Arcadyan Technology WG7005B Draft 11n Wireless 4-port Broadband Router User Manual 00

Arcadyan Technology Corporation Draft 11n Wireless 4-port Broadband Router 00

Contents

User Manual 2

WIRELESS4-27Bandwidth  • 20MHz: Sets the operation bandwidth as 20 MHz.• 20/40MHz: Allows automatic detection of the operation bandwidth between 20 MHz and 40 MHz. Choosing the bandwidth mode as 20/40MHz allows you to use the extension channel.Broadcast SSID  Enable or disable the broadcasting of the SSID. Disabling SSID broadcast will provide increased security by hiding the SSID of your wireless network.Protected Mode Enabling this function to ensure the best performance of your 11n throughput in case there is a lot of interference from the 11g and 11b devices in the wireless network.802.11e/WMM QoSEnable or disable the use of QoS. The QoS (Quality of Service) function allows you to differentiate WMM (Wi-Fi Multimedia) traffic and provide it with high-priority forwarding serviceParameter Description
CONFIGURING THE BARRICADE4-28Access ControlUsing the Access Control functionality, you can restrict access based on MAC address. Each PC has a unique identifier known as a Medium Access Control (MAC) address. With MAC filtering enabled, the computers whose MAC address you have listed in the filtering table will be able to connect (or will be denied access) to the Barricade.
WIRELESS4-29SecurityTo make your wireless network safe, you should turn on the security function. The Barricade supports the following security mechanism:•WEP•WPA
CONFIGURING THE BARRICADE4-30WEPIf you want to use WEP to protect your wireless network, you need to set the same parameters for the Barricade and all your wireless clients.To generate the key automatically with passphrase, enter a string of characters and click the GENERATE button. Select the default key from the drop-down menu. Click SAVE SETTINGS. Note: The passphrase can consist of up to 32 alphanumeric characters.To manually configure the encryption key, enter five hexadecimal pairs of digits for the 64-bit key, or enter 13 pairs for the 128-bit key. (A hexadecimal digit is a number or letter in the range 0-9 or A-F.)Note: WEP protects data transmitted between wireless nodes, but does not protect any transmissions over your wired network or over the Internet.Parameter DescriptionWEP Mode Select 64 bit or 128 bit key to use for encryption.Key Entry Method Select Hex or ASCII to use for encryption key.Static WEP Key SettingYou may automatically generate encryption keys or manually enter the keys.
WIRELESS4-31WPAWi-Fi Protected Access (WPA) combines temporal key integrity protocol (TKIP) and 802.1x mechanisms. It provides dynamic key encryption and 802.1x authentication service.   Parameter DescriptionAuthentication Choose 802.1X or Pre-shared Key to use as the authentication method. • 802.1X: for the enterprise network with a RADIUS server. See “802.1X” on page 4-34.• Pre-shared key: for the SOHO network environment without an authentication server. Pre-shared key type Select the key type to be used in the Pre-shared Key. Pre-shared Key Type in the key here.
CONFIGURING THE BARRICADE4-32WPA2WPA2 is a product certification that is available through the Wi-Fi Alliance. WPA2 certifies that wireless equipment is compatible with the IEEE 802.11i standard. The WPA2 product certification formally replaces Wired Equivalent Privacy (WEP) and the other security features of the original IEEE 802.11 standard. The goal of WPA2 certification is to support the additional mandatory security features of the IEEE 802.11i standard that are not already included for products that support WPA. Parameter DescriptionAuthentication Choose 802.1X or Pre-shared Key to use as the authentication method. • 802.1X: for the enterprise network with a RADIUS server. See “802.1X” on page 4-34.• Pre-shared key: for the SOHO network environment without an authentication server. Pre-shared key type Select the key type to be used in the Pre-shared Key. Pre-shared Key Type in the key here.
WIRELESS4-33WPA+WPA2Wi-Fi Protected Access (WPA) combines temporal key integrity protocol (TKIP) and 802.1x mechanisms. It provides dynamic key encryption and 802.1x authentication service. Wi-Fi Protected Access 2 (WPA2) is a product certification that is available through the Wi-Fi Alliance. WPA2 certifies that wireless equipment is compatible with the IEEE 802.11i standard. The WPA2 product certification formally replaces Wired Equivalent Privacy (WEP) and the other security features of the original IEEE 802.11 standard. The goal of WPA2 certification is to support the additional mandatory security features of the IEEE 802.11i standard that are not already included for products that support WPA.
CONFIGURING THE BARRICADE4-34802.1XIf 802.1x is used in your network, then you should enable this function for the Barricade.Parameter DescriptionAuthentication Choose 802.1X or Pre-shared Key to use as the authentication method. • 802.1X: for the enterprise network with a RADIUS server. See “802.1X” on page 4-34.• Pre-shared key: for the SOHO network environment without an authentication server. Pre-shared key type Select the key type to be used in the Pre-shared Key. Pre-shared Key Type in the key here.
WIRELESS4-35Parameter DescriptionAuthentication Enable 802.1x authentication. Session Idle TimeoutDefines a maximum period of time for which the connection is maintained during inactivity.Re-Authentication PeriodDefines a maximum period of time for which the authentication server will dynamically re-assign a session key to a connected client.Quiet Period Defines a maximum period of time for which the ADSL Router will wait between failed authentications. Server Type The Server Type of your authentication server is RADIUS. RADIUS Server ParametersServer IP The IP address of your authentication server. Server Port The port used for the authentication service. Secret Key The secret key shared between the authentication server and its clients.NAS-ID Defines the request identifier of the Network Access Server.
CONFIGURING THE BARRICADE4-36Wi-Fi Protected Setup (WPS)The Barricade was implemented with the ease-of-use Wi-Fi Protected Setup (WPS). WPS makes a secure wireless network much easier to achieve by using an eight-digit PIN number and the Push Button Control (PBC).Check Enable and click SAVE SETTINGS.Pressing Generate New PIN creates a new Current PIN number.Pressing Restore Default PIN sets the PIN code to the factory default number. Take the following steps for easy network security settings.
WIRELESS4-37PIN Code Setup1. Power on your client device supporting WPS PIN code method.2. Start WPS PIN process on client device. For instructions on how to do this refer to the user manual of the client device.3. Enter the PIN code of client device. Note: The PIN code is generally printed on the bottom of the unit or displayed in the configuration utility.4. Click the Start PIN button on the screen.
CONFIGURING THE BARRICADE4-38Push Button Configuration (PBC) MethodTo achieve successful WPS connection, you can use one of the following ways: (1) push and hold the WPS button on your Barricade, or (2) click the Start PBC button on this screen.1. Power on your network devices such as an access point and client network devices.2. Press the WPS button for 4 seconds, or click the Start PBC button on the screen.3. Press the WPS button or click the PBC button on your client devices of your network.Note: This connection procedure must be done within 2 minutes after pressing the WPS button on the Barricade.
WIRELESS4-39ManualFor client devices without WPS, manually configure the device as displayed on the screen.
CONFIGURING THE BARRICADE4-40NATNetwork Address Translation allows multiple users to access the Internet sharing one public IP.
NAT4-41Address MappingAllows one or more public IP addresses to be shared by multiple internal users. This also hides the internal network for increased privacy and security. Enter the Public IP address you wish to share into the Global IP field. Enter a range of internal IPs that will share the global IP into the “from” field.
CONFIGURING THE BARRICADE4-42Virtual ServerIf you configure the ADSL Router as a virtual server, remote users accessing services such as web or FTP at your local site via public IP addresses can be automatically redirected to local servers configured with private IP addresses. In other words, depending on the requested service (TCP/UDP port number), the ADSL Router redirects the external service request to the appropriate server (located at another internal IP address). For example, if you set Type/Public Port to TCP/80 (HTTP or web) and the Private IP/Port to 192.168.2.2/80, then all HTTP requests from outside users will be transferred to 192.168.2.2 on port 80. Therefore, by just entering the IP address provided by the ISP, Internet users can access the service they need at the local address to which you redirect them. The more common TCP service ports include: HTTP: 80, FTP: 21, Telnet: 23, and POP3: 110. A list of ports is maintained at the following link: http://www.iana.org/assignments/port-numbers.
NAT4-43Special Application Some applications require multiple connections, such as Internet gaming, video-conferencing, and Internet telephony. These applications may not work when Network Address Translation (NAT) is enabled. If you need to run applications that require multiple connections, use these screens to specify the additional public ports to be opened for each application.
CONFIGURING THE BARRICADE4-44NAT Mapping Table This screen displays the current NAPT (Network Address Port Translation) address mappings. NAT Mapping Table displays the current NAPT address mappings. The NAT address mappings are listed 20 lines per page, click the control buttons to move forwards and backwards. As the NAT mapping is dynamic, a Refresh button is provided to refresh the NAT Mapping Table with the mots updated values.The content of the NAT Mapping Table is described as follows.• Protocol - protocol of the flow. • Local IP - local (LAN) host’s IP address for the flow. • Local Port - local (LAN) host’s port number for the flow. •Pseudo IP - translated IP address for the flow. • Pseudo Port - translated port number for the flow. • Peer IP - remote (WAN) host’s IP address for the flow. • Peer Port - remote (WAN) host’s port number for the flow.
ROUTING4-45RoutingThese screens define routing related parameters, including static routes and RIP (Routing Information Protocol) parameters.Static Route Click Add to add a new static route to the list, or check the box of an already entered route and click Modify. Clicking Delete will remove an entry from the list.Parameter DescriptionIndex Check the box of the route you wish to delete or modify.Network Address Enter the IP address of the remote computer for which to set a static route.Subnet Mask Enter the subnet mask of the remote network for which to set a static route.Gateway Enter the WAN IP address of the gateway to the remote network.
CONFIGURING THE BARRICADE4-46Routing Table Parameter DescriptionFlags Indicates the route status: C = Direct connection on the same subnet.S = Static route.R = RIP (Routing Information Protocol) assigned route.I = ICMP (Internet Control Message Protocol) Redirect route.Network Address Destination IP address.Netmask The subnetwork associated with the destination.This is a template that identifies the address bits in the destination address used for routing to specific subnets. Each bit that corresponds to a “1” is part of the subnet mask number; each bit that corresponds to “0” is part of the host number.Gateway The IP address of the router at the next hop to which frames are forwarded.Interface The local interface through which the next hop of this route is reached. Metric When a router receives a routing update that contains a new or changed destination network entry, the router adds 1 to the metric value indicated in the update and enters the network in the routing table.
FIREWALL4-47FirewallThe Barricade Router’s firewall inspects packets at the application layer, maintains TCP and UDP session information including time-outs and the number of active sessions, and provides the ability to detect and prevent certain types of network attacks. Network attacks that deny access to a network device are called Denial-of-Service (DoS) attacks. DoS attacks are aimed at devices and networks with a connection to the Internet. Their goal is not to steal information, but to disable a device or network so users no longer have access to network resources. The Barricade protects against the following DoS attacks: IP Spoofing, Land Attack, Ping of Death, IP with zero length, Smurf Attack, UDP port loopback, Snork Attack, TCP null scan, and TCP SYN flooding. (For details see“Intrusion Detection,” page 4-54.)The firewall does not significantly affect system performance, so we advise enabling the function to protect your network. Select Enable and click the SAVE SETTINGS button.
CONFIGURING THE BARRICADE4-48Access ControlAccess Control allows users to define the outgoing traffic permitted or not-permitted through the WAN interface. The default is to permit all outgoing traffic.The following items are on the Access Control screen:  Parameter DescriptionEnable Filtering FunctionEnable or Disable Access control function. Normal Filtering Table Displays descriptive list of Filtering rules defined.
FIREWALL4-49To create a new access control rule:1. Click Add PC on the Access Control screen. The Access Control Add PC screen will appear. 2. Define the appropriate settings for client PC services.3. Click OK and then click SAVE SETTINGS to save your settings.
CONFIGURING THE BARRICADE4-50MAC FilterThe MAC Filter allows you to define what client PC’s can access the Internet. When enabled only the MAC addresses defined in the MAC Filtering table will have access to the Internet. All other client devices will be denied access.You can enter up to 32 MAC addresses in this table.  1. MAC Address Control: select enable or disable.2. MAC Filtering Table: enter the MAC address in the space provided.
FIREWALL4-51URL BlockingThe ADSL Router allows the user to block access to web sites by entering either a full URL address or just a keyword. This feature can be used to protect children from accessing violent or pornographic web sites. You can define up to 30 sites here.
CONFIGURING THE BARRICADE4-52Schedule RuleYou may filter Internet access for local clients based on rules. Each access control rule may be activated at a scheduled time. Define the schedule on the Schedule Rule screen, and apply the rule on the Access Control screen.
FIREWALL4-53Follow these steps to add a schedule rule: 1. Click Add Schedule Rule on the Schedule Rule screen. The Edit Schedule Rule screen will appear.2. Define the appropriate settings for a schedule rule.3. Click OK and then click SAVE SETTINGS to save your settings.
CONFIGURING THE BARRICADE4-54Intrusion Detection• Intrusion Detection FeatureStateful Packet Inspection (SPI) and Anti-DoS firewall protection (Default: Enabled) — The Intrusion Detection Feature of the Barricade Router limits access for incoming traffic at the WAN port. When the SPI feature is turned on, all incoming packets will be blocked except for those types marked in the Stateful Packet Inspection section. RIP Defect (Default: Enabled) — If an RIP request packet is not acknowledged to by the router, it will stay in the input queue and not be released. Accumulated packets could cause the input queue to fill, causing severe problems for all protocols. Enabling this feature prevents the packets from accumulating.Discard Ping to WAN (Default: Disabled) — Prevent a ping on the Barricade’s WAN port from being routed to the network. Scroll down to view more information.
FIREWALL4-55•Stateful Packet Inspection This is called a “stateful” packet inspection because it examines the contents of the packet to determine the state of the communications; i.e., it ensures that the stated destination computer has previously requested the current communication. This is a way of ensuring that all communications are initiated by the recipient computer and are taking place only with
CONFIGURING THE BARRICADE4-56sources that are known and trusted from previous interactions. In addition to being more rigorous in their inspection of packets, stateful inspection firewalls also close off ports until connection to the specific port is requested. When particular types of traffic are checked, only the particular type of traffic initiated from the internal LAN will be allowed. For example, if the user only checks “FTP Service” in the Stateful Packet Inspection section, all incoming traffic will be blocked except for FTP connections initiated from the local LAN.Stateful Packet Inspection allows you to select different application types that are using dynamic port numbers. If you wish to use the Stateful Packet Inspection (SPI) to block packets, click on the Yes radio button in the “Enable SPI and Anti-DoS firewall protection” field and then check the inspection type that you need, such as Packet Fragmentation, TCP Connection, UDP Session, FTP Service, H.323 Service, or TFTP Service.•When hackers attempt to enter your network, we can alert you by e-mailEnter your email address. Specify your SMTP and POP3 servers, user name, and password.
FIREWALL4-57•Connection PolicyEnter the appropriate values for TCP/UDP sessions as described in the following table. Parameter Defaults DescriptionFragmentation half-open wait10 sec Configures the number of seconds that a packet state structure remains active. When the timeout value expires, the router drops the unassembled packet, freeing that structure for use by another packet. TCP SYN wait 30 sec Defines how long the software will wait for a TCP session to synchronize before dropping the session. TCP FIN wait 5 sec Specifies how long a TCP session will be maintained after the firewall detects a FIN packet. TCP connection idle timeout3600 seconds (1 hour)The length of time for which a TCP session will be managed if there is no activity. UDP session idle timeout30 sec The length of time for which a UDP session will be managed if there is no activity.H.323 data channel idle timeout180 sec The length of time for which an H.323 session will be managed if there is no activity.
CONFIGURING THE BARRICADE4-58•DoS Criteria and Port Scan CriteriaSet up DoS and port scan criteria in the spaces provided (as shown below). Note: The firewall does not significantly affect system performance, so we advise enabling the prevention features to protect your network.Parameter Defaults DescriptionTotal incomplete TCP/UDP sessions HIGH300 sessionsDefines the rate of new unestablished sessions that will cause the software to start deleting half-open sessions.Total incomplete TCP/UDP sessions LOW250 sessions Defines the rate of new unestablished sessions that will cause the software to stop deleting half-open sessions.Incomplete TCP/UDP sessions (per min) HIGH250 sessions Maximum number of allowed incomplete TCP/UDP sessions per minute.Incomplete TCP/UDP sessions (per min) LOW200 sessions Minimum number of allowed incomplete TCP/UDP sessions per minute. Maximum incomplete TCP/UDP sessions number from same host10 Maximum number of incomplete TCP/UDP sessions from the same host. Incomplete TCP/UDP sessions detect sensitive time period300 msec Length of time before an incomplete TCP/UDP session is detected as incomplete.Maximum half-open fragmentation packet number from same host30 Maximum number of half-open fragmentation packets from the same host.Half-open fragmentation detect sensitive time period10000 msec Length of time before a half-open fragmentation session is detected as half-open.Flooding cracker block time300 second Length of time from detecting a flood attack to blocking the attack.
FIREWALL4-59DMZIf you have a client PC that cannot run an Internet application properly from behind the firewall, you can open the client up to unrestricted two-way Internet access. Enter the IP address of a DMZ (Demilitarized Zone) host on this screen. Adding a client to the DMZ may expose your local network to a variety of security risks, so only use this option as a last resort.
CONFIGURING THE BARRICADE4-60UPnPThe Universal Plug and Play architecture offers pervasive peer-to-peer network connectivity of PCs of all form factors, intelligent appliances, and wireless devices. UPnP enables seamless proximity network in addition to control and data transfer among networked devices in the office, home and everywhere within your network.UPnP allows the device to automatically:• join a network• obtain an IP address• convey its capabilities and learn about the presence and capabilities of other devices.Check the Enable radio button to activate this function.
DDNS4-61DDNSDynamic Domain Name Service (DDNS) provides users on the Internet with a method to tie their domain name to a computer or server. DDNS allows your domain name to follow your IP address automatically by having your DNS records changed when your IP address changes.This DNS feature is powered by DynDNS.org or TZO.com. With a DDNS connection you can host your own web site, email server, FTP site, and more at your own location even if you have a dynamic IP address.
CONFIGURING THE BARRICADE4-62ToolsUse the Tools menu to backup the current configuration, restore a previously saved configuration, update firmware, and reset the Barricade.Configuration ToolsChoose a function and click Next. • Backup Router Configuration: this allows you to save the Barricade’s configuration to a file.• Restore from saved Configuration file: this function is used to restore the previously saved backup configuration file.• Restore router to Factory Defaults: this resets the Barricade back to the original default settings.
TOOLS4-63Firmware UpgradeUse this screen to update the firmware or user interface to the latest versions.1. Download the upgrade file from the SMC web site first, and save it to your hard drive.2. Then click Browse... to look for the downloaded file. Click BEGIN UPGRADE.Check the Status screen Information section to confirm that the upgrade process was successful.
CONFIGURING THE BARRICADE4-64ResetClick REBOOT ROUTER to reset the ADSL Router. The reset will be complete when the power LED stops blinking. If you perform a reset from this screen, the configurations will not be changed back to the factory default settings.Note: If you use the Reset button on the back panel, the Barricade performs a power reset. If the button is pressed for over  10 seconds, all the LEDs will illuminate and the factory default settings will be restored.
TOOLS4-65STATUSThe Status screen displays WAN/LAN connection status, firmware, and hardware version numbers, illegal attempts to access your network, as well as information on DHCP clients connected to your network. The security log may be saved to a file by clicking Save and choosing a location. Scroll down to view more information on the Status screen.
CONFIGURING THE BARRICADE4-66The following items are included on the Status screen:  Parameter DescriptionINTERNET Displays WAN connection type and status.Renew Click on this button to establish a connection to the WAN.GATEWAY Displays system IP settings, as well as DHCP Server and Firewall status.INFORMATION Displays the number of attached clients, the firmware versions, the physical MAC address for each media interface and for the ADSL Router, as well as the hardware version and serial number.Security Log Displays attempts to access your network.Save Click on this button to save the security log file.Clear Click on this button to delete the access log.Refresh Click on this button to refresh the screen.DHCP Client Log Displays information on DHCP clients on your network.
FINDING THE MAC ADDRESS OF A NETWORK CARD4-67Finding the MAC address of a Network CardWINDOWS NT4/2000/XPClick Start/Programs/Command Prompt. Type “ipconfig /all” and press “ENTER”.The MAC address is listed as the “Physical Address.”MACINTOSHClick System Preferences/Network.The MAC address is listed as the “Ethernet Address” on the TCP/IP tab.LINUXRun the command “/sbin/ifconfig.” The MAC address is the value after the word “HWaddr.”
CONFIGURING THE BARRICADE4-68
A-1APPENDIX ATROUBLESHOOTINGThis section describes common problems you may encounter and possible solutions to them. The Barricade can be easily monitored through panel indicators to identify problems. Troubleshooting ChartSymptom ActionLED IndicatorsPower LED is off• Check connections between the Barricade, the external power supply, and the wall outlet.• If the power indicator does not turn on when the power cord is plugged in, you may have a problem with the power outlet, power cord, or external power supply. However, if the unit powers off after running for a while, check for loose power connections, power losses, or surges at the power outlet. If you still cannot isolate the problem, then the external power supply may be defective. In this case, contact Technical Support for assistance.
TROUBLESHOOTINGA-2LED IndicatorsLAN LED is Off• Verify that the Barricade and attached device are powered on. • Be sure the cable is plugged into both the Barricade and the corresponding device. • Verify that the proper cable type is used and that its length does not exceed the specified limits. • Be sure that the network interface on the attached device is configured for the proper communication speed and duplex mode.• Check the adapter on the attached device and cable connections for possible defects. Replace any defective adapter or cable if necessary. Network Connection ProblemsCannot ping the Barricade from the attached LAN, or the Barricade cannot ping any device on the attached LAN• Verify that the IP addresses are properly configured. For most applications, you should use the Barricade’s DHCP function to dynamically assign IP addresses to hosts on the attached LAN. However, if you manually configure IP addresses on the LAN, verify that the same network address (network component of the IP address) and subnet mask are used for both the Barricade and any attached LAN devices.• Be sure the device you want to ping (or from which you are pinging) has been configured for TCP/IP.Troubleshooting ChartSymptom Action
TROUBLESHOOTINGA-3Management ProblemsCannot connect using the web browser• Be sure to have configured the Barricade with a valid IP address, subnet mask, and default gateway.• Check that you have a valid network connection to the Barricade and that the port you are using has not been disabled.• Check the network cabling between the management station and the Barricade.Forgot or lost the password•Press the Reset button on the rear panel (holding it down for at least six seconds) to restore the factory defaults.Troubleshooting ChartSymptom Action
TROUBLESHOOTINGA-4Wireless ProblemsA wireless PC cannot associate with the Barricade.• Make sure the wireless PC has the same SSID settings as the Barricade. See “Channel and SSID” on page 4-26.• You need to have the same security settings on the clients and the Barricade. See “Security” on page 4-29.The wireless network is often interrupted.• Move your wireless PC closer to the Barricade to find a better signal. If the signal is still weak, change the angle of the antenna.• There may be interference, possibly caused by microwave ovens or wireless phones. Change the location of the possible sources of interference or change the location of the Barricade.• Change the wireless channel on the Barricade. See “Channel and SSID” on page 4-26.• Check that the antenna, connectors, and cabling are firmly connected.The Barricade cannot be detected by a wireless client.• The distance between the Barricade and wireless PC is too great.• Make sure the wireless PC has the same SSID and security settings as the Barricade. See “Channel and SSID” on page 4-26 and “Security” on page 4-29.Troubleshooting ChartSymptom Action
B-1APPENDIX BCABLESEthernet CableCaution:Do not plug a phone jack connector into an RJ-45 port. For Ethernet connections, use only twisted-pair cables with RJ-45 connectors that conform to FCC standards.SpecificationsWiring ConventionsFor Ethernet connections, a twisted-pair cable must have two pairs of wires. Each wire pair is identified by two different colors. For example, one wire might be red and the other, red with white stripes. Also, an RJ-45 connector must be attached to both ends of the cable.Cable Types and SpecificationsCable Type Max. Length Connector10BASE-T Cat. 3, 4, 5 100-ohm UTP 100 m (328 ft) RJ-45100BASE-TX Cat. 5 100-ohm UTP 100 m (328 ft) RJ-45
CABLESB-2Each wire pair must be attached to the RJ-45 connectors in a specific orientation. The following figure illustrates how the pins on an Ethernet RJ-45 connector are numbered. Be sure to hold the connectors in the same orientation when attaching the wires to the pins. Figure B-1.  RJ-45 Ethernet Connector Pin NumbersRJ-45 Port Ethernet ConnectionUse the straight-through CAT -5 Ethernet cable provided in the package to connect the Barricade to your PC. When connecting to other network devices such as an Ethernet switch, use the cable type shown in the following table.Attached Device Port Type Connecting Cable TypeMDI-X Straight-throughMDI Crossover
RJ-45 PORT ETHERNET CONNECTIONB-3Pin AssignmentsWith 10BASE-T/100BASE-TX cable, pins 1 and 2 are used for transmitting data, and pins 3 and 6 for receiving data.Straight-Through WiringIf the port on the attached device has internal crossover wiring (MDI-X), then use straight-through cable.RJ-45 Pin AssignmentsPin Number Assignment*1Tx+2Tx-3Rx+6Rx-* The “+” and “-” signs represent the polarity of the wires that make up each wire pair.Straight-Through Cable Pin AssignmentsEnd 1 End 21 (Tx+) 1 (Tx+)2 (Tx-) 2 (Tx-)3 (Rx+) 3 (Rx+)6 (Rx-) 6 (Rx-)
CABLESB-4Crossover WiringIf the port on the attached device has straight-through wiring (MDI), use crossover cable. Crossover Cable Pin AssignmentsEnd 1 End 21 (Tx+) 3 (Rx+)2 (Tx-) 6 (Rx-)3 (Rx+) 1 (Tx+)6 (Rx-) 2 (Tx-)
C-1APPENDIX CSPECIFICATIONSIEEE StandardsIEEE 802.3 10 BASE-T Ethernet IEEE 802.3u 100 BASE-TX Fast EthernetIEEE 802.3, 802.3u, 802.11g, 802.1DLAN Interface4 RJ-45 10 BASE-T/100 BASE-TX portsAuto-negotiates the connection speed to 10 Mbps Ethernet or 100 Mbps Fast Ethernet, and the transmission mode to half-duplex or full-duplexWAN Interface1 RJ-45 portIndicator PanelPower, WAN, Online, WLAN, LAN 1~4, WPSDimensions188 x 133 x 33 mm (7.40 x 5.24 x 1.30 in)Weight0.285 kg (0.764 lbs)Input Power12 V 1 ADVE EU DSA-12R-AEU 120120, US DSA-12R-AUS 120120Leader EU MV12-4120100-C5, US MV12-4120100-A1Power Consumption8 Watts maximum
SPECIFICATIONSC-2Advanced FeaturesDynamic IP Address Configuration – DHCP, DNSFirewall – Client privileges, hacker prevention and logging, Stateful Packet InspectionVirtual Private Network – PPTP, L2TP, IPSec pass-through, VPN pass-throughInternet StandardsRFC 826 ARP, RFC 791 IP, RFC 792 ICMP, RFC 768 UDP, RFC 793 TCP, RFC 783 TFTP, RFC 1661 PPP, RFC 1866 HTML, RFC 2068 HTTPRadio FeaturesWireless RF module Frequency Band802.11n Radio: 2.4GHz802.11g Radio: 2.4GHz802.11b Radio: 2.4GHzUSA - FCC2412~2462MHz (Ch1~Ch11)Canada - IC2412~2462MHz (Ch1~Ch11)Europe - ETSI2412~2472MHz (Ch1~Ch13)Japan - STD-T66/STD-332412~2484MHz (Ch1~Ch14)Modulation TypeOFDM, CCKOperating Channels IEEE 802.11n Compliant:11 channels (US, Canada, Europe, Japan)Operating Channels IEEE 802.11g Compliant:11 channels (US, Canada)13 channels (Europe, Japan)
SPECIFICATIONSC-3Operating Channels IEEE 802.11b Compliant:11 channels (US, Canada)13 channels (Europe)14 channels (Japan)Standards ComplianceSafetyLVDEnvironmentalCE MarkTemperatureOperating 0 to 40 °C (32 to 104 °F)Storage -40 to 70 °C (-40 to 158 °F)Humidity5% to 95% (non-condensing)VibrationIEC 68-2-36, IEC 68-2-6ShockIEC 68-2-29DropIEC 68-2-32
SPECIFICATIONSC-4
SMCWBR11-GSMCWBR14S-N

Navigation menu