SMCWHSG44-G
9• La prise secteur doit se trouver à proximité de l'appareil et son accès doit être facile. Vous ne pouvez mettre l'appareil hors circuit q
FOR TECHNICAL SUPPORT, CALL:From U.S.A. and Canada (24 hours a day, 7 days a week)(800) SMC-4-YOU; Phn: (949) 679-8000; Fax: (949) 679-1481From Europe
Wichtige Sicherheitshinweise (Germany)1. Bitte lesen Sie diese Hinweise sorgfältig durch.2. Heben Sie diese Anleitung für den späteren Gebrauch auf.3
Der arbeitsplatzbezogene Schalldruckpegel nach DIN 45 635 Teil 1000beträgt 70dB(A) oder weniger.Stromkabel. Dies muss von dem Land, in dem es be-nutzt
12
13Table of Contents1. Introduction 171.1. Overview 181.2. Features 181.2.1 Package Checklist 221.3. LED Definition 221.4. Rear Panel 221.5. Selecting
141.11. Confirming the Settings of the SMCWHSG44-G and Client Computers 402. Using Web-Based Network Manager 422.1. Overview 422.1.1. Menu Structure 4
152.4.3.1. Basic 572.4.3.2. Virtual Server Mappings 582.4.4. DHCP Server 582.4.4.1. DHCP Server 59i. Basic 59ii. Static DHCP Mappings 592.4.4.2. DHCP
162.8.1.2. VLAN 792.8.1.3. Firewall 792.8.1.4. URL Filters 802.8.2. Management 802.8.2.1. Basic 802.8.2.2. UPnP 812.8.2.3. System Log 812.8.2.4. SNMP
1. IntroductionThe EliteConnect 2.4GHz 802.11g Wireless Hotspot Gateway (SMCWHSG44-G)enables VARs, WISPs and System Integrators to install secure, eas
1.1. Overview1.2. Features• User Authentication, Authorization, and Accounting (AAA)• Web redirection - When an unauthenticated wireless user is tryin
• 64-bit and 128-bit WEP (Wired Equivalent Privacy) - For authenticationand data encryption.• Enable/Disable SSID broadcast - The user can enable or d
• Virtual server - Exposing servers on the intranet to the Internet.• PPTP, IPSec, and L2TP pass-through - Passing VPN (Virtual Private Network) packe
• SNTP - Support for system time by SNTP (Simple Network Time Protocol).• Dynamic DNS - Support for dynamic DNS services provided by dyndns.organd no-
• Configuration Reset - Reset the configuration settings to factory-set values.1.2.1 Package Checklist* Check that you have the following contents in
1.5. Selecting a Power Supply MethodThe SMCWHSG44-G can be powered by either the supplied AC power adapter orthe optional SMCPWR-INJ3 EliteConnect™ Po
Fig. 5. Connecting Ethernet cables to SMCPWR-INJ3.5. Check the “ACTIVE” LED: if power is successfully fed into theSMCWHSG44-G, the “ACTIVE” LED will b
1.7. Preparing for ConfigurationTo configure the Wireless Hotspot Gateway, a managing computer with aWeb browser is needed. For first-time configurati
address of the computer to 192.168.2.xxx (the default IP address of theSMCWHSG44-G is 192.168.2.1) and the subnet mask to 255.255.255.0.) It ispreferr
Fig. 10. Home Page.1.8.2. SETUP WIZARD Step 1: Selecting an Operational ModeFig. 11. Operational Modes.• If the Router is to be used with a DSL or cab
of the Ethernet WAN interface has to be manually set, select Router with a Static-IP DSL/Cable Connection.• If you have multiple ADSL/cable connection
2CopyrightInformation furnished by SMC Networks, Inc. (SMC) is believed to be accu-rate and reliable. How-ever, no responsibility is assumed by SMC fo
1.8.3.2. Router with a DHCP-Based DSL/Cable ConnectionFig. 13. TCP/IP settings for Router with a DHCP-Based DSL/Cable Connection mode.If the SMCWHSG44
address is 192.168.2.1 and the default subnet mask is 255.255.255.0. Inmost cases, these default settings need no change.As for the WAN IP address, it
1.8.4. SETUP WIZARD Step 3: Configuring DHCP Server SettingsFig. 16. DHCP Server Settings.The SMCWHSG44-G can automatically assign IP addresses to cli
The number of available RF channels depends on local regulations; thereforeyou have to choose an appropriate regulatory domain to comply with localreg
Authentication protocol:RADIUS: Authentication by external RADIUS server.Local Accounts: Authentication by local database, associated with ticket prin
• Amount of Money Per Unit: defines the money to be charged per unit. • Unit of Session time (min): defines the time frame (by min) for the user to ac
Fig. 24. Account Table List1.8.6.3. How to Setup the Mini-POS Ticket PrinterThe SMCWHSG44-G supports a built-in user database for local authentication
Unit” and a value for the number of minutes for “Units of Session time”. In order to produce a ticket from the Mini-POS Ticket Printer, you will need
1.8.6.5 Configuring RADIUS SettingsThe RADIUS client on the SMCWHSG44-G works in conjunction with the Webredirection component and IEEE 802.1x compone
1.9. Deploying the SMCWHSG44-GAfter the settings have been configured, deploy the Wireless HotspotGateway to the field application environment. The sy
3LIMITED WARRANTYLimited Warranty Statement: SMC Networks, Inc. (“SMC”) warrants its productsto be free from defects in workmanship and materials, und
name and password information must be set up on the RADIUS server orLocally on the Wireless Hotspot Gateway. On the other hand, if IEEE 802.1xEAP-TLS
current IP address and reobtaining an IP address. IPConfig.exe is a command-lineprogram, and the /release option releases the current IP address and t
Fig. 31. Authentication Success.Fig. 32. Log-Off Window.6. Click Log Off within the log-off window to end the session.NOTE: On a PDA such as Pocket PC
2. Using Web-Based Network ManagerIn this section, we will explain each Web management page of the Web-basedNetwork Manager in detail.2.1. OverviewFig
• Firmware Tools. For upgrading the firmware of the Router and backing up and restoring configuration settings.• Time Zone. Time zone and SNTP (Simple
authenticated by SMCWHSG44-G. Authenticated users can also be terminated in this table.• Account Table. Manually generates new users, or is automatica
2.2.2. Authenticated UsersFig. 38. Authenticated Users.On this page, the status information of each authenticated user, including itscurrent idle time
On this page, all the registered users in local user database are shown. Anactivated user is identified by its MAC address, login time and the 'A
2.3. SYSTEM2.3.1. Specifying Operational ModeFig. 44. Operational Modes.On this page, you can specify the operational mode for the Router. Currently,5
NOTE: When the Router is in Router with Multiple DSL/Cable Connectionsmode, connect your first DSL/Cable connection to WAN, the second to LAN 1,the th
WARRANTIES EXCLUSIVE: IF AN SMC PRODUCT DOES NOT OPERATE ASWARRANTED ABOVE, CUSTOMER'S SOLE REMEDY SHALL BE REPAIR ORREPLACEMENT OF THE PRODUCT I
with some Web browsers. If you cannot successfully perform HTTP-basedfirmware management operations with your Web browser, try the TFTP-based way.2.3.
2.3.3.3. Upgrading Firmware by TFTPFig. 51. TFTP Server Settings.When using TFTP as the firmware management protocol, you can configuresettings for th
Fig. 53. TFTP Server.NOTE: After the dialog box of the TFTP server program appears, be sure tospecify the working folder within which the downloaded f
2. Connect the computer and one of the LAN Ethernet switch port with a normal Ethernet cable.3. Configure the IP address of the computer so that the c
2.3.3.5. Resetting Configuration to Factory DefaultsFig. 55. Configuration Reset.Clicking the Reset button resets the device configuration to factory
If the SMCWHSG44-G was set to be in Router with a PPPoE-BasedDSL/Cable Connection mode, two IP addresses are needed: one for theEthernet LAN interface
As for the WAN IP address, it is obtained by DHCP from the ISP. The Triggermode setting affects the behavior of the DHCP client of the Router. In Auto
2.4.1.4. Router with Multiple DSL/Cable ConnectionsFig. 60. TCP/IP Settings for Router with Multiple DSL/Cable Connections Mode.Since the Internet con
Fig. 61. DNS Proxy under Multi-WAN Mode.2.4.2.2. Host Address ResolutionFig. 62. Host Address Resolution Mappings.The SMCWHSG44-G provides the Host Ad
A DMZ (DeMilitarized Zone) host receives all unrecognized TCP/IP packetsfrom the NAT server on the Router; therefore TCP/IP networking applica-tions r
5Federal Communication Commission Interference StatementThis equipment has been tested and found to comply with the limits for aClass B digital device
2.4.4.1. DHCP Serveri. BasicFig. 65. Basic DHCP server settings.The SMCWHSG44-G can automatically assign IP addresses to client comput-ers by DHCP. In
To always assign an IP address to a specific DHCP client:1. Specify the MAC address of the DHCP client and the IP address to be assigned to it. Then,
Fig. 69. Load Balancing Policy Settings.2.4.6. Zero Client ReconfigurationFig. 70. Zero Client Reconfiguration Settings.The SMCWHSG44-G provides the &
client can associate with the SMCWHSG44-G. The Policy setting allows you to run in mode, B only or G only. In mixed modeboth 802.11b and 802.11g clien
notebook computers. In this way, the SMCWHSG44-G plays a role of “APrepeater.”NOTE: The SMCWHSG44-G can have up to 6 WDS links to other wirelessAP/bri
Fig. 75. Network Topology Containing a Loop.2.5.2. SecurityIEEE 802.11b/g security settings include SSID broadcasts, Client Isolation,IEEE 802.11 Auth
When the setting is set to "All APs in This Subnet", traffic among wirelessusers of different SMCWHSG44-Gs in the same IP subnet is blocked.
NOTE: The number of characters of the Pre-shared key setting must be atleast 8 and can be up to 63.• IEEE 802.1x EAP without Encryption (EAP-MD5). The
With MAC-Address-Based Access Control, you can specify the wirelessclients (STAs or Bridge Slaves) that are permitted or not permitted to asso-ciate w
stored in the computer hard disk or a smart card for authentication. Andafter a successful EAP-TLS authentication, a session key is automaticallygener
6EC Conformance Declaration SMC contact for these products in Europe is:SMC Networks Spain S.L.,Edificio Conata II,Calle Fructuós Gelabert 6-8, 2o, 4a
2.6. Configuring Authentication SettingsThe SMCWHSG44-G supports both IEEE 802.1x-based and Web redirection-baseduser authentication. Here is a brief
2.6.1. AAA2.6.1.1. BasicFig. 83. Web-Redirection Enabled with Authentication.There are three modes for Web redirection-Enabled with Authentication,Ena
Fig. 85. Default Log-Off Page.NOTE: On a PDA such as Pocket PC, the log-off would not be shown. To logoff from the network, go back to the log-on page
2.6.1.2. Unrestricted ClientsFig. 88. Unrestricted Clients Settings.There are occasions on which you want some computers to be able to freelyaccess th
2.6.1.3. Walled GardenFig. 89. Walled Garden Settings.IP addresses or URLs in the walled garden can be accessed without authen-tication. This feature
For the SMCWHSG44-G, the RADIUS client component of the Router isshared by the IEEE 802.1x and Web redirection components. The RADIUSsettings are for
2.6.3. Authentication Session ControlFig. 92. Authentication Session Control Settings.Authentication session control settings are for controlling the
Fig. 94. Authentication Success Page Customization Settings.Fig. 95. Authentication Failure Page Customization Settings.In addition to the Text alignm
Fig. 97. Advertisement Links Settings.Fig. 98. Advertisement Links in Action.2.7. DDNSFig. 99. Dynamic DNS Settings.With the help of dynamic DNS (DDNS
2.8. Configuring Advanced Settings2.8.1. Filters and Firewall2.8.1.1. Packet FiltersFig. 100. Packet Filters Settings.You can specify rules for the fi
to other system. The user is obligated to ensure the device is operating according to the channel limitations, indoor/outdoor restrictions and license
To set a rule for packet filtering:1. Specify the protocol type, source IP address, source IP mask, destination IP address, destination IP mask, and d
2.8.1.4. URL FiltersFig. 103. URL Filters Settings.The SMCWHSG44-G is capable of blocking HTTP traffic from the intranet tospecified unwelcome Web sit
2. Type the Starting IP address and the End IP Address of the host IP address range.3. Select the corresponding check box next to the IP address range
2.8.2.4. SNMPFig. 107. SNMP Settings.The SMCWHSG44-G can be managed by SNMP (Simple NetworkManagement Protocol). You can specify the name (used as a p
3. The 'Denied' columns can be also specified by selecting the head of lines (time) or columns (date).Wireless users cannot access the inter
and Device Port. In other words, this request is passed through the built-inNAT server of the Router and routed to the corresponding man-aged LANdevic
Appendix AA-1: Default SettingsTIP: Press the reset button of a powered-on Router to reset the configuration settings to factory-set values.85
A-2: LED DefinitionsThere are several LED indicators on the housing of a Router. They aredefined as follows:• PWR : Power• ALV : Alive. Blinks when th
B-1: TCP/IP Setting ProblemsFig. 113. Communication Stages for A Client to Reach its Correspondent Host.For a client computer to communicate with a co
• Check if the RADIUS server is set to use EAP-MD5, PAP, and CHAP authentication.• The SMCWHSG44-G does not respond to ping from the client computer.•
8Important! Before making connections, make sure you have the correct cordset. Check it (read the label on the cable) against the following:Power Cord
B-2: Wireless Settings Problems• The wireless client computer cannot associate with an SMCWHSG44-G.• Is the wireless client set in infrastructure mode
Appendix C: Distances and Data RatesImportant Notice: Maximum distances posted below are actual tested dis-tance thresholds. However, there are many v
Appendix D: Technical SpecificationsD-1: SMCWHSG44-GStandards• 802.11b• 802.11g•802.3•802.3u• 802.3afData Rate• 802.11g: 6, 9, 11, 12, 18, 24, 36, 48,
92Electromagnetic Compatibility• FCC Class B• Industry Canada•CE• ETS 300.328; ETS 300 826Power Supply• Input: 100VAC 60Hz• Output: 12VDC, 1ADimensio
93Glossary10BASE-TIEEE 802.3 specification for 10 Mbps Ethernet over two pairs of Category 3or better UTP cable.100BASE-TXIEEE 802.3u specification fo
Dynamic Host Configuration Protocol (DHCP)Provides a framework for passing configuration information to hosts on aTCP/IP network. DHCP is based on the
InfrastructureAn integrated wireless and wired LAN is called an infrastructure configuration.Inter Access Point Protocol (IAPP)A protocol that specifi
Service Set Identifier (SSID)An identifier that is attached to packets sent over the wireless LAN andfunctions as a password for joining a particular
802.11 wireless networks.Wired Equivalent Privacy (WEP)WEP is based on the use of security keys and the popular RC4 encryptionalgorithm. Wireless de-v
Komentarze do niniejszej Instrukcji