate encryption keys or manually enter the keys. For automatic 64-bit security, enter a passphrase and click Generate, four keys will be generated. Choose a key from the drop-down list or accept the default key. Automatic 128-bit security generates a single key. Note:
The passphrase can consist of up to 32 alphanumeric characters. To manually configure the keys, enter five hexadecimal pairs of digits for each 64-bit key, or enter 13 pairs for the single 128-bit key. (A hexadecimal digit is a number or letter in the range 0-9 or A-F.) Note that WEP protects data transmitted between wireless nodes, but does not protect any transmissions over your wired network or over the Internet. 4-28 WIRELESS MAC Address Filtering Client computers can be filtered using the unique MAC address of their IEEE 802.11 network card. To secure an access point using MAC address filtering, you must enter a list of allowed/denied client MAC addresses into the filtering table. (See Finding the MAC address of a Network Card on page 4-57.) Parameter Filtering Disable Enable Setting Permissions Prohibition Description Disables MAC address filtering. Enables MAC address filtering. Allows only devices with their MAC address in the list to connect to the Barricade. Denies access to the Barricade from devices with their MAC address in the list. 4-29 CONFIGURING THE BARRICADE NAT Some applications require multiple connections, such as Internet gaming, videoconferencing, and Internet telephony. These applications may not work when Network Address Translation (NAT) is enabled. If you need to run applications that require multiple connections, use these pages to specify the additional public ports to be opened for each application. Address Mapping Allows one or more public IP addresses to be shared by multiple internal users. This also hides the internal network for increased privacy and security. Enter the Public IP address you wish to share into the Global IP field. Enter a range of internal IPs that will share the global IP into the from field. 4-30 NAT Virtual Server If you configure the Barricade as a virtual server, remote users accessing services such as Web or FTP at your local site via public IP addresses can be automatically redirected to local servers configured with private IP addresses. In other words, depending on the requested service (TCP/UDP port number), the Barricade redirects the external service request to the appropriate server (located at another internal IP address). If you configure the Barricade as a virtual server, remote users accessing services such as Web or FTP at your local site via public IP addresses can be automatically redirected to local servers configured with private IP addresses. In other words, depending on the requested service (TCP/UDP port number), the Barricade redirects the external service request to the appropriate server (located at another internal IP address). 4-31 CONFIGURING THE BARRICADE For example, if you set Type/Public Port to TCP/80 (HTTP or Web) and the Private IP/Port to 192.168.2.2/80, then all HTTP requests from outside users will be transferred to 192.168.2.2 on port 80. Therefore, by just entering the IP Address provided by the ISP, Internet users can access the service they need at the local address to which you redirect them. The more common TCP service ports include:
HTTP: 80, FTP: 21, Telnet: 23, and POP3: 110. A list of ports is maintained at the following link:
http://www.iana.org/assignments/port-numbers. Note: The WAN interface should have a fixed IP address to best utilize this function. If your ISP only provides dynamic IP addresses, a search for free dynamic IP on any major search engine will turn up tools that will allow you to use the same domain name even though your IP address changes each time you log into the ISP. 4-32 ROUTING SYSTEM Routing System These pages define routing related parameters, including static routes and RIP (Routing Information Protocol) parameters. Static Route Click Add to add a new static route to the list, or check the box of an already entered route and click Modify. Click Delete to remove an entry from the list. Parameter Index Network Address Subnet Mask Gateway Description Check the box of the route you wish to delete or modify. Enter the IP address of the remote computer for which to set a static route. Enter the subnet mask of the remote network for which to set a static route. Enter the WAN IP address of the gateway to the remote network. 4-33 CONFIGURING THE BARRICADE RIP Routing Information Protocol (RIP) sends routing-update messages at regular intervals and when the network topology changes. When a router receives a routing update that includes changes to an entry, it updates its routing table to reflect the new route. RIP routers maintain only the best route to a destination. After updating its routing table, the router immediately begins transmitting routing updates to inform other network routers of the change. Parameter Interface Operation Mode Version 4-34 Description The WAN interface to be configured. Disable: RIP disabled on this interface. Enable: RIP enabled on this interface. Silent: Listens for route broadcasts and updates its route table. It does not participate in sending route broadcasts. Sets the RIP (Routing Information Protocol) version to use on this interface. ROUTING SYSTEM Description A way in which a router tells its neighbor routers that one of the routers is no longer connected. None: No authentication. Password: A password authentication key is included in the packet. If this does not match what is expected, the packet will be discarded. This method provides very little security as it is possible to learn the authentication key by watching RIP packets. MD5: MD5 is an algorithm that is used to verify data integrity through the creation of a 128-bit message digest from data input (which may be a message of any length) that is claimed to be as unique to that specific data as a fingerprint is to a specific individual. Password or MD5 Authentication key. Parameter Poison Reverse Authentication Required Authentication Code 4-35 CONFIGURING THE BARRICADE Routing Table Parameter Flags Description Indicates the route status:
