SMC7901WBRA1 User Manual i
Contents 1. Introduction .................................................................................................................................................................. 1 1.1 Package List........................................................................................................................................................ 1 1.2 Safety Cautions ..................................................................................................................................
.6.2 ADSL Settings........................................................................................................................................ 34 3.7 Advance............................................................................................................................................................ 35 3.7.1 DNS ....................................................................................................................................................... 35 3.7.1.
3.9.1 Ping........................................................................................................................................................ 53 3.9.2 ATM Loopback ...................................................................................................................................... 54 3.9.3 ADSL..................................................................................................................................................... 54 3.9.4 Diagnostic .........
1. Introduction The ADSL access device supports multiple line modes. It provides one 10/100Base-T Ethernet interface at the user end. Utilizing the high-speed ADSL connection, the device provide users with broadband connectivity to the Internet or the Intranet for high-end users as net bars, office users, etc. can provide a downlink speed up to 24 Mbit/s and uplink speed up to 1 Mbit/s. The device supports WLAN access, as WLAN AP or WLAN router, to internet. It is compliance with IEEE 802.11,802.
1.3 Description of LED and Interface Front panel Fig 1.
Items DSL Reset Ethernet Usage Line RJ-11 port Resets to factory defaults. To restore factory defaults, keep the device powered on and push a paper clip in to the hole. Press down the button over 5 seconds and then release. Ethernet RJ-45 port Power On/Off. PWR Power connector. DC 12 Voltage/1000mA,female pole is positive. 1.4 System Requirements Make sure first that you have prepared these following items to guarantee the Router can work normally.
4 Supports System status display 4 Supports PPP session PAP/CHAP 4 Supports IP filter function 4 Supports IP QoS function 4 Supports remote access control 4 Supports line connection status test 4 Supports remote management(Telnet; HTTP) 4 Supports configuration file backup and restoration function 4 Ethernet supported such as Crossover Detection & Auto-Correction and polarity correction 4 Supports UPnP 4
2. Hardware Installation 1、Refer to the figure below: Connect the DSL port of the device and the ROUTER port of the splitter with a telephone cable; connect the phone to the Phone port of the splitter through a cable; connect the incoming line to the Line port of the splitter.
Fig 2-2 Connection Diagram(Connecting a telephone set before the splitter) l It is recommended to follow the Connection 1 in an actual connection! l Note: When Connection 2 is used, the filter must be installed close to the telephone lines. (See Fig. 2-2. Do not use the splitter instead of the filter).
3. Introducing Web Configuration 3.1 How to access Router The following introductions are prepared for the first time users, it is a detail “How-To” user guide. 1、 Open IE browser,then enter http://192.168.1.1 in address bar. 2、 You are required to enter user name and password. See the Fig 3.2-1. l The super user name and password is admin/admin l The common user name and password is user/user Fig 3.1-1 3、 If you enter as super user, the below screen will be displayed when you enter successfully.
After you enter router as super user, you can check, config and modify all the options. You can use the system diagnostic function also. If you enter as common user, you can check the status of ROUTER, but can’t change the most of options. 3.2 Status Click Status in the menu to open the sub-menu which contains 7 items: System, LAN, WLAN, WAN, Port Mapping, Statistic and ARP Table. 3.2.1 System Click System in the sub-menu to open the screen of Fig 3.2.1.
Fig 3.2.2 3.2.3 WLAN Click LAN in the sub-menu to open the screen of Fig 3.2.3. In this page, you can view the parameters of the WLAN. Fig 3.2.
3.2.4 WAN Click WAN in the sub-menu to open the screen of Fig 3.2.4. In this page, you can view basic status of WAN, Default Gateway, DNS Server, etc. If you want to config the WAN network, refer to chapter 3.6.1 “WAN Interface”. Fig 3.2.4 3.2.5 Port Mapping Click Port Mapping in the sub-menu to open the screen of Fig 3.2.5. In this page, you can view the mapping relation and the status of port mapping. Fig 3.2.
