Home > SMC Networks > Router > SMC Networks Router SMCWBR14-G2 User Manual

SMC Networks Router SMCWBR14-G2 User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual SMC Networks Router SMCWBR14-G2 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 10 SMC Networks manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							HOME NETWORK SETTINGS
    4-25
    Wi-Fi Channel 
    NumberThe radio channel used by the Barricade and its clients to 
    communicate with each other. This channel must be the 
    same on the Barricade and all of its wireless clients.
    The Barricade will automatically assign itself a radio 
    channel, or you may select one manually. (Default: 6)
    Extend Range Extends the range of the Barricade. (Default: Disable) Parameter Description 
    						
    							CONFIGURING THE BAR RICADE
    4-26
    WDS
    The Wireless Distribution System (WDS) provides a means to extend the 
    range of a Wireless Local Area Network (WLAN). WDS allows the 
    Barricade to establish a direct link to other wireless base stations and 
    allows clients to roam freely within the area covered by the WDS. To carry 
    out a site survey of available wireless base stations, click Scan.
    Parameter Description
    SSID The Service Set ID (SSID) is the name of your 
    wireless network. The SSID must be the same on 
    the Barricade and all of its wireless clients.
    Channel This device supports the following modes 11g only, 
    11b only, and 11b/g mixed mode.
    MAC  Address The media access control address (MAC address) is 
    a unique identifier attached to each wireless base 
    station.
    Security Displays the security mechanism in use.
    Enable WDS Enables the WDS feature. When enabled, up to 4 
    WDS links can be set by specifying their Wireless 
    MAC addresses in the MAC address table. Make 
    sure the same channel is in use on all devices. 
    (Default: Disable) 
    						
    							SECURITY
    4-27
    Security
    The first menu item in the Security section is Firewall. The Barricade 
    provides a stateful inspection firewall which is designed to protect against 
    Denial of Service (DoS) attacks when activated. Its purpose is to allow a 
    private local area network (LAN) to be securely connected to the Internet.
    The second menu item is Wireless. This section allows you to configure 
    wireless security settings according to your environment and the privacy 
    level required.
     
    To configure your firewall settings, click Firewall in the left-hand menu. 
    						
    							CONFIGURING THE BAR RICADE
    4-28
    Firewall
    The Barricade’s firewall inspects packets at the application layer, maintains 
    TCP and UDP session information including time-outs and the number of 
    active sessions, and provides the ability to detect and prevent certain types 
    of network attacks.
    Network attacks that deny access to a network device are called Denial-of-
    Service (DoS) attacks. DoS attacks are aimed at devices and networks with 
    a connection to the Internet. Their goal is not to steal information, but to 
    disable a device or network so users no longer have access to network 
    resources.
    The Barricade protects against the following DoS attacks: IP Spoofing, 
    Land Attack, Ping of Death, IP with zero length, Smurf Attack, UDP port 
    loopback, Snork Attack, TCP null scan, and TCP SYN flooding. (See 
    “Intrusion Detection” on page 4-35 for details.)
    The firewall does not significantly affect system performance, so we advise 
    leaving it enabled to protect your network.
    Enable the firewall feature, and click Save Settings to proceed. 
    						
    							SECURITY
    4-29
    Schedule Rule
    The first item listed in the Firewall section is Schedule Rule. You may filter 
    Internet access for local clients based on rules.
    You may filter Internet access for local clients based on rules.
    Each access control rule may be activated at a scheduled time. First, define 
    the schedule on the Schedule Rule page, then apply the rule on the Access 
    Control page.
    To add a new rule, click Add Schedule Rule. Proceed to the following 
    page. 
    						
    							CONFIGURING THE BAR RICADE
    4-30
    Edit Schedule Rule
    1. Define the appropriate settings for a schedule rule (as shown on the 
    following screen).
    2. Upon completion, click OK to save your schedule rules, and then click 
    Save Settings to make your settings to take effect. 
    						
    							SECURITY
    4-31
    Access Control
    Used in conjunction with the Schedule Rule screen, the Access Control 
    screen allows users to define the outgoing traffic permitted or 
    not-permitted. The default is to permit all outgoing traffic.
    The Barricade can also limit the access of hosts within the local area 
    network (LAN). The MAC Filtering Table allows the Barricade to enter up 
    to 32 MAC addresses that are not allowed access to the WAN port.
    1. Click Add PC on the Access Control screen.
    2. Define the appropriate settings for client PC services (as shown on the 
    following screen).
    3. Click OK and then click Apply to save your settings.
    The following items are displayed on the Access Control screen:
    Parameter Description
    Enable Filtering Function Enables or disables the filtering function.
    Normal Filtering Table 
    (up to 10 computers)Displays the IP address (or an IP address range) 
    filtering table. 
    						
    							CONFIGURING THE BAR RICADE
    4-32
    Access Control Add PC
    Define the access control list in this page. The settings in the screen shot 
    below will block all email sending and receiving during weekdays (except 
    Friday). See “Schedule Rule” on page 4-29.
     
    Define the appropriate settings for 
    client PC services (as shown above). 
    At the bottom of this screen, you can 
    set the scheduling function. You can set this function to Always Blocking 
    or to whatever schedule you have defined in the Schedule Rule screen. 
    Click OK to save your settings. The added PC will now appear in the 
    Access Control page.
    For the URL/keyword blocking function, you will need to configure the 
    URL address or blocked keyword on the Parental Control page first. Click 
    Parental Control to add to the list of disallowed URL’s and keywords.
    To enable scheduling, you also need to configure the schedule rule first. 
    Click Schedule Rule in the left-hand menu to set the times for which you 
    wish to enforce the rule. 
    						
    							SECURITY
    4-33
    MAC Filter
    Use this page to block access to your network using MAC addresses.
     
    The Barricade can also limit the access of hosts within the local area 
    network (LAN). The MAC Filtering Table allows the Barricade to enter up 
    to 32 MAC addresses that are allowed access to the WAN port. All other 
    devices will be denied access. By default, this feature is disabled.
    Click Save Settings to proceed, or Cancel to change your settings. 
    						
    							CONFIGURING THE BAR RICADE
    4-34
    Parental Control
    The Barricade allows the user to block access to web sites from a particular 
    PC by entering either a full URL address or just a keyword. This feature 
    can be used to protect children from accessing violent or pornographic 
    web sites.
    You can define up to 30 sites or keywords here. To configure the Parental 
    Control feature, use the table to specify the web sites (www.somesite.com) 
    and/or keywords you want to block on your network.
    To complete this configuration, you will need to create or modify an access 
    rule in “Access Control Add PC” on page 4-32. To modify an existing r ule, 
    click the Edit option next to the rule you want to modify. To create a new 
    rule, click on the Add PC option.
    From the Access Control, Add PC section, check the option for WWW 
    with Parental Control in the Client PC Service table to filter out the web 
    sites and keywords selected below, on a specific PC.
    Click Save Settings to proceed, or Cancel to change your settings. 
    						
    All SMC Networks manuals Comments (0)

    Related Manuals for SMC Networks Router SMCWBR14-G2 User Manual