C = Direct connection on the same subnet. S = Static route. R = RIP (Routing Information Protocol) assigned route. I = ICMP (Internet Control Message Protocol) Redirect route. Network Address Destination IP address. Netmask The subnetwork associated with the destination. This is a template that identifies the address bits in the destination address used for routing to specific subnets. Each bit that corresponds to a 1 is part of the network/subnet number;
each bit that corresponds to 0 is part of the host number. The IP address of the router at the next hop to which matching frames are forwarded. The local interface through which the next hop of this route is reached. When a router receives a routing update that contains a new or changed destination network entry, the router adds 1 to the metric value indicated in the update and enters the network in the routing table. Gateway Interface Metric Note: Most modern routers support RIP-2 so there is usually no need for a static route table. 4-36 FIREWALL Firewall The Barricade Routers firewall inspects packets at the application layer, maintains TCP and UDP session information including time-outs and number of active sessions, and provides the ability to detect and prevent certain types of network attacks. Network attacks that deny access to a network device are called Denial-of-
Service (DoS) attacks. DoS attacks are aimed at devices and networks with a connection to the Internet. Their goal is not to steal information, but to disable a device or network so users no longer have access to network resources. The Barricade protects against the following DoS attacks: IP Spoofing, Land Attack, Ping of Death, IP with zero length, Smurf Attack, UDP port loopback, Snork Attack, TCP null scan, and TCP SYN flooding. (See Intrusion Detection on page 4-42 for details.) The firewall does not significantly affect system performance, so we advise leaving it enabled to protect your network. Select Enable and click the APPLY button to open the Firewall submenus. 4-37 CONFIGURING THE BARRICADE Access Control Access Control allows users to define the outgoing traffic permitted or not-permitted through the WAN interface. The default is to permit all outgoing traffic. The Barricade can also limit the access of hosts within the local area network (LAN). The MAC Filtering Table allows the Barricade to enter up to 32 MAC addresses that are not allowed access to the WAN port. The following items are on the Access Control screen:
Parameter Normal Filtering Table MAC Filtering Table Description Displays the IP address (or an IP address range) filtering table. Displays the MAC (Media Access Control) address filtering table. 4-38 FIREWALL 1. Click Add PC on the Access Control screen. 2. Define the appropriate settings for client PC services (as shown on the following screen). 3. Click OK and then click APPLY to save your settings. 4-39 CONFIGURING THE BARRICADE URL Blocking The Barricade allows the user to block access to Web sites from a particular PC by entering either a full URL address or just a keyword. This feature can be used to protect children from accessing violent or pornographic Web sites. 4-40 FIREWALL Schedule Rule You may filter Internet access for local clients based on rules. Each access control rule may be activated at a scheduled time. Define the schedule on the Schedule Rule page, and apply the rule on the Access Control page. Follow steps to add schedule rule:
1. Click Add Schedule Rule. 2. Define the appropriate settings for a schedule rule (as shown on the following screen). 3. Click OK and then click APPLY to save your settings. 4-41 CONFIGURING THE BARRICADE Intrusion Detection 4-42 FIREWALL Intrusion Detection Feature SPI and Anti-DoS firewall protection (Default: Enabled) The Intrusion Detection Feature of the Barricade Router limits access for incoming traffic at the WAN port. When the SPI feature is turned on, all incoming packets will be blocked except for those types marked with a check in the Stateful Packet Inspection section. RIP Defect (Default: Enabled) If an RIP request packet is not replied to by the router, it will stay in the input queue and not be released. Accumulated packets could cause the input queue to fill, causing severe problems for all protocols. Enabling this feature prevents the packets accumulating. Discard Ping from WAN (Default: Disabled) Prevent a PING on the Gateways WAN port from being routed to the network. Stateful Packet Inspection This is called a stateful packet inspection because it examines the contents of the packet to determine the state of the communications; i.e., it ensures that the stated destination computer has previously requested the current communication. This is a way of ensuring that all communications are initiated by the recipient computer and are taking place only with sources that are known and trusted from previous interactions. In addition to being more rigorous in their inspection of packets, stateful inspection firewalls also close off ports until connection to the specific port is requested. When particular types of traffic are checked, only the particular type of traffic initiated from the internal LAN will be allowed. For example, if the user only checks FTP Service in the Stateful Packet Inspection section, all incoming traffic will be blocked except for FTP connections initiated from the local LAN. 4-43 CONFIGURING THE BARRICADE Stateful Packet Inspection allows you to select different application types that are using dynamic port numbers. If you wish to use the Stateful Packet Inspection (SPI) to block packets, click on the Yes radio button in the Enable SPI and Anti-DoS firewall protection field and then check the inspection type that you need, such as Packet Fragmentation, TCP Connection, UDP Session, FTP Service, H.323 Service, and TFTP Service. When hackers attempt to enter your network, we can alert you by e-mail Enter your E-mail address. Specify your SMTP and POP3 servers, user name, and password. Connection Policy Enter the appropriate values for TCP/UDP sessions as described in the following table. Parameter Fragmentation half-open wait Defaults Description 10 sec Configures the number of seconds that a packet state structure remains active. When the timeout value expires, the router drops the unassembled packet, freeing that structure for use by another packet. Defines how long the software will wait for a TCP session to synchronize before dropping the session. Specifies how long a TCP session will be maintained after the firewall detects a FIN packet. The length of time for which a TCP session will be managed if there is no activity. The length of time for which a UDP session will be managed if there is no activity. The length of time for which an H.323 session will be managed if there is no activity. TCP SYN wait 30 sec TCP FIN wait 5 sec TCP connection idle timeout UDP session idle timeout H.323 data channel idle timeout 3600 seconds