3.2.6 Statistic Click Statistic in the sub-menu to open the menu in the left bar, whick contains two items:Traffic Statistic and DSL Statistic. 3.2.6.1 Traffic Statistic Click Traffic Statistic in the left bar to open the screen of Fig 3.2.6.1. In this page, you can view the statistics of each network port. Fig 3.2.6.1 3.2.6.2 DSL Statistic Click DSL Statistic in the left bar to open the screen of Fig 3.2.6.2. In this page, you can view the ADSL line statistics, downstream rate, upstream rate, etc.
Fig 3.2.6.2 3.2.7 ARP Table Click ARP Table in the sub-menu to open the screen of Fig 3.2.7. In this page, you can view the talbe which shows a list of learned MAC addresses. Fig 3.2.7 3.3 Wizard Click Wizard in the menu to open the sub-menu which contains one item: Wizard.
3.3.1 Wizard Wizard enables speedy and accurate configuration of your Internet connection and other important parameters. The following sections describe these various configuration parameters. Whether you configure these parameters or use the default ones, click 'Next' to enable your Internet connection. When subscribing to a broadband service, you should be aware of the method by which you are connected to the Internet. Your physical WAN device can be either Ethernet, DSL, or both.
Fig 3.3.1-2 The following table describes the fields in this screen. Label Description WAN Connection Type Select the WAN Connection Type here, you can select PPPoA, PPPoE, 1483 MER, 1483 Routed or 1483 Bridged. Select the method of encapsulation used by your ISP from the drop-down list box. Choises are LLC/SNAP or VC-Mux.
automatically Use the following IP address WAN IP Address Enable NAT < Back Next > time. A static IP is a fixed IP that your ISP gives you. Input the IP address of the WAN interface provided by your ISP Select it to enable the NAT functions of the MODEM. If you are not to enable NAT and intend the user of the MODEM to access the Internet normally, you must add a route on the uplink equipment; otherwise the access to the Internet will fail. Normally, it is required to enable NAT.
Fig 3.3.1-5 The following table describes the fields of this screen. Label Description LAN IP Enter the IP address of your ROUTER in dotted decimal notation, for example, 192.168.1.1(factory default) Type the subnet mask of LAN IP. Select this check box to enable the secondary LAN IP Enter the secondary IP address of your ROUTER in dotted decimal notation, for example, 192.168.100.
Fig 3.3.1-7 If you select 1483 MER in Fig 3.3.1-2, the screen appears as shown next. Fig 3.3.1-8 The following table describes the fields of this screen.
Label Description Obtain an IP address automatically The MODEM will obtain a (WAN) IP address automatically and at this time it will enable DHCP Client functions. The WAN IP address is obtained from the uplink equipment like BAS and the uplink equipment is required to enable the DHCP Server functions. If you want to input the WAN ip address by yourself. Check this entry and then input related data in the field.
The following table describes the fields of this screen. Label None Obtain an IP address automatically Use the following IP address WAN IP Address WAN Subnet Mask Obtain DNS server addresses automatically Use the following DNS server addresses Primary DNS server Secondary DNS server Enable NAT < Back Next > Description The dynamic IP is not fixed; your ISP assigns you the different one each time. A static IP is a fixed IP that your ISP gives you.
Fig 3.4.1 The following table describes the fields of this screen. Label Description IP Address Subnet Mask Input the IP of Local area network interface here. We recommend that you use an address from a block that is reserved for private use. This address block is 192.168.1.1- 192.168.255.254 Select this checkbox to enable the secondary LAN IP. The two LAN IP must be in the different network. Click this button to save the settings of this page. Secondary IP Apply Changes 3.4.
Fig 3.4.2-1 If you set to DHCP Proxy, the screen of Fig 3.4.2-2 appears. Fig 3.4.2-2 The following table describes the fields of this screen. Label Description DHCP Proxy If set to DHCP Proxy, your ROUTER acts a surrogate DHCP Server and relays the DHCP requests and reponses between the remote server and the client. Enter the IP address of the actual, remote DHCP server in this field. Click this button to save the changes of this page.
Fig 3.4.2-3 The following table describes the fields in this screen. Label Description DHCP Server If set to DHCP Server, your ROUTER can assign IP addresses, an IP default gateway and DNS Servers to Windows95, Windows NT and other systems that support the DHCP client. This field specifies the first and the last of contiguous IP address of the IP address pool. Click this button, the screen of Fig 3.5.2-4 appears, which shows the assigned IP address of the clients.
Fig 3.4.2-4 The following table describes the fields in this screen. Label Description IP Address MAC Address This field displays the IP address relative to the MAC address. This field displays the MAC(Media Access Control) address of the computer. Every Ethernet device has a unique MAC address. The MAC address is assigned at the factory and consists of six pairs of hexadecimal character, for example, 00-A0-C5-00-02-12. Here shows the lease time.
The following table describes the fields of this screen. Label Description Host MAC Address Assigned IP Address Assign IP Type the MAC address of a computer on your LAN This field specifics the IP of the IP address pool. Click this button after entered Host MAC Address and Assigned IP Address, a row will be added in MAC-Base Assignment Table. Select a row in MAC-Base Assignment Table, the MAC address and IP address will appears Host MAC Address and Assigned IP Address.
Fig 3.5.1-1 The following table describes the fields of this screen. Label Description Disable Wireless LAN Interface (Root)SSID The wireless LAN is turned on by default. Select the check box to disable the wireless LAN. The SSID(Service Set Identification) is a unique name to identify the ROUTER in the wireless LAN. Wireless stations associating to ROUTER must have the same SSID. Enter a desciptive name. You can enable 4 SSID at most. Click Set VSSID, the screen of Fig3.6.1-2 appears.
Fig 3.5.1-2 The following table describes the fields of this screen. Label Description SSID The SSID(Service Set Identification) is a unique name to identify the ROUTER in the wireless LAN Click this button to save the changes of this page. Click this button to begin configuring this screen afresh. Apply Changes Undo 3.5.2 Security Click Security in the sub-menu to open the screen of Fig 3.5.2-1.
Fig 3.5.2-1 The following table describes the fields of this screen. Label Description SSID Type Encryption Select the SSID here. Choices are None, WEP, WPA(TKIP), WPA2(AES) and WPA2 Mixed. WEP(Wired Equivalent Privacy) entrypts data frames before transmitting over the wireless network. WPA(Wi-Fi Protected Access) is a subset of the IEEE802.11i security specification draft. Key differences between WPA and WEP are user authentication and improved data encryption.
Fig 3.5.2-2 The following table describes the fields of this screen. Label Description SSID Type Key Length Key Format Select the SSID here. Select 64-bit or 128-bit to use data encryption. If you chose 64-bit, you can choose ASCII(5 characters) or Hex(10 characters). If you chose 128-bit, you can choose ASCII(13 characters) or Hex(26 characters). Select the default Encryption Key here. The Encryption keys are used to encrypt data.
Fig 3.5.3 The following table describes the fields of this screen. Label Description Fragment Threshold This is the maximum data fragment size(between 256 and 2346bytes) that can be sent in the wireless network before the ROUTER will fragment the packet into smaller data frames. RTS(Request To Send) is designed to prevent collisions due to hidden node. A RTS defines the biggest size data frame you can send before a RTS(Request To Send) handshake invoked. The RTS Threshold value is between 0 and 2347.
Fig 3.5.4 The following table describes the fields of this screen. Label Description Select Access Control Mode Choises are Disable, Allow Listed and Deny Listed. Select Allow Listed to block access to the router, MAC addresses not listed will be allowed to access your router. Select Deny Listed to permit access to the router, MAC addresses not listed will be denied to access your router. Click this button to save the change of Select Access Control Mode.
Notice: You must select the “AP+WDS” option in chapter 3.6.1 before you configure this page. Fig 3.5.5 The following table describes the fields of this screen. Label Description Enable WDS Select this check box to enable the WDS function, or you can’t configure this page. Enter the MAC address(in XX-XX-XX-XX-XX-XX format) of the AP. Enter the comment to describe the AP of the MAC Addr. Click this button to add the MAC Addr with the Comment to Current WDS AP List.
Fig 3.6.1-1 Label Description Current ATM VC Table This table shows the PVCs already existed. It shows the Interface name, Channel Mode, VPI/VCI, Encapsulation mode, local IP Address, Remote IP address, etc. The maximum item of this table is eight.
Local IP Address Remote IP Address Subnet Mask Unnumbered Default Route Add Modify Delete Undo ATM Setting enter the Local IP Address, Remote IP Address and Subnet Mask. If set Use DHCP, your MODEM will be a DHCP client, the WAN IP will be assigned by the remote DHCP server. This is the IP of WAN interface which is provided by your ISP. This is the gateway IP which is provided by your ISP. This is the Subnet Mask of the Local IP Address. Select this checkbox to enable IP Unnumbered function.
ATM Setting :Click ATM Setting button in Fig3.6.1-1, the screen of Fig 3.6.1-3 will appear. In this page, you can configure the parameters of the ATM for your ADSL router, include QoS type, PCR, CDVT, SCR and MBS. Fig 3.6.1-3 3.6.2 ADSL Settings Click ADSL Interface in the sub-menu to open the screen of Fig 3.6.2. In this page, you can select the DSL modulation. Mostly, the user just need to remain this factory default setting. Our modem support these modulations: G.Dmt, G.lite, T1.
3.7 Advance Click Advance in the menu to open the sub-menu which contains 8 items: DNS, Firewall, Virtual Server, Routing, IP QOS, Anti-dos, Port Mapping and Others. 3.7.1 DNS Click DNS in the sub-menu to open the menu in the left bar, whick contains two items:DNS Server and DDNS. 3.7.1.1 DNS Server Short for Domain Name System (or Service or Server), an Internet service that translates domain names into IP addresses. Because domain names are alphabetic, they're easier to remember.
3.7.1.2 DDNS Click DDNS in the left bar to open the screen of Fig 3.7.1.2. Fig 3.7.1.2 3.7.2 Firewall Click Firewall in the sub-menu to open the menu in the left bar, whick contains three items:IP\Port Fileter, MAC Filter and URL Blocking. 3.7.2.1 IP\Port Filter Click IP\Port Filter in the left bar to open the screen of Fig 3.7.2.1. Entries in this table are used to restrict certain types of data packets through the Gateway.
Fig 3.7.2.1 3.7.2.2 MAC Filter Click MAC Filter in the left bar to open the screen of Fig 3.7.2.2. Entries in this table are used to restrict certain types of data packets from your local network to Internet through the Gateway. Use of such filters can be helpful in securing or restricting your local network. Click the button Apply Changes to save the settings of this page. Click the button Add Rule to add a new rule of the MAC Filter. Fig 3.7.2.
3.7.2.3 URL Blocking Click URL Blocking in the left bar to open the screen of Fig 3.7.2.3. This page is used to configure the Blocked FQDN(Such as tw.yahoo.com) and filtered keyword. Here you can add/delete FQDN and filtered keyword. Fig 3.7.2.3 3.7.3 Virtual Server Click Virtual Server in the sub-menu to open the menu in the left bar,whick contains two items:Services and DMZ Settings. 3.7.3.1 Services Click Services in the left bar to open the screen of Fig 3.7.3.1.
Fig 3.7.3.1 3.7.3.2 DMZ Settings Click DMZ Settings in the left bar to open the screen of Fig 3.7.3.2. A Demilitarized Zone is used to provide Internet services without sacrificing unauthorized access to its local private network. Typically, the DMZ host contains devices accessible to Internet traffic, such as Web (HTTP ) servers, FTP servers, SMTP (e-mail) servers and DNS servers. Select the checkbox Enable DMZ to enable this function. Then input a IP Address of the DMZ host.
3.7.4.1 RIP Click RIP in the left bar to open the screen of Fig 3.7.4.1. Enable the RIP if you are using this device as a RIP-enabled router to communicate with others using the Routing Information Protocol. This page is used to select the interfaces on your deviceis that use RIP, and the version of the protocol used. Fig 3.7.4.1 3.7.4.2 Static Route Click Static Route in the left bar to open the screen of Fig 3.7.4.2-1. This page is used to configure the routing information.
Click the button Show Routes, the below window will appear. The table shows a list of destination routes commonly accessed by your network. Fig 3.7.4.2-2 3.7.5 IP QoS Click Anti-dos in the sub-menu to open the screen of Fig 3.