background image

Barricade ADSL Router

Wireless Broadband Router with 
built-in ADSL Modem

◆ 

Compatible with all leading DSLAMs

◆ 

Firewall (hacker attack logging, DoS, and client filtering)

◆ 

Supports DMT line modulation

◆ 

Four auto-negotiating 10/100 Ethernet ports

◆ 

Built-in print server

◆ 

PPTP, L2TP, and IPSec pass through

◆ 

Multiple user Internet access with a single-user account

◆ 

Supports PPPoE and PPPoA

◆ 

Plug & Play installation

◆ 

Web-based management

User Guide

SMC7404WBRA EU

Summary of Contents for 7404WBRA

Page 1: ...er attack logging DoS and client filtering Supports DMT line modulation Four auto negotiating 10 100 Ethernet ports Built in print server PPTP L2TP and IPSec pass through Multiple user Internet access with a single user account Supports PPPoE and PPPoA Plug Play installation Web based management User Guide SMC7404WBRA EU ...

Page 2: ......

Page 3: ... Irvine CA 92618 Phone 949 679 8000 Wireless Broadband Router with built in ADSL Modem From SMC s line of award winning connectivity solutions January 2003 Part No 750 9077 UK 750 9736 Pub No 150000020800E R01 ...

Page 4: ...ch may result from its use No license is granted by implication or otherwise under any patent or patent rights of our company We reserve the right to change specifications at any time without notice Copyright 2003 by SMC Networks Inc 38 Tesla Irvine CA 92618 All rights reserved Printed in Taiwan Trademarks Product and company names are trademarks or registered trademarks of their respective holder...

Page 5: ...ncorporates these newer technologies At that point the obsolete product is discontinued and is no longer an Active SMC product A list of discontinued products with their respective dates of discontinuance can be found at http www smc com index cfm action customer_service_warranty All products that are replaced become the property of SMC Replacement products may be either new or reconditioned Any r...

Page 6: ...CIDENT FIRE LIGHTNING OR OTHER HAZARD LIMITATION OF LIABILITY IN NO EVENT WHETHER BASED IN CONTRACT OR TORT INCLUDING NEGLIGENCE SHALL SMC BE LIABLE FOR INCIDENTAL CONSEQUENTIAL INDIRECT SPECIAL OR PUNITIVE DAMAGES OF ANY KIND OR FOR LOSS OF REVENUE LOSS OF BUSINESS OR OTHER FINANCIAL LOSS ARISING OUT OF OR IN CONNECTION WITH THE SALE INSTALLATION MAINTENANCE USE PERFORMANCE FAILURE OR INTERRUPTIO...

Page 7: ...ons not expressly approved by our company could void the user s authority to operate this equipment FCC Part 68 This equipment complies with Part 68 of the FCC rules This equipment comes with a label attached to it that contains among other information the FCC registration number and ringer equivalence number REN for this equipment If requested this information must be provided to the telephone co...

Page 8: ...via a telephone facsimile machine unless such message clearly contains in a margin at the top or bottom of each transmitted page or on the first page of the transmission the date and time it is sent and an identification of the business other entity or individual sending the message and the telephone number of the sending machine or such business other entity or individual In order to program this...

Page 9: ...mily standard according to EN 55024 1998 Electrostatic Discharge according to EN 61000 4 2 1995 Contact Discharge 4 kV Air Discharge 8 kV Radio frequency electromagnetic field according to EN 61000 4 3 1996 80 1000 MHz with 1 kHz AM 80 Modulation 3 V m Electrical fast transient burst according to EN 61000 4 4 1995 AC DC power supply 1 kV Data Signal lines 0 5 kV Surge immunity test according to EN...

Page 10: ...COMPLIANCES vi ...

Page 11: ...ct the Power Adapter 2 7 3 Configuring Client PCs 3 1 TCP IP Configuration 3 1 4 Configuring the Barricade 4 1 Navigating the Web Browser Interface 4 2 Making Configuration Changes 4 2 Setup Wizard 4 3 Time Zone 4 3 Internet Sharing 4 4 Parameter Setting 4 5 Finish 4 6 PPPoE PPPoA 4 7 Finish 4 8 Multiple Protocol over ATM Mode 4 10 Finish 4 11 Advanced Setup 4 13 Navigating the Web Browser Interfa...

Page 12: ...ress Mapping 4 31 Virtual Server 4 32 Routing System 4 34 Static Route 4 34 RIP 4 35 Routing Table 4 37 Firewall 4 38 Access Control 4 39 Access Control Add PC 4 41 URL Blocking 4 42 Schedule Rule 4 43 Intrusion Detection 4 45 DMZ 4 50 SNMP 4 51 Community 4 51 Trap 4 52 ADSL 4 53 Parameters 4 53 Status 4 54 Tools 4 57 Configuration Tools 4 57 Firmware Upgrade 4 58 Reset 4 59 Status 4 60 Finding th...

Page 13: ...om Your Barricade 5 17 Configuring Your Macintosh Computer 5 19 Disable HTTP Proxy 5 21 Obtain IP Settings from Your Barricade 5 23 6 Configuring Printer Services 6 1 Printer Server Setup in Windows 95 98 Me 6 1 Printer Server Setup in Windows NT 6 4 Printer Server Setup in Windows 2000 XP 6 6 Printer Server Setup in Unix Systems 6 8 A Troubleshooting A 1 B Cables B 1 Ethernet Cable B 1 Specificat...

