SMC Networks Router SMCWBR14-G2 User Manual
Have a look at the manual SMC Networks Router SMCWBR14-G2 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 10 SMC Networks manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
HOME NETWORK SETTINGS 4-25 Wi-Fi Channel NumberThe radio channel used by the Barricade and its clients to communicate with each other. This channel must be the same on the Barricade and all of its wireless clients. The Barricade will automatically assign itself a radio channel, or you may select one manually. (Default: 6) Extend Range Extends the range of the Barricade. (Default: Disable) Parameter Description
CONFIGURING THE BAR RICADE 4-26 WDS The Wireless Distribution System (WDS) provides a means to extend the range of a Wireless Local Area Network (WLAN). WDS allows the Barricade to establish a direct link to other wireless base stations and allows clients to roam freely within the area covered by the WDS. To carry out a site survey of available wireless base stations, click Scan. Parameter Description SSID The Service Set ID (SSID) is the name of your wireless network. The SSID must be the same on the Barricade and all of its wireless clients. Channel This device supports the following modes 11g only, 11b only, and 11b/g mixed mode. MAC Address The media access control address (MAC address) is a unique identifier attached to each wireless base station. Security Displays the security mechanism in use. Enable WDS Enables the WDS feature. When enabled, up to 4 WDS links can be set by specifying their Wireless MAC addresses in the MAC address table. Make sure the same channel is in use on all devices. (Default: Disable)
SECURITY 4-27 Security The first menu item in the Security section is Firewall. The Barricade provides a stateful inspection firewall which is designed to protect against Denial of Service (DoS) attacks when activated. Its purpose is to allow a private local area network (LAN) to be securely connected to the Internet. The second menu item is Wireless. This section allows you to configure wireless security settings according to your environment and the privacy level required. To configure your firewall settings, click Firewall in the left-hand menu.
CONFIGURING THE BAR RICADE 4-28 Firewall The Barricade’s firewall inspects packets at the application layer, maintains TCP and UDP session information including time-outs and the number of active sessions, and provides the ability to detect and prevent certain types of network attacks. Network attacks that deny access to a network device are called Denial-of- Service (DoS) attacks. DoS attacks are aimed at devices and networks with a connection to the Internet. Their goal is not to steal information, but to disable a device or network so users no longer have access to network resources. The Barricade protects against the following DoS attacks: IP Spoofing, Land Attack, Ping of Death, IP with zero length, Smurf Attack, UDP port loopback, Snork Attack, TCP null scan, and TCP SYN flooding. (See “Intrusion Detection” on page 4-35 for details.) The firewall does not significantly affect system performance, so we advise leaving it enabled to protect your network. Enable the firewall feature, and click Save Settings to proceed.
SECURITY 4-29 Schedule Rule The first item listed in the Firewall section is Schedule Rule. You may filter Internet access for local clients based on rules. You may filter Internet access for local clients based on rules. Each access control rule may be activated at a scheduled time. First, define the schedule on the Schedule Rule page, then apply the rule on the Access Control page. To add a new rule, click Add Schedule Rule. Proceed to the following page.
CONFIGURING THE BAR RICADE 4-30 Edit Schedule Rule 1. Define the appropriate settings for a schedule rule (as shown on the following screen). 2. Upon completion, click OK to save your schedule rules, and then click Save Settings to make your settings to take effect.
SECURITY 4-31 Access Control Used in conjunction with the Schedule Rule screen, the Access Control screen allows users to define the outgoing traffic permitted or not-permitted. The default is to permit all outgoing traffic. The Barricade can also limit the access of hosts within the local area network (LAN). The MAC Filtering Table allows the Barricade to enter up to 32 MAC addresses that are not allowed access to the WAN port. 1. Click Add PC on the Access Control screen. 2. Define the appropriate settings for client PC services (as shown on the following screen). 3. Click OK and then click Apply to save your settings. The following items are displayed on the Access Control screen: Parameter Description Enable Filtering Function Enables or disables the filtering function. Normal Filtering Table (up to 10 computers)Displays the IP address (or an IP address range) filtering table.
CONFIGURING THE BAR RICADE 4-32 Access Control Add PC Define the access control list in this page. The settings in the screen shot below will block all email sending and receiving during weekdays (except Friday). See “Schedule Rule” on page 4-29. Define the appropriate settings for client PC services (as shown above). At the bottom of this screen, you can set the scheduling function. You can set this function to Always Blocking or to whatever schedule you have defined in the Schedule Rule screen. Click OK to save your settings. The added PC will now appear in the Access Control page. For the URL/keyword blocking function, you will need to configure the URL address or blocked keyword on the Parental Control page first. Click Parental Control to add to the list of disallowed URL’s and keywords. To enable scheduling, you also need to configure the schedule rule first. Click Schedule Rule in the left-hand menu to set the times for which you wish to enforce the rule.
SECURITY 4-33 MAC Filter Use this page to block access to your network using MAC addresses. The Barricade can also limit the access of hosts within the local area network (LAN). The MAC Filtering Table allows the Barricade to enter up to 32 MAC addresses that are allowed access to the WAN port. All other devices will be denied access. By default, this feature is disabled. Click Save Settings to proceed, or Cancel to change your settings.
CONFIGURING THE BAR RICADE 4-34 Parental Control The Barricade allows the user to block access to web sites from a particular PC by entering either a full URL address or just a keyword. This feature can be used to protect children from accessing violent or pornographic web sites. You can define up to 30 sites or keywords here. To configure the Parental Control feature, use the table to specify the web sites (www.somesite.com) and/or keywords you want to block on your network. To complete this configuration, you will need to create or modify an access rule in “Access Control Add PC” on page 4-32. To modify an existing r ule, click the Edit option next to the rule you want to modify. To create a new rule, click on the Add PC option. From the Access Control, Add PC section, check the option for WWW with Parental Control in the Client PC Service table to filter out the web sites and keywords selected below, on a specific PC. Click Save Settings to proceed, or Cancel to change your settings.