(1 hour) 30 sec 180 sec 4-44 FIREWALL DoS Criteria and Port Scan Criteria Set up DoS and port scan criteria in the spaces provided (as shown below). Parameter Total incomplete TCP/UDP sessions HIGH Total incomplete TCP/UDP sessions LOW Incomplete TCP/UDP sessions
(per min) HIGH Incomplete TCP/UDP sessions
(per min) LOW Maximum incomplete TCP/UDP sessions number from same host Incomplete TCP/UDP sessions detect sensitive time period Maximum half-open fragmentation packet number from same host Half-open fragmentation detect sensitive time period Flooding cracker block time Defaults Description 300 sessions Defines the rate of new unestablished sessions that will cause the software to start deleting half-open sessions. Defines the rate of new unestablished sessions that will cause the software to stop deleting half-open sessions. Maximum number of allowed incomplete TCP/UDP sessions per minute. 250 sessions 250 sessions 200 sessions Minimum number of allowed incomplete TCP/UDP sessions per minute. 10 300 msec 30 10000 msec 300 second Maximum number of incomplete TCP/UDP sessions from the same host. Length of time before an incomplete TCP/UDP session is detected as incomplete. Maximum number of half-open fragmentation packets from the same host. Length of time before a half-open fragmentation session is detected as half-open. Length of time from detecting a flood attack to blocking the attack. Note: The firewall does not significantly affect system performance, so we advise enabling the prevention features to protect your network. 4-45 CONFIGURING THE BARRICADE DMZ If you have a client PC that cannot run an Internet application properly from behind the firewall, you can open the client up to unrestricted two-way Internet access. Enter the IP address of a DMZ (Demilitarized Zone) host on this screen. Adding a client to the DMZ may expose your local network to a variety of security risks, so only use this option as a last resort. 4-46 SNMP SNMP Use the SNMP configuration screen to display and modify parameters for the Simple Network Management Protocol (SNMP). Community A computer attached to the network, called a Network Management Station (NMS), can be used to access this information. Access rights to the agent are controlled by community strings. To communicate with the Barricade, the NMS must first submit a valid community string for authentication. Parameter Community Access Valid Description A community name authorized for management access. Management access is restricted to Read Only (Read) or Read/Write (Write). Enables/disables the entry. Note: Up to 5 community names may be entered. 4-47 CONFIGURING THE BARRICADE Trap Specify the IP address to notify an NMS that a significant event has occurred at an agent. When a trap condition occurs, the SNMP agent sends an SNMP trap message to any NMSs specified as the trap receivers. Parameter IP Address Community Version Description Traps are sent to this address when errors or specific events occur on the network. A community string (password) specified for trap management. Enter a word, something other than public or private, to prevent unauthorized individuals from reading information on your system. Sets the trap status to disabled, or enabled with V1 or V2c. The v2c protocol was proposed in late 1995 and includes enhancements to v1 that are universally accepted. These include a get-bulk command to reduce network management traffic when retrieving a sequence of MIB variables, and a more elaborate set of error codes for improved reporting to a Network Management Station. 4-48 ADSL ADSL ADSL (Asymmetric Digital Subscriber Line) is designed to deliver more bandwidth downstream (from the central office to the customer site) than upstream. This section is used to configure the ADSL operation type and shows the ADSL status. Parameters Parameter Operation Mode Address 3C etc. Automatic ETSI DTS/TM-06006 standard Description G.992.1 standard Reserved. 4-49
1 | User Manual Part 4 | Users Manual | 1.41 MiB | May 05 2003 |
CONFIGURING THE BARRICADE Status 4-50 Parameter Status Line Status Data Rate Upstream Downstream Operation Data/Defect Indication Noise Margin Upstream Downstream Output Power Attenuation Upstream Downstream Fast Path FEC Correction Interleaved Path FEC Correction Fast Path CRC Error Interleaved Path CRC Error Loss of Signal Defect Loss of Frame Defect ADSL Description Shows the current status of the ADSL line. Maximum data rate upstream. Maximum data rate downstream. Minimum noise margin upstream. Minimum noise margin downstream. Maximum fluctuation in the output power. Maximum reduction in the strength of the upstream signal. Maximum reduction in the strength of the downstream signal. There are two latency paths that may be used: fast and interleaved. For either path a forward error correction (FEC) scheme is employed to ensure higher data integrity. For maximum noise immunity, an interleaver may be used to supplement FEC. An interleaver is basically a buffer used to introduce a delay, allowing for additional error correction techniques to handle noise. Interleaving slows the data flow and may not be optimal for real-time signals such as video transmission. Indicates the number of Fast Path Cyclic Redundancy Check errors. Indicates the number of Interleaved Path Cyclic Redundancy Check errors. Momentary signal discontinuities. Failures due to loss of frames. 4-51 CONFIGURING THE BARRICADE Parameter Loss of Power Defect Fast Path HEC Error Interleaved Path HEC Error Statistics Received Superframes Interleaved Transmitted Superframes Interleaved Received Superframes Fast Transmitted Superframes Fast Description Failures due to loss of power. Fast Path Header Error Concealment errors. Interleaved Path Header Error Concealment errors.