Page 14: ...TABLE OF CONTENTS x ...

Page 15: ...de provides Internet access to multiple users by sharing a single user account Support is provided for both wired and wireless devices New technology provides wireless security via WEP Wired Equivalent Privacy encryption and MAC address filtering It is simple to configure and can be up and running in minutes Features Internet connection via an RJ 11 WAN port Local network connection via four 10 10...

Page 16: ...ted access to Internet services such as Web FTP e mail and Telnet VPN pass through IPSec ESP Tunnel mode L2TP PPTP User definable application sensing tunnel supports applications requiring multiple connections Easy setup through a Web browser on any operating system that supports TCP IP Compatible with all popular Internet applications ...

Page 17: ...n your computer Shared IP Address The Barricade provides Internet access for up to 253 users via a single shared IP address Using only one ISP account multiple users on your network can browse the Web at the same time Virtual Server If you have a fixed IP address you can set the Barricade to act as a virtual host for network address translation Remote users access various services at your site usi...

Page 18: ...rricade supports three of the most commonly used VPN protocols PPTP L2TP and IPSec These protocols allow remote users to establish a secure connection to their corporate network If your service provider supports VPNs then these protocols can be used to create an authenticated and encrypted tunnel for passing secure data over the Internet i e a traditionally shared data network The VPN protocols su...

Page 19: ...rricade After installing the Barricade refer to Configuring the Barricade on page 4 1 Package Contents After unpacking the Barricade check the contents of the box to be sure you have received the following components Barricade ADSL Router SMC7404WBRA EU Power adapter One CAT 5 Ethernet cable Telephone patch cable Documentation CD This User Guide Immediately inform your retailer or Service Provider...

Page 20: ...address and DNS server address from your service provider A computer equipped with a 10 Mbps 100 Mbps or 10 100 Mbps Fast Ethernet card a USB to Ethernet converter or an IEEE 802 11b wireless network adapter TCP IP network protocols installed on each PC that will access the Internet A Java enabled Web browser such as Microsoft Internet Explorer 4 0 or above or Netscape Communicator 4 0 or above in...

Page 21: ...an run at up to 100 Mbps over the Fast Ethernet ports and 11 Mbps over the built in wireless network adapter The Barricade includes an LED display on the front panel for system power and port indications that simplifies installation and network troubleshooting It also provides the following ports on the rear panel Item Description LAN Ports Fast Ethernet ports RJ 45 Connect devices on your local a...

Page 22: ...not place the Barricade in a dusty or wet environment You should also remember to turn off the power remove the power cord from the outlet and keep your hands dry when you install the Barricade LED Condition Status Power On The Barricade is receiving power Normal operation Off Power off or failure Ethernet 4 LEDs On Ethernet Link Flashing Send Receive data Off No Link ADSL Syn On ADSL connection i...

Page 23: ...een the ADSL wall jack and your telephones These filters pass voice signals through but filter data signals out Phone Line Configuration Installing a Full rate Connection If you are using a full rate G dmt connection your service provider will attach the outside ADSL line to a data voice splitter In this case you can connect your phones and computer directly to the splitter as shown below Figure 2...

Page 24: ...Using Ethernet Cabling The four LAN ports on the Barricade auto negotiate the connection speed to 10 Mbps Ethernet or 100 Mbps Fast Ethernet as well as the transmission mode to half duplex or full duplex Use twisted pair cabling to connect any of the four LAN ports on the Barricade to an Ethernet adapter on your PC Otherwise cascade any of the LAN ports on the Barricade to an Ethernet hub or switc...

Page 25: ...does not exceed 100 meters 328 feet Connect the Power Adapter Plug the power adapter into the power socket on the rear of the Barricade and the other end into a power outlet Check to confirm the power indicator on the front panel is lit If the power indicator is not lit refer to Troubleshooting on page A 1 In case of a power input failure the Barricade will automatically restart and begin to opera...

Page 26: ...INSTALLATION 2 8 ...

Page 27: ...k settings for the Barricade are IP Address 192 168 2 1 Subnet Mask 255 255 255 0 Note These settings can be changed to fit your network requirements but you must first configure at least one computer as described in Configuring Client TCP IP on page 5 1 to access the Barricade s Web configuration interface in order to make the required changes See Configuring the Barricade on page 4 1 for instruc...

Page 28: ...CONFIGURING CLIENT PCS 3 2 ...

Page 29: ...rnet Explorer 4 0 or above or Netscape Navigator 4 0 or above Using the Web management interface you may configure the Barricade and view statistics to monitor network activity To access the Barricade s management interface enter the IP address of the Barricade in your web browser http 192 168 2 1 The Barricade automatically switches to Port 80 for management access Then click LOGIN by default the...

Page 30: ...etup virtual DMZ host as well as other functions Go to Advanced Setup on page 4 13 Making Configuration Changes Configurable parameters have a dialog box or a drop down list Once a configuration change has been made on a page be sure to click the APPLY or NEXT button at the bottom of the page to enable the new setting Note To ensure proper screen refresh after a command entry be sure that Internet...

Page 31: ...is Time Zone setup For accurate timing of log entries and system events you need to set the time zone Select your time zone from the drop down list If your area requires it check to enable the clock for daylight saving changes and enter the Daylight Saving Time start and end dates for your location ...

Page 32: ...ICADE 4 4 Internet Sharing Select the operation mode Go to PPPoE PPPoA on page 4 7 if you will use either of these modes and go to Multiple Protocol over ATM Mode on page 4 10 if you will use multiple protocol routing mode ...

Page 33: ...VPI that identifies the path between two nodes and a Virtual Circuit Identifier VCI that identifies the data channel within that virtual path Each virtual circuit maintains a constant flow of cells between the two end points When there is no data to transmit empty cells are sent And when data needs to be transmitted it is immediately inserted into the cell flows ...

Page 34: ... Go to Troubleshooting on page A 1 if you cannot make a connection to the Internet Parameter Description Protocol Indicates the protocol used VPI VCI Virtual Path Identifier VPI and Virtual Circuit Identifier VCI AAL5 Encapsulation Shows the packet encapsulation type ...

Page 35: ...r VCI Data flows are broken up into fixed length cells each of which contains a Virtual Path Identifier VPI that identifies the path between two nodes and a Virtual Circuit Identifier VCI that identifies the data channel within that virtual path Each virtual circuit maintains a constant flow of cells between the two end points When there is no data to transmit empty cells are sent And when data ne...

Page 36: ...L Operation Mode WAN Protocol Indicates the protocol used VPI VCI Virtual Path Identifier VPI and Virtual Circuit Identifier VCI AAL5 Encapsulation Shows the packet encapsulation type ISP Parameters Username The ISP assigned user name Password The password hidden ...

Page 37: ...ress within its local network it will forward the packets to the Default Gateway usually supplied by your ISP Subnet Mask The network subnet mask Name Server 1 Primary name server IP address Name Server 2 Alternate name server IP address Name Server 3 Alternate name server IP address Start IP Address Start IP address of DHCP assigned IP addresses Number of IP Number of IPs available for assignment...

Page 38: ...ntifier VPI that identifies the path between two nodes and a Virtual Circuit Identifier VCI that identifies the data channel within that virtual path Each virtual circuit maintains a constant flow of cells between the two end points When there is no data to transmit empty cells are sent And when data needs to be transmitted it is immediately inserted into the cell flows Default Gateway Enter a def...

Page 39: ...the protocol used VPI VCI Virtual Path Identifier VPI and Virtual Circuit Identifier VCI AAL5 Encapsulation Shows the packet encapsulation type Network Layer Parameters WAN IP Address Shows the WAN IP address Subnet Mask Shows the WAN subnet mask Default Gateway Shows the WAN default gateway ...

Page 40: ...ion address within its local network it will forward the packets to the Default Gateway usually supplied by your ISP Subnet Mask The network subnet mask Name Server 1 Primary name server IP address Name Server 2 Alternate name server IP address Name Server 3 Alternate name server IP address Start IP Address Start IP Address of DHCP assigned IP addresses Number of IP Number of IPs available for ass...

Page 41: ...nformation on the right hand side The Main Menu links are used to navigate to other menus that display configuration parameters and statistics Navigating the Web Browser Interface The Barricade s advanced management interface contains eleven main menu items System WAN LAN Wireless NAT Routing system Firewall SNMP ADSL Tools and Status ...

Page 42: ...s NAT Shares a single ISP account with multiple users sets up virtual servers Routing system Sets routing parameters and displays the current routing table Firewall Configures a variety of security and specialized functions including Access Control URL blocking Internet access control scheduling Intruder detection and DMZ SNMP Community string and trap server setting ADSL Sets the ADSL operation t...

Page 43: ... 0 is configured as follows Under the menu Tools Internet Options General Temporary Internet Files Settings the setting for Check for newer versions of stored pages should be Every visit to the page System Settings Time Zone Set your local time zone This information is used for log entries and client filtering ...

Page 44: ... one before exposing the Barricade to the Internet Passwords can contain from 3 12 alphanumeric characters and are not case sensitive Note If your password is lost or you cannot gain access to the user interface press the reset button colored blue on the rear panel holding it down for at least five seconds to restore the factory defaults The default is no password ...

Page 45: ...ers on your local network However you can also manage the Barricade from a remote host by entering the IP address of a remote computer on this screen Check the Enabled box to enable this function Note If you check Enabled and specify an IP address of 0 0 0 0 any host can manage the Barricade ...

Page 46: ...NS Domain Name Servers are used to map a domain name e g www smc com to the equivalent numerical IP address e g 64 147 25 20 Your ISP should provide the IP address of one or more domain name servers Enter those addresses on this page ...

Page 47: ...rface IP Address If your IP address is assigned by the ISP each time you connect leave this field all zeros Otherwise enter your ISP supplied static IP address here Subnet Mask If your subnet mask is assigned by the ISP each time you connect leave this field all zeros Otherwise enter your subnet mask here ...

Page 48: ... data needs to be transmitted it is immediately inserted into the cell flows Encapsulation Specifies how to handle multiple protocols at the ATM transport layer VC MUX Point to Point Protocol over ATM Virtual Circuit Multiplexer null encapsulation allows only one protocol running per virtual circuit with less overhead LLC Point to Point Protocol over ATM Logical Link Control allows multiple protoc...

Page 49: ...t Protocol over ATM is a method of encapsulating data for transmission to a far point 1483 Routing 1483 Routing allows a simple low cost connection to the Internet via a standard 10BASE T port The router looks up the network address for each packet seen on the LAN port If the address is listed in the routing table as local it is filtered If the address is listed under the ADSL port it is forwarded...

Page 50: ...f VPI VCI settings Encapsulation Specifies how to handle multiple protocols at the ATM transport layer VC MUX Point to Point Protocol over ATM Virtual Circuit Multiplexer null encapsulation allows only one protocol running per virtual circuit with less overhead LLC Point to Point Protocol over ATM Logical Link Control allows multiple protocols running over one virtual circuit with a little bit mor...

Page 51: ...P address of the Barricade IP Subnet Mask Virtual Path Identifier VPI and Virtual Circuit Identifier VCI DHCP Server To dynamically assign an IP address to client PCs enable the DHCP Dynamic Host Configuration Protocol Server Lease Time Set the DHCP lease time ...

Page 52: ...start IP address of the DHCP pool Do not include the gateway address of the Barricade in the client address pool If you change the pool range make sure the first three octets match the gateway s IP address i e 192 168 2 xxx End IP Address Specify the end IP address of the DHCP pool Domain Name If your network uses a domain name enter it here otherwise leave this field blank Parameter Description ...

Page 53: ...ers to access resources available on the wired LAN and to access the Internet To configure the Barricade as a wireless access point for wireless clients either stationary or roaming all you need to do is enable the wireless function define the radio channel the domain identifier and the encryption options ...

Page 54: ...ng on the distance between the wireless hub and wireless adapter You can also select a lower transmission data rate to maximize the radio communication range Basic Rate The highest rate specified will be the rate that the Barricade will use when transmitting broadcast multicast and management frames Available options are All 1 2 5 5 and 11Mbps and 1 2Mbps default is 1 2Mbps Channel The radio chann...

Page 55: ... Barricade and all of the wireless clients Choose between standard 64 bit WEP Wired Equivalent Privacy or the more robust 128 bit encryption You may automatically generate encryption keys or manually enter the keys For automatic 64 bit key generation enter a passphrase and click Generate Four keys will be generated Automatic 128 bit key generation generates a single key ...

Page 56: ...s for the single 128 bit key A hexadecimal digit is a number or letter in the range 0 9 or A F If you use encryption configure the same keys used for the Barricade on each of your wireless clients Note that WEP protects data transmitted between wireless nodes but does not protect transmissions over your wired network or over the Internet ...

Page 57: ...WIRELESS 4 29 MAC Address Filtering ...

Page 58: ...t gaming videoconferencing Internet telephony and others These applications may not work when Network Address Translation NAT is enabled If you need to run applications that require multiple connections use these pages to specify the additional public ports to be opened for each application Parameter Description Filtering Disable Disables MAC address filtering Enable Enables MAC address filtering ...

Page 59: ...se Address Mapping to allow a limited number of public IP addresses to be translated into multiple private IP addresses for use on the internal LAN network This also hides the internal network for increased privacy and security ...

Page 60: ...CONFIGURING THE BARRICADE 4 32 Virtual Server ...

Page 61: ... all HTTP requests from outside users will be transferred to 192 168 2 2 on port 80 Therefore by just entering the IP Address provided by the ISP Internet users can access the service they need at the local address to which you redirect them The more common TCP service ports include HTTP 80 FTP 21 Telnet 23 and POP3 110 A list of ports is maintained at the following link http www iana org assignme...

Page 62: ...he box of an already entered route and click Modify Clicking Delete will remove an entry from the list Parameter Description Index Check the box of the route you wish to delete or modify Network Address Enter the IP address of the remote computer for which to set a static route Subnet Mask Enter the subnet mask of the remote network for which to set a static route Gateway Enter the WAN IP address ...

Page 63: ...nable RIP enabled on this interface Silent Listens for route broadcasts and updates its route table It does not participate in sending route broadcasts Version Sets the RIP Routing Information Protocol version to use on this interface Poison Reverse A way in which a router tells its neighbor routers that one of the routers is no longer connected ...

Page 64: ...change Authentication Required None No authentication Password A password authentication key is included in the packet If this does not match what is expected the packet will be discarded This method provides very little security as it is possible to learn the authentication key by watching RIP packets MD5 MD5 is an algorithm that is used to verify data integrity through the creation of a 128 bit ...

Page 65: ...dress bits in the destination address used for routing to specific subnets Each bit that corresponds to a 1 is part of the network subnet number each bit that corresponds to 0 is part of the host number Gateway The IP address of the router at the next hop to which matching frames are forwarded Interface The local interface through which the next hop of this route is reached Metric When a router re...

Page 66: ...n hacker attacks including IP Spoofing Land Attack Ping of Death IP with zero length Smurf Attack UDP port loopback Snork Attack TCP null scan and TCP SYN flooding The firewall does not significantly affect system performance and we advise leaving it enabled to protect your network Note When you check a radio button in the Enable or disable Firewall module function field be sure to click the APPLY...

Page 67: ...FIREWALL 4 39 Access Control ...

Page 68: ... area network LAN The MAC Filtering Table allows the Barricade to enter up to 32 MAC addresses that are not allowed access to the WAN port The following items are on the Access Control screen Note Click Add PC and define the appropriate settings for client PC services as shown on the following screen Parameter Description Normal Filtering Table Displays the IP address or an IP address range filter...

Page 69: ...FIREWALL 4 41 Access Control Add PC ...

Page 70: ...locking The Barricade allows the user to block access to Web sites from a particular PC by entering either a full URL address or just a keyword This feature can be used to protect children from accessing violent or pornographic Web sites ...

Page 71: ...ased on rules Each access control rule may be activated at a scheduled time Define the schedule on the Schedule Rule page and apply the rule on the Access Control page 1 Click Add Schedule Rule 2 Define the appropriate settings for a schedule rule as shown on the following screen ...

Page 72: ...CONFIGURING THE BARRICADE 4 44 3 Click OK and then click APPLY to save your settings ...

Page 73: ...FIREWALL 4 45 Intrusion Detection ...

Page 74: ...ources The Barricade protects against the following DoS attacks Ping of Death Ping flood attack SYN flood attack IP fragment attack Teardrop Attack Brute force attack Land Attack IP Spoofing attack IP with zero length TCP null scan Port Scan Attack UDP port loopback Snork Attack etc Note The firewall does not significantly affect system performance so we advise enabling the prevention features to ...

Page 75: ...d the current communication This is a way of ensuring that all communications are initiated by the recipient computer and are taking place only with sources that are known and trusted from previous interactions In addition to being more rigorous in their inspection of packets stateful inspection firewalls also close off ports until a connection to the specific port is requested When particular typ...

Page 76: ...Name Enter your email account user name Password Enter your email account password Connection Policy Fragmentation half open wait 10 sec Configures the number of seconds that a packet state structure remains active When the timeout value expires the router drops the unassembled packet freeing that structure for use by another packet TCP SYN wait 30 sec Defines how long the software will wait for a...

Page 77: ...te Incomplete TCP UDP sessions per min LOW 200 sessions Minimum number of allowed incomplete TCP UDP sessions per minute Maximum incomplete TCP UDP sessions number from same host 10 Maximum number of incomplete TCP UDP sessions from the same host Incomplete TCP UDP sessions detect sensitive time period 300 msec Length of time before an incomplete TCP UDP session is detected as incomplete Maximum h...

Page 78: ... properly from behind the firewall you can open the client up to unrestricted two way Internet access Enter the IP address of a DMZ Demilitarized Zone host on this screen Adding a client to the DMZ may expose your local network to a variety of security risks so only use this option as a last resort ...

Page 79: ...to access this information Access rights to the agent are controlled by community strings To communicate with the Barricade the NMS must first submit a valid community string for authentication Note Up to 5 community names may be entered Parameter Description Community A community name authorized for management access Access Management access is restricted to Read Only Read or Read Write Write Val...

Page 80: ... private to prevent unauthorized individuals from reading information on your system Version Sets the trap status to disabled or enabled with V1 or V2c The v2c protocol was proposed in late 1995 and includes enhancements to v1 that are universally accepted These include a get bulk command to reduce network management traffic when retrieving a sequence of MIB variables and a more elaborate set of e...

Page 81: ...ADSL 4 53 ADSL Parameters Parameter Description Operation Mode Automatic ETSI DTS TM 06006 standard G 992 1 standard Address 3C etc Reserved ...

Page 82: ...CONFIGURING THE BARRICADE 4 54 Status ...

Page 83: ...cy paths that may be used fast and interleaved For either path a forward error correction FEC scheme is employed to ensure higher data integrity For maximum noise immunity an interleaver may be used to supplement FEC Interleaved Path FEC Correction An interleaver is basically a buffer used to introduce a delay allowing for additional error correction techniques to handle noise Interleaving slows t...

Page 84: ...rame contains regular ADSL frames one of which is used to provide superframe synchronization identifying the start of a superframe Some of the remaining frames are also used for special functions Received Superframes Interleaved Number of interleaved superframes received Transmitted Superframes Interleaved Number of interleaved superframes transmitted Received Superframes Fast Number of fast super...

Page 85: ... Backup and click More Configuration to save your Barricade s configuration to a file named config bin on your PC You can then check the Restore radio button and click More Configuration to restore the saved backup configuration file To restore the factory settings check Restore to Factory Defaults and click More Configuration You will be asked to confirm your decision ...

Page 86: ...rface to the latest versions In the Upgrade Target field choose Firmware or User Interface depending on which you want to update Then click Browse to browse for the previously downloaded file Note For latest firmware user interface version information and download visit SMC s Web site at www smc com ...

Page 87: ...rm a reset from this page The configurations will not be changed back to the factory default settings Note If you use the reset button on the rear panel the Barricade performs a power reset and restores the factory settings ...

Page 88: ...s The Status screen displays WAN LAN connection status firmware and hardware version numbers as well as information on DHCP clients connected to your network The security log may be saved to a file by clicking Save and choosing a location ...

Page 89: ...ess Linux Run the command sbin ifconfig The card s MAC address is the value after the word HWaddr Parameter Description INTERNET Displays WAN connection type and status GATEWAY Displays system IP settings as well as DHCP Server and Firewall status INFORMATION Displays the number of attached clients the firmware versions the physical MAC address for each media interface and for the Barricade as wel...

Page 90: ...CONFIGURING THE BARRICADE 4 62 ...

Page 91: ...dress determines how you need to configure your computer See this section for Windows 95 98 ME configuration See Windows NT 4 0 on page 5 6 Windows 2000 on page 5 11 Windows XP on page 5 15 or Configuring Your Macintosh Computer on page 5 19 depending on your operating system Windows 95 98 ME You may find that the instructions in this section do not exactly match your version of Windows This is be...

Page 92: ...P item listed for your network card 4 Select the IP Address tab 5 If Obtain an IP address automatically is already selected your computer is already configured for DHCP Click Cancel to close each window and skip to Disable HTTP Proxy on page 5 4 If not locate your IP address and subnet mask Record the numbers in the space provided on the following page ...

Page 93: ...y Click the IP Address tab and then click Obtain an IP address automatically Click OK 9 Windows may need your Windows 95 98 ME CD to copy some files After it finishes copying it will prompt you to restart your system Click Yes and your computer will shut down and restart TCP IP Configuration Setting IP Address ____ ____ ____ ____ Subnet Mask ____ ____ ____ ____ Primary DNS Server ____ ____ ____ __...

Page 94: ...ollowing steps are for Internet Explorer and Netscape Determine which browser you use and follow the appropriate steps Internet Explorer 1 Open Internet Explorer and click the stop button Click Tools then Internet Options 2 In the Internet Options window click the Connections tab Next click the LAN Settings button 3 Clear all the checkboxes 4 Click OK and then click OK again to close the Internet ...

Page 95: ...rnet Click OK 3 Repeat these steps for each Windows 95 98 ME computer connected to your Barricade Obtain IP Settings from Your ADSL Router Now that you have configured your computer to connect to your Barricade it needs to obtain new network settings By releasing old DHCP IP settings and renewing them with settings from your Barricade you can also verify that you have configured your computer corr...

Page 96: ...rm that your Barricade is functioning Click OK to close the IP Configuration window Windows NT 4 0 After completing hardware setup by connecting your network devices you need to configure your computer to connect to the Barricade First determine how your ISP issues your IP address Many ISPs issue these numbers automatically using Dynamic Host Configuration Protocol DHCP Other ISPs provide a static...

Page 97: ...3 Select the Protocols tab 4 Double click TCP IP Protocol 5 Select the IP Address tab 6 In the Adapter drop down list be sure your Ethernet adapter is selected 7 If Obtain an IP address automatically is already selected your computer is already configured for DHCP Click Cancel to close each window and skip to Disable HTTP Proxy on page 5 9 ...

Page 98: ...writing down your IP settings click the IP address tab Select Obtain IP address automatically and click OK Click OK again to close the Network window 11 Windows may copy some files and will then prompt you to restart your system Click Yes and your computer will shut down and restart TCP IP Configuration Setting IP Address ____ ____ ____ ____ Subnet Mask ____ ____ ____ ____ Default Gateway ____ ___...

Page 99: ...etscape on page 5 5 Obtain IP Settings from Your Barricade Now that you have configured your computer to connect to your Barricade it needs to obtain new network settings By releasing old DHCP IP settings and renewing them with settings from your Barricade you will verify that you have configured your computer correctly 1 From the Windows desktop click Start Programs and then click Command Prompt ...

Page 100: ... your IP Address is now 192 168 2 xxx your Subnet Mask is 255 255 255 0 and your Default Gateway is 192 168 2 1 These values confirm that your Barricade is functioning 4 Type EXIT and press ENTER to close the Command Prompt window Your computer is now configured to connect to the Barricade ...

Page 101: ... Windows 2000 1 On the Windows desktop click Start Settings Network and Dial Up Connections 2 Click the icon that corresponds to the connection to your Barricade 3 The connection status screen will open Click Properties ...

Page 102: ...ddress automatically are already selected your computer is already configured for DHCP Click Cancel to close each window and skip to Disable HTTP Proxy on page 5 13 7 Select Obtain an IP address automatically and Obtain DNS server address automatically Click OK or Close to close each window TCP IP Configuration Setting IP Address ____ ____ ____ ____ Subnet Mask ____ ____ ____ ____ Default Gateway ...

Page 103: ...cape on page 5 5 Obtain IP Settings from Your Barricade Now that you have configured your computer to connect to your Barricade it needs to obtain new network settings By releasing old DHCP IP settings and renewing them with settings from your Barricade you can verify that you have configured your computer correctly 1 From the Windows desktop click Start Programs Accessories and then Command Promp...

Page 104: ...your IP Address is now 192 168 2 xxx your Subnet Mask is 255 255 255 0 and your Default Gateway is 192 168 2 1 These values confirm that your ADSL Router is functioning 4 Type EXIT and press ENTER to close the Command Prompt window Your computer is now configured to connect to the Barricade ...

Page 105: ...XP 1 Click start Control Panel 2 In Control Panel click Network and Internet Connections 3 The Network Connections screen will open Double click the connection for this device 4 On the connection status screen click Properties ...

Page 106: ...ddress automatically are already selected your computer is already configured for DHCP Click Cancel to close each window and skip to Disable HTTP Proxy on page 5 17 8 Select Obtain an IP address automatically and Obtain DNS server address automatically Click OK or Close to close each window TCP IP Configuration Setting IP Address ____ ____ ____ ____ Subnet Mask ____ ____ ____ ____ Default Gateway ...

Page 107: ...Netscape on page 5 5 Obtain IP Settings from Your Barricade Now that you have configured your computer to connect to your Barricade it needs to obtain new network settings By releasing old DHCP IP settings and renewing them with settings from your Barricade you can verify that you have configured your computer correctly 1 From the Windows desktop click start Programs Accessories Command Prompt 2 I...

Page 108: ... your IP Address is now 192 168 2 xxx your Subnet Mask is 255 255 255 0 and your Default Gateway is 192 168 2 1 These values confirm that your ADSL Router is functioning Type EXIT and press ENTER to close the Command Prompt window Your computer is now configured to connect to the Barricade ...

Page 109: ...our operating system This is because these steps and screenshots were created using Mac OS 8 5 Mac OS 7 x and above are similar but may not be identical to Mac OS 8 5 Follow these instructions 1 Pull down the Apple Menu Click Control Panels and select TCP IP 2 In the TCP IP dialog box make sure Ethernet is selected in the Connect via field ...

Page 110: ...n on the TCP IP screen it should be recorded Use the spaces below to record the current settings 5 After writing down your IP settings select Using DHCP Server in the Configure field and close the window 6 Another box will appear asking whether you want to save your settings Click Save TCP IP Configuration Setting IP Address ____ ____ ____ ____ Subnet mask ____ ____ ____ ____ Router address ____ _...

Page 111: ...he Barricade s HTML configuration pages The following steps are for Internet Explorer and Netscape Determine which browser you use and follow the appropriate steps Internet Explorer 1 Open Internet Explorer and click the stop button Click Edit and select Preferences 2 In the Internet Explorer Preferences window under Network select Proxies 3 Uncheck all checkboxes and click OK ...

Page 112: ...scape and click the stop button Click Edit and select Preferences 2 In the Preferences dialog box in the left hand column labeled Category select Advanced Under the Advanced category select Proxies 3 Select Direct Connectionto the Internet and click OK ...

Page 113: ...m your Barricade you can verify that you have configured your computer correctly 1 Pull down the Apple Menu Click Control Panels and select TCP IP 2 Your new settings are shown in the TCP IP window Verify that your IP Address is now 192 168 2 xxx your Subnet Mask is 255 255 255 0 and your Default Gateway is 192 168 2 1 These values confirm that your Barricade is functioning 3 Close the TCP IP wind...

Page 114: ...CONFIGURING CLIENT TCP IP 5 24 ...

Page 115: ... in Windows 95 98 Me For Windows 95 98 Me clients you need to install the port monitor program as described in this section You may find that the instructions here do not exactly match your version of Windows This is because these steps and screenshots were created in Windows 98 Windows 95 and Windows Millennium Edition are very similar but not identical to Windows 98 1 Insert the installation CD ...

Page 116: ... screen indicates that the print client uses the TCP IP network protocol to monitor print requests Click Next 3 Select the destination folder and click on the Next button The setup program will then begin to install the programs into the destination folder ...

Page 117: ...m icon for uninstalling the port monitor and then click Next 5 Enter the printer port name that will be used to identify the port monitor in your system and click Next 6 When the setup program finishes installing the port monitor check Yes I want to restart my computer now and then click OK ...

Page 118: ...N WINDOWS NT 6 4 Printer Server Setup in Windows NT 1 On a Windows NT platform open the Printers window in the My Computer menu and double click the Add Printer icon 2 Follow the prompts to add a local printer to your system ...

Page 119: ... button 4 Enter the IP address of the Barricade and click OK Click Next in the Add Printer Wizard dialog box 5 Specify the printer type attached to the Barricade 6 Continue following the prompts to complete the installation of the Barricade print server The printer type you specified will now be added to your Printers menu ...

Page 120: ...uctions here do not exactly match your version of Windows This is because these steps and most of the screenshots were created in Windows 2000 Windows XP is similar but not identical to Windows 2000 1 On a Windows 2000 XP platform open the Printers window from the Start menu and double click the Add Printer icon ...

Page 121: ...CONFIGURING PRINTER SERVICES 6 7 2 Follow the prompts to add a local printer to your system 3 Specify the printer type attached to the Barricade ...

Page 122: ...and click OK Then click Next in the Add Printer Wizard dialog box 6 Continue following the prompts to complete the installation of the Barricade print server The printer will now be added to your Printers menu Printer Server Setup in Unix Systems Follow the standard configuration procedure on your Unix platform to set up the Barricade print server The printer name is lpt1 ...

Page 123: ...ween the Barricade the external power supply and the wall outlet If the power indicator does not turn on when the power cord is plugged in you may have a problem with the power outlet power cord or external power supply However if the unit powers off after running for a while check for loose power connections power losses or surges at the power outlet If you still cannot isolate the problem then t...

Page 124: ...ce any defective adapter or cable if necessary Network Connection Problems Cannot Ping the Barricade from the attached LAN or the Barricadecannot Ping any device on the attached LAN Verify that the IP addresses are properly configured For most applications you should use the Barricade s DHCP function to dynamically assign IP addresses to hosts on the attached LAN However if you manually configure ...

Page 125: ...y Check that you have a valid network connection to the Barricade and that the port you are using has not been disabled Check the network cabling between the management station and the Barricade Forgot or lost the password Press the Reset button on the rear panel holding it down for at least five seconds to restore the factory defaults Troubleshooting Chart Symptom Action ...

Page 126: ...angle of the antenna There may be interference possibly caused by a microwave oven 2 4GHz wireless phone or metal objects Move these interference sources or change the location of the wireless PC or Barricade Change the wireless channel on the Barricade See Channel and SSID on page 26 Check the AP antenna connectors and cabling are firmly connected The Barricade cannot be detected by a wireless cl...

Page 127: ...might be red and the other red with white stripes Also an RJ 45 connector must be attached to both ends of the cable Each wire pair must be attached to the RJ 45 connectors in a specific orientation The following figure illustrates how the pins on an Ethernet RJ 45 connector are numbered Be sure to hold the connectors in the same orientation when attaching the wires to the pins Figure B 1 RJ 45 Et...

Page 128: ... switch use the cable type shown in the following table Pin Assignments With 10BASE T 100BASE TX cable pins 1 and 2 are used for transmitting data and pins 3 and 6 for receiving data Attached Device Port Type Connecting Cable Type MDI X Straight through MDI Crossover RJ 45 Pin Assignments Pin Number Assignment 1 Tx 2 Tx 3 Rx 6 Rx The and signs represent the polarity of the wires that make up each ...

Page 129: ...ring MDI X then use straight through cable Crossover Wiring If the port on the attached device has straight through wiring MDI use crossover cable Straight Through Cable Pin Assignments End 1 End 2 1 Tx 1 Tx 2 Tx 2 Tx 3 Rx 3 Rx 6 Rx 6 Rx Crossover Cable Pin Assignments End 1 End 2 1 Tx 3 Rx 2 Tx 6 Rx 3 Rx 1 Tx 6 Rx 2 Tx ...

Page 130: ...nt colors For example one wire might be red and the other red with white stripes Also an RJ 11 connector must be attached to both ends of the cable Each wire pair must be attached to the RJ 11 connectors in a specific orientation The following figure illustrates how the pins on the RJ 11 connector are numbered Be sure to hold the connectors in the same orientation when attaching the wires to the p...

Page 131: ... Orange 3 Line 1 Ring Red or Blue White 4 Line 1 Tip Green or White Blue 5 Line 2 Ring Yellow or Orange White 6 Not used 1 2 3 4 5 6 Blue White White Blue R1 T1 1 2 3 4 5 6 Red Green R1 T1R2 T2 Black Yellow 1 2 3 4 5 6 Blue White White Blue R1 T1R2 T2 White Orange Orange White 6x2 Jack 6x4 Jack 6x4 Jack T Tip R Ring ...

Page 132: ...CABLES B 6 ...

Page 133: ... 10 BASE T Ethernet IEEE 802 3u 100 BASE TX Fast Ethernet IEEE 802 11b Wireless LAN Modem Standards ITU G 992 1 G dmt ITU G 992 2 G Lite ITU G 994 1 G handshake ITU T 413 issue 2 ADSL full rate LAN Interfaces 4 RJ 45 10 BASE T 100 BASE TX ports Auto negotiates the connection speed to 10 Mbps Ethernet or 100 Mbps Fast Ethernet and the transmission mode to half duplex or full duplex On board wireles...

Page 134: ...ress Configuration DHCP DNS Firewall Client privileges hacker prevention and logging Stateful Packet Inspection Virtual Private Network PPTP IPSec pass through VPN pass through Internet Standards RFC 826 ARP RFC 791 IP RFC 792 ICMP RFC 768 UDP RFC 793 TCP RFC 783 TFTP RFC 1483 AAL5 Encapsulation RFC 1661 PPP RFC 1866 HTML RFC 2068 HTTP RFC 2364 PPP over ATM Temperature Operating 0 to 40 C 32 to 10...

Page 135: ......

Page 136: ...39 02 739 14 17 Benelux 31 33 455 72 88 Fax 31 33 455 73 30 Central Europe 49 0 89 92861 0 Fax 49 0 89 92861 230 Switzerland 41 0 1 9409971 Fax 41 0 1 9409972 Nordic 46 0 868 70700 Fax 46 0 887 62 62 Northern Europe 44 0 118 974 8700 Fax 44 0 118 974 8701 Eastern Europe 34 93 477 4920 Fax 34 93 477 3774 Sub Saharian Africa 27 11 314 1133 Fax 27 11 314 9133 North Africa 34 93 477 4920 Fax 34 93 477...

Reviews: