SMA America, LLC
Commissioning
User Manual
SWebBox-BUS-eng-111033
31
6.6 Configuring Sunny WebBox for the Local Network
6.6.1 Information on Integrating the Sunny WebBox into a Local
Network.
The next sections describe how to integrate the Sunny WebBox via static network settings into your
local network with a router.
In rare cases, additional network settings are necessary. Examples of further network settings include
integrating the Sunny WebBox via DHCP into your network, or making the Sunny WebBox accessible
via the Internet. If this is the case, contact your network administrator and refer to section
10.3 ”Ethernet Network” (page 62).
6.6.2 Configuring the Static Network Settings of the Sunny WebBox
1. Select "WebBox > Settings > Network" in the Sunny WebBox user interface.
2. In the "Obtain IP address" field, select the value "Static".
3. In the "IP Address" field enter the static IP address, under which the Sunny WebBox is to be
reachable in the local network (see section 15.1 ”Allocating an IP Address in a Local Network”
(page 84)).
4. Enter the subnet mask of your network in the "Subnet mask" field, . Normally, you can find this
information in the router manual.
5. Enter the Gateway address of your network into the "Gateway IP" field. Usually, the IP address
of the router has to be entered here.
6. In the "DNS server Address" field enter the IP address of the DNS server (Domain Name System
Server). Usually, the IP address of the router has to be entered here.
7. Select [Save] and [Confirm].
☑ The Sunny WebBox saves the network settings and will not longer be accessible from your
computer.
8. Remove the plug-in power supply of the Sunny WebBox from the socket-outlet.
9. Remove the blue network cable (crossover cable).
Sunny WebBox Assistant
It is recommended to use the Sunny WebBox Assistant for commissioning the
Sunny WebBox and for its integration into a network. You can download the
Sunny WebBox Assistant at www.SMA-America.com.
Protecting the Ethernet network from external attacks
Protect your Ethernet network through suitable security measures such as a firewall or the
allocation of secure passwords.