(Superframes represent the highest level of data presentation. Each superframe contains regular ADSL frames, one of which is used to provide superframe synchronization, identifying the start of a superframe. Some of the remaining frames are also used for special functions.) Number of interleaved superframes received. Number of interleaved superframes transmitted. Number of fast superframes received. Number of fast superframes transmitted. 4-52 TOOLS Tools Use the Tools menu to backup the current configuration, restore a previously saved configuration, restore factory settings, update firmware, and reset the Barricade. Configuration Tools Choose a function and click More Configuration. Backup allows you to save the Barricade Routers configuration to a file. You can then check Restore to restore the saved backup configuration file. Restore to Factory Defaults resets the Barricade to the original settings. You will be asked to confirm your decision. 4-53 CONFIGURING THE BARRICADE Firmware Upgrade Use this screen to update the firmware or user interface to the latest versions. Download the upgrade file from the SMC Web site
(www.smc.com) and save it to your hard drive. In the Upgrade Target field, choose Firmware. Then click Browse to look for the previously downloaded file. Click APPLY. Check the Status page Information section to confirm that the upgrade process was successful. 4-54 TOOLS Reset Click APPLY to reset the Barricade. The reset will be complete when the power LED stops blinking. If you perform a reset from this page, the configurations will not be changed back to the factory default settings. Note: If you use the Reset button on the front panel, the Barricade performs a power reset. If the button is held depressed for over five seconds, all the LEDs will illuminate and the factory settings will be restored. 4-55 CONFIGURING THE BARRICADE Status The Status screen displays WAN/LAN connection status, firmware, and hardware version numbers, illegal attempts to access your network, as well as information on DHCP clients connected to your network. The security log may be saved to a file by clicking Save and choosing a location. 4-56 FINDING THE MAC ADDRESS OF A NETWORK CARD The following items are included on the Status screen:
Parameter INTERNET GATEWAY INFORMATION Security Log DHCP Client Log Description Displays WAN connection type and status. Displays system IP settings, as well as DHCP Server and Firewall status. Displays the number of attached clients, the firmware versions, the physical MAC address for each media interface, and for the Barricade, as well as the hardware version and serial number. Displays illegal attempts to access your network. Displays information on DHCP clients on your network. Finding the MAC address of a Network Card Windows 95/98/ME Click Start/Run. Type winipcfg and press ENTER. The MAC address is in the Adapter Address section. Windows NT4/2000/XP Click Start/Programs/Command Prompt. Type ipconfig /all and press ENTER. The MAC address is listed as the Physical Address. Linux Run the command /sbin/ifconfig. The MAC address is the value after the word HWaddr. 4-57 CONFIGURING THE BARRICADE 4-58 CHAPTER 5 CONFIGURING PRINTER SERVICES To use the print server built into the Barricade, you must first install the Port Monitor program as described in the following section for Windows 95/98/Me. To set up the Barricade Print Server for Windows NT, see Printer Server Setup in Windows NT on page 5-4. For Windows 2000, see Printer Server Setup in Windows 2000 on page 5-6. For Windows XP, see Printer Server Setup in Windows XP on page 5-8. For Unix Systems, see Printer Server Setup in Unix Systems on page 5-18. Printer Server Setup in Windows 95/98/
Me You may find that the instructions here do not exactly match your version of Windows. This is because these steps and screenshots were created in Windows 98. Windows 95 and Windows Millennium Edition are very similar, but not identical, to Windows 98. 1. Insert the installation CD-ROM into your CD-ROM drive. Under the PrintSvr directory, run the setup.exe program. The Port Monitor installation program advises you to close all other Windows programs currently running on your computer. Click Next to continue. 5-1 CONFIGURING PRINTER SERVICES 2. The next screen indicates that the print client uses the TCP/IP network protocol to monitor print requests. Click Next. 3. Select the destination folder and click on the Next button. The setup program will then begin to install the programs into the destination folder. 5-2 PRINTER SERVER SETUP IN WINDOWS 95/98/ME 4. Select the Program Folder that will contain the program icon for uninstalling the port monitor, and then click Next. 5. Enter the printer port name that will be used to identify the port monitor in your system, and click Next. 6. When the setup program finishes installing the port monitor, choose Yes, I want to restart my computer now and then click OK. 5-3 CONFIGURING PRINTER SERVICES Printer Server Setup in Windows NT 1. On a Windows NT platform, open the Printers window in the My Computer menu, and double-click the Add Printer icon. 2. Follow the prompts to add a local printer to your system. 5-4 PRINTER SERVER SETUP IN WINDOWS NT 3. Select the monitored port. The default port name is SMC100. Then click the Configure Port button. 4. Enter the IP address of the Barricade and click OK. Click Next in the Add Printer Wizard dialog box. 5. Specify the printer type attached to the Barricade. 6. Continue following the prompts to complete the installation of the Barricade print server. The printer type you specified will now be added to your Printers menu. 5-5 CONFIGURING PRINTER SERVICES Printer Server Setup in Windows 2000 1. On your desktop, click Start/Settings/Printers to open the Printers window, then double-click the Add Printer icon. 2. Follow the prompts to add a local printer to your system. 3. Specify the printer type attached to the Barricade. 5-6 PRINTER SERVER SETUP IN WINDOWS 2000 4. Select the monitored port. The default port name is SMC100. Click the Configure Port button. 5. Enter the IP address of the Barricade and click OK. Then click Next in the Add Printer Wizard dialog box. 6. Continue following the prompts to complete the installation of the Barricade print server. The printer will now be added to your Printers menu. 5-7 CONFIGURING PRINTER SERVICES Printer Server Setup in Windows XP 1. On your desktop, click Start/Printers and Faxes. 2. The Printers and Faxes dialog box will open. You should see a menu with options on the left-hand side on the screen. Click Add a Printer to launch the Add Printer Wizard. 5-8 PRINTER SERVER SETUP IN WINDOWS XP 3. Click Next. 4. Select Local printer attached to this computer and uncheck the Automatically detect and install my Plug and Play printer option. Click Next. 5-9 CONFIGURING PRINTER SERVICES 5. Select Create a new port: and then choose Standard TCP/IP Port on Type of port: drop-down list. Click Next. 6. The Add Standard TCP/IP Printer Port Wizard window will open. Click Next. 5-10 PRINTER SERVER SETUP IN WINDOWS XP 7. Provide the appropriate IP and Port name for your new printer port on this window, then click Next. Please set the same IP address on the Printer Port and the router (for example: 192.168.2.1). In the Port Name field, choose whatever you like. For simplicity we have chosen IP_192.168.2.1 to maintain consistency with the default IP settings of the Barricade. 8. Select the Custom radio button and click Settings. 5-11 CONFIGURING PRINTER SERVICES 9. The Configure Standard TCP/IP Port Monitor window will open. Under Protocol category, select LPR. Then, set the Queue Name as LPT1 under LPR Settings category, and uncheck the LPR Byte Counting Enabled checkbox. Click OK. 10. This should take you back to the Add Standard TCP/IP Printer Port Wizard window. Click Next. 5-12 PRINTER SERVER SETUP IN WINDOWS XP 11. Click Finish to complete the configuration of TCP/IP port. 12. After configuration, continue to install a printer. In the Add Printer Wizard window as shown below, choose your printer on Manufacturer and Printers list. Click Next. Note: If your printer is not listed here, refer to your printer documentation for installation instruction. 5-13 CONFIGURING PRINTER SERVICES 13. Type a name for your printer. Click Next. 14. Select Do not share this printer, then click Next. 5-14 PRINTER SERVER SETUP IN WINDOWS XP 15. You will need to confirm some information before you successfully test your printer. When prompt to print a test page request, choose No. Click Next. 16. You should see all your printer information on this screen. Click Finish to complete the installation. 5-15 CONFIGURING PRINTER SERVICES 17. Now you need to configure some properties on your printer. Click Start/Printers and Faxes on your desktop. On the Printer and Faxes window, select the printer you just installed, right-click the mouse and click Properties. 18. The Printer Properties window will open as shown below. 5-16 PRINTER SERVER SETUP IN WINDOWS XP 19. Follow the instructions below to verify that your printer is configured properly:
Click the Advanced tab. Select Spool printer documents so program finishes printing faster and select Start printing after last page is spooled. Then check both Print spooled documents first and Enable advanced printing features checkboxes. 5-17 CONFIGURING PRINTER SERVICES Click the Ports tab. Verify that the selected TCP/IP port is the one you just created. Click Apply to save the settings. Click the General tab. Click Print Test Page to verify that you have successfully setup your LPR printing port on Windows XP. Now you can print through the SMC Barricade Router. Printer Server Setup in Unix Systems Follow the standard configuration procedure on your Unix platform to set up the Barricade print server. The printer name is lpt1. 5-18 CHAPTER A TROUBLESHOOTING This section describes common problems you may encounter and possible solutions to them. The Barricade can be easily monitored through panel indicators to identify problems. Troubleshooting Chart Symptom LED Indicators Power LED is Off Action Check connections between the Barricade, the external power supply, and the wall outlet. If the power indicator does not turn on when the power cord is plugged in, you may have a problem with the power outlet, power cord, or external power supply. However, if the unit powers off after running for a while, check for loose power connections, power losses, or surges at the power outlet. If you still cannot isolate the problem, then the external power supply may be defective. In this case, contact Technical Support for assistance. A-1 TROUBLESHOOTING Troubleshooting Chart Symptom LED Indicators Link LED is Off Action Verify that the Barricade and attached device are powered on. Be sure the cable is plugged into both the Barricade and the corresponding device. Verify that the proper cable type is used and that its length does not exceed the specified limits. Be sure that the network interface on the attached device is configured for the proper communication speed and duplex mode. Check the adapter on the attached device and cable connections for possible defects. Replace any defective adapter or cable if necessary. Network Connection Problems Cannot Ping the Barricade from the attached LAN, or the Barricade cannot Ping any device on the attached LAN Verify that the IP addresses are properly configured. For most applications, you should use the Barricades DHCP function to dynamically assign IP addresses to hosts on the attached LAN. However, if you manually configure IP addresses on the LAN, verify that the same network address (network component of the IP address) and subnet mask are used for both the Barricade and any attached LAN devices. Be sure the device you want to ping (or from which you are pinging) has been configured for TCP/IP. A-2 TROUBLESHOOTING Troubleshooting Chart Action Symptom Management Problems Cannot connect using the Web browser Forgot or lost the password Be sure to have configured the Barricade with a valid IP address, subnet mask, and default gateway. Check that you have a valid network connection to the Barricade and that the port you are using has not been disabled. Check the network cabling between the management station and the Barricade. Press the Reset button on the rear panel (holding it down for at least five seconds) to restore the factory defaults. A-3 TROUBLESHOOTING Troubleshooting Chart Action Make sure the wireless PC has the same SSID settings as the Barricade. See Channel and SSID on page 4-26. You need to have the same security settings on the clients and the Barricade. See Encryption on page 4-28. Move your wireless PC closer to the Barricade to find a better signal. If the signal is still weak, change the angle of the antenna. There may be interference, possibly caused by a microwave oven or wireless phone. Change the location of the interference sources or Barricade. Change the wireless channel on the Barricade. See Channel and SSID on page 4-26. Check that the AP antenna, connectors, and cabling are firmly connected. The distance between the Barricade and wireless PC is too great. Make sure the wireless PC has the same SSID and security settings as the Barricade. See Barricade. See Channel and SSID on page 4-26 and Encryption on page 4-28. Symptom Wireless Problems A wireless PC cannot associate with the Barricade. The wireless network is often interrupted. The Barricade cannot be detected by a wireless client. A-4 APPENDIX B CABLES Ethernet Cable Caution: DO NOT plug a phone jack connector into any RJ-45 port. Use only twisted-pair cables with RJ-45 connectors that conform with FCC standards. Specifications Cable Types and Specifications Cable 10BASE-T 100BASE-TX Cat. 5 100-ohm UTP Type Cat. 3, 4, 5 100-ohm UTP Max. Length 100 m (328 ft) 100 m (328 ft) Connector RJ-45 RJ-45 Wiring Conventions For Ethernet connections, a twisted-pair cable must have two pairs of wires. Each wire pair is identified by two different colors. For example, one wire might be red and the other, red with white stripes. Also, an RJ-45 connector must be attached to both ends of the cable. B-1 CABLES Each wire pair must be attached to the RJ-45 connectors in a specific orientation. The following figure illustrates how the pins on an Ethernet RJ-45 connector are numbered. Be sure to hold the connectors in the same orientation when attaching the wires to the pins. Figure B-1. RJ-45 Ethernet Connector Pin Numbers RJ-45 Port Connection Use the straight-through CAT -5 Ethernet cable provided in the package to connect the Barricade to your PC. When connecting to other network devices such as an Ethernet switch, use the cable type shown in the following table. Attached Device Port Type MDI-X MDI Connecting Cable Type Straight-through Crossover B-2 ETHERNET CABLE Pin Assignments With 100BASE-TX/10BASE-T cable, pins 1 and 2 are used for transmitting data, and pins 3 and 6 for receiving data. RJ-45 Pin Assignments Pin Number 1 2 3 6 1: The + and - signs represent the polarity of the wires Assignment1 Tx+
Tx-
Rx+
Rx-
that make up each wire pair. Straight-Through Wiring If the port on the attached device has internal crossover wiring (MDI-X), then use straight-through cable. Straight-Through Cable Pin Assignments End 1 1 (Tx+) 2 (Tx-) 3 (Rx+) 6 (Rx-) End 2 1 (Tx+) 2 (Tx-) 3 (Rx+) 6 (Rx-) B-3 CABLES Crossover Wiring If the port on the attached device has straight-through wiring (MDI), use crossover cable. Crossover Cable Pin Assignments End 1 1 (Tx+) 2 (Tx-) 3 (Rx+) 6 (Rx-) End 2 3 (Rx+) 6 (Rx-) 1 (Tx+) 2 (Tx-) B-4 ADSL CABLE ADSL Cable Use standard telephone cable to connect the RJ-11 telephone wall outlet to the RJ-11 ADSL port on the ADSL Router. Caution: Do not plug a phone jack connector into an RJ-45 port. Specifications Cable Types and Specifications Cable ADSL Line Type Standard Telephone Cable Connector RJ-11 For ADSL connections, a cable requires one pair of wires. Each wire is identified by different colors. For example, one wire might be red and the other, red with white stripes. Also, an RJ-11 connector must be attached to both ends of the cable. Wiring Conventions Each wire pair must be attached to the RJ-11 connectors in a specific orientation. The following figure illustrates how the pins on the RJ-11 connector are numbered. Be sure to hold the connectors in the same orientation when attaching the wires to the pins. Figure B-2. RJ-11 Connector Pin Numbers B-5 CABLES e t i h W
e u B l l e u B
e t i h W e g n a r O
e t i h W e t i h W
e g n a r O e t i h W
e u B l l e u B
e t i h W k c a B l d e R n e e r G w o l l e Y R1 T1 T2 R1 T1 R2 T2 R1 T1 R2 1 2 3 4 5 6 1 2 3 4 5 6 1 2 3 4 5 6 6x2 Jack 6x4 Jack 6x4 Jack T = Tip R = Ring Pin 1 2 3 4 5 6 Signal Name Not used Line 2 Tip Line 1 Ring Line 1 Tip Line 2 Ring Not used Figure B-3. RJ-11 Pinouts Wire Color Black or White/Orange Red or Blue/White Green or White/Blue Yellow or Orange/White B-6 APPENDIX C SPECIFICATIONS Standards Compliance CE Mark Emissions FCC Class B, VCCI Class B Industry Canada Class B EN55022 (CISPR 22) Class B C-Tick - AS/NZS 3548 (1995) Class B Immunity EN 61000-3-2/3 EN 61000-4-2/3/4/5/6/8/11 Safety UL 1950 EN60950 (TV) CSA 22.2 No. 950 IEEE 802.3 10 BASE-T Ethernet IEEE 802.3u 100 BASE-TX Fast Ethernet IEEE 802.11b Wireless LAN Modem Standards ITU G.992.1 (G.dmt) ITU G.992.2 (G.Lite) ITU G.994.1 (G.handshake) ITU T.413 issue 2 - ADSL full rate LAN Interfaces 4 RJ-45 10 BASE-T/100 BASE-TX ports Auto-negotiates the connection speed to 10 Mbps Ethernet or 100 Mbps Fast Ethernet, and the transmission mode to half duplex or full duplex. On-board wireless LAN card allows up to 253 wireless users to access resources on the wired LAN. C-1 SPECIFICATIONS WAN Interface 1 ADSL RJ-11 port Indicator Panel Power, Ethernet, ADSL Syn, ADSL Data Dimensions 220 x 132.8 x 30.5 mm (8.66 x 5.23 x 1.20 in) Weight 0.6 kg (1.32 lbs) Input Power 12 V 1 A Power Consumption 12 Watts max. Management Web management Advanced Features Dynamic IP Address Configuration DHCP, DNS Firewall Client privileges, hacker prevention and logging, Stateful Packet Inspection Virtual Private Network PPTP, IPSec pass-through, VPN pass-through Internet Standards RFC 826 ARP, RFC 791 IP, RFC 792 ICMP, RFC 768 UDP, RFC 793 TCP, RFC 783 TFTP, RFC 1483 AAL5 Encapsulation, RFC 1661 PPP, RFC 1866 HTML, RFC 2068 HTTP, RFC 2364 PPP over ATM Temperature Operating 0 to 40C (32 to 104F) Storage -40 to 70C (-40 to 158F) Humidity 5% to 95% (noncondensing) Warranty Limited Lifetime C-2 GLOSSARY 10BASE-T IEEE 802.3 specification for 10 Mbps Ethernet over two pairs of Category 3, 4, or 5 UTP cable. 100BASE-TX IEEE 802.3u specification for 100 Mbps Fast Ethernet over two pairs of Category 5 UTP cable. Access Point (AP) An interface between the wireless network and a wired network. Access points combined with a distribution system (e.g. Ethernet) support the creation of multiple radio cells (BSSs) that enable roaming throughout a facility. Asymmetric Digital Subscriber Line (ADSL) One of four DSL technologies. ADSL is designed to deliver more bandwidth downstream (from the central office to the customer site) than upstream. Downstream rates range from 1.5 to 9 Mbps, whereas upstream bandwidth ranges from 16 to 640 kbps. ADSL transmissions work at distances up to 18,000 feet (5,488 meters) over a single copper twisted pair. Asynchronous Transfer Mode (ATM) A cell-based connection-oriented data service offering high speed (up to 2.488 Gbps) data transfer. ATM integrates circuit and packet switching to handle both constant and burst information. Frequently called cell relay. Authentication The process a station uses to announce its identify to another station. IEEE 802.11 specifies two forms of authentication: open system and shared key. Glossary-1 GLOSSARY Bandwidth The difference between the highest and lowest frequencies available for network signals. Also synonymous with wire speed, the actual speed of the data transmission along the cable. Basic Service Set (BSS) A set of 802.11-compliant stations that operate as a fully-connected wireless network. Cyclic Redundancy Check (CRC) An error detection process that (at the transmitting station) divides the data being sent by a particular polynomial and appends the resulting remainder to the transmitted data. Then (at the receiving station) the process divides the received data by the same polynomial and compares the resulting remainder to the remainder appended to the data at the transmitting station. If the remainders are equal, there is very high probability that no errors are present in the data. If they do not match, then errors are present. Domain Naming System (DNS) System used in the Internet for translating names of network nodes into addresses. Dynamic Host Configuration Protocol (DHCP) Issues IP addresses automatically within a specified range to devices such as PCs when they are first powered on. The device retains the use of the IP address for a specific license period that the system administrator can define. DHCP is available as part of the many operating systems including Microsoft Windows NT Server and UNIX. Glossary-2 GLOSSARY Ethernet A network communication system developed and standardized by DEC, Intel, and Xerox, using baseband transmission, CSMA/CD access, logical bus topology, and coaxial cable. The successor IEEE 802.3 standard provides for integration into the OSI model and extends the physical layer and media with repeaters and implementations that operate on fiber, thin coax and twisted-pair cable. File Transfer Protocol (FTP) A TCP/IP protocol for file transfer. Firewall A device that interfaces the network to the outside world and shields the network from unauthorized users. The firewall does this by blocking certain types of traffic. For example, some firewalls permit only electronic mail traffic to enter the network from elsewhere. This helps protect the network against attacks made to other network resources, such as sensitive files, databases, and applications. Forward Error Correction (FEC) A method of error control where the receiving node automatically corrects as many channel errors as it can without referring to the sending node. G.lite IEEE A standard that defines the more economical splitterless ADSL connection that transmits data at up to 1.5 Mbps downstream and 512 Kbps upstream. This ADSL option can be installed without an on-site visit by the service provider. Institute of Electrical and Electronic Engineers. Glossary-3 GLOSSARY IEEE 802.11 Specifies medium access and physical layer specifications for 1 Mbps and 2 Mbps wireless connectivity within a local area. IEEE 802.3x Defines Ethernet frame start/stop requests and timers used for flow control on full-duplex links. International Control Message Protocol (ICMP) Network layer Internet protocol that reports errors and provides other information relevant to IP packet processing. Documented in RFC 792. Local Area Network (LAN) A group of interconnected computer and support devices. LED Light emitting diode used for monitoring a device or network condition. Logical Link Control Layer (LLC) The highest layer of the IEEE 802 Reference Model and provides similar functions of a traditional data link control protocol. Management Information Base (MIB) Database of network management information that is used and maintained by a network management protocol such as SNMP or ICMP. The value of a MIB object can be changed or retrieved using SNMP or ICMP commands. MIB objects are organized in a tree structure that includes public (standard) and private (proprietary) branches. Media Access Control (MAC) A portion of the networking protocol that governs access to the transmission medium, facilitating the exchange of data between network nodes. Glossary-4 GLOSSARY Node Any network-addressable device on the network, such as a router or network interface card. Point-to-Point Protocol (PPP) A protocol that provides router-to-router and host-to-network connections over both synchronous and asynchronous circuits. PPP is the successor to SLIP. RJ-45 Connector A connector for twisted-pair wiring. Routing Information Protocol (RIP) A common type of routing protocol. RIP bases its routing path on the distance (number of hops) to the destination. RIP maintains optimum routing paths by sending out routing update messages if the network topology changes. For example, if a router finds that a particular link is faulty, it will update its routing table, then send a copy of the modified table to each of its neighbors. Service Set Identifier (SSID) An identifier attached to packets sent over the wireless LAN that functions as a password for joining a particular radio network (BSS). All radios and access points within the same BSS must use the same SSID, or their packets will be ignored. Simple Network Monitoring Protocol (SNMP) Defines the transfer of information between Management Information Bases (MIBs). Most high-end network monitoring stations require the implementation of SNMP on each of the components the organization wishes to monitor. Glossary-5 GLOSSARY Transmission Control Protocol (TCP) A commonly used protocol for establishing and maintaining communications between applications on different computers. TCP provides full-duplex, acknowledged, and flow-controlled service to upper-layer protocols and applications. User Data Protocol (UDP) A connectionless protocol that works at the OSI transport layer. UDP transports datagrams but does not acknowledge their receipt. UTP Unshielded twisted-pair cable. Virtual channel Identifier (VCI) A 16-bit field in the header of an ATM cell. The VCI, together with VPI, is used to identify the next destination of a cell as it passes through a series of ATM switches on its way to its destination. Virtual LAN (VLAN) A collection of network nodes that share the same collision domain regardless of their physical location or connection point in the network. A VLAN serves as a logical workgroup with no physical barriers, allowing users to share information and resources located on the same LAN. Virtual Path Identifier (VPI) A 8-bit field in the header of an ATM cell. Wired Equivalent Privacy (WEP) An optional IEEE 802.11 function that offers frame transmission privacy similar to a wired network. The Wired Equivalent Privacy generates secret shared encryption keys that both source and destination stations can use to alter frame bits to avoid disclosure to eavesdroppers. Glossary-6 FOR TECHNICAL SUPPORT, CALL:
From U.S.A. and Canada (24 hours a day, 7 days a week)
(800) SMC-4-YOU; (949) 679-8000; Fax: (949) 679-1481 From Europe (8:00 AM - 5:30 PM UK Time) 44 (0) 118 974 8700; Fax: 44 (0) 118 974 8701 INTERNET E-mail addresses:
techsupport@smc.com european.techsupport@smc-europe.com support@smc-asia.com Driver updates:
http://www.smc.com/index.cfm?action=tech_support_drivers_downloads World Wide Web:
http://www.smc.com http://www.smc-europe.com http://www.smc-asia.com FOR LITERATURE OR ADVERTISING RESPONSE, CALL:
U.S.A. and Canada:
Spain:
UK:
France:
Italy:
Benelux:
Central Europe:
Switzerland:
Nordic:
Northern Europe:
Eastern Europe:
Sub Saharian Africa:
North Africa:
Russia:
PRC (Beijing):
PRC (Shanghai):
Taiwan:
Asia Pacific:
Korea:
Japan:
Australia:
India:
Middle East:
Thailand:
(800) SMC-4-YOU;
34-93-477-4935;
44 (0) 118 974 8700;
33 (0) 41 38 32 32;
39 02 739 12 33;
31 33 455 72 88;
49 (0) 89 92861-0;
41 (0) 1 9409971;
46 (0) 868 70700;
44 (0) 118 974 8700;
34 -93-477-4920;
27-11 314 1133;
34 93 477 4920;
7 (095) 290 29 96;
86-10-8251-1550;
86-21-6485-9922;
886-2-8797-8006;
(65) 6 238 6556;
82-2-553-0860;
81-3-5645-5715;
61-2-8875-7887;
91 22 5696 2790;
97 14 299 4466 66 2 651 8733 Fax (949) 679-1481 Fax 34-93-477-3774 Fax 44 (0) 118 974 8701 Fax 33 (0) 41 38 01 58 Fax 39 02 739 14 17 Fax 31 33 455 73 30 Fax 49 (0) 89 92861-230 Fax 41 (0) 1 9409972 Fax 46 (0) 887 62 62 Fax 44 (0) 118 974 8701 Fax 34 93 477 3774 Fax 27-11 314 9133 Fax 34 93 477 3774 Fax 7 (095) 290 29 96 Fax 86-10-8251-1551 Fax 86-21-6495-7924 Fax 886-2-8797-6288 Fax (65) 6 238 6466 Fax 82-2-553-7202 Fax 81-3-5645-5716 Fax 61-2-8875-7777 Fax 91 22 5696 2794 Fax 97 14 299 4664 Fax 66 2 651 8737 If you are looking for further contact information, please visit www.smc.com, www.smc-europe.com, or www.smc-asia.com. 38 Tesla Irvine, CA 92618 Phone: (949) 679-8000 Model Number: SMC7404WBRA Pub. No: 150000018500E E032003-R01
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2003-04-28 | 2412 ~ 2462 | DTS - Digital Transmission System | Original Equipment |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
1 | Effective |
2003-04-28
|
||||
1 | Applicant's complete, legal business name |
Accton Technology Corp
|
||||
1 | FCC Registration Number (FRN) |
0017693334
|
||||
1 | Physical Address |
No. 1, Creation Rd. III
|
||||
1 |
Hsin Chu 30077, N/A
|
|||||
1 |
Taiwan
|
|||||
app s | TCB Information | |||||
1 | TCB Application Email Address |
c******@telefication.com
|
||||
1 | TCB Scope |
A4: UNII devices & low power transmitters using spread spectrum techniques
|
||||
app s | FCC ID | |||||
1 | Grantee Code |
HED
|
||||
1 | Equipment Product Code |
7404WBRAACC
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
1 | Name |
A******** W********
|
||||
1 | Title |
Manager
|
||||
1 | Telephone Number |
886-3******** Extension:
|
||||
1 | Fax Number |
886-3********
|
||||
1 |
m******@accton.com
|
|||||
app s | Technical Contact | |||||
1 | Firm Name |
Advance Data Technology Corporation
|
||||
1 | Name |
E****** L****
|
||||
1 | Physical Address |
81-1 Luliaoken, 9 th Lin, Wulung Tsuen Chiunglin
|
||||
1 |
Hsinchu, 307
|
|||||
1 |
Taiwan
|
|||||
1 | Telephone Number |
+886 ********
|
||||
1 | Fax Number |
+886 ********
|
||||
1 |
e******@adt.com.tw
|
|||||
app s | Non Technical Contact | |||||
n/a | ||||||
app s | Confidentiality (long or short term) | |||||
1 | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
1 | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | No | ||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
1 | Is this application for software defined/cognitive radio authorization? | No | ||||
1 | Equipment Class | DTS - Digital Transmission System | ||||
1 | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | Wireless ADSL Barricade, Wireless ADSL Router | ||||
1 | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
1 | Modular Equipment Type | Does not apply | ||||
1 | Purpose / Application is for | Original Equipment | ||||
1 | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | No | ||||
1 | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
1 | Grant Comments | Power output listed is conducted. The antenna(s) used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. End-users and installers must be provided with antenna installation instructions and transmitter operating conditions for satisfying RF exposure compliance. | ||||
1 | Is there an equipment authorization waiver associated with this application? | No | ||||
1 | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
1 | Firm Name |
Bureau Veritas CPS (H.K.) Ltd. Taoyuan Branch
|
||||
1 | Name |
R******** C******
|
||||
1 | Telephone Number |
886-2********
|
||||
1 | Fax Number |
886-2********
|
||||
1 |
r******@tw.bureauveritas.com
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 15C | CE | 2412.00000000 | 2462.00000000 | 0.0400000 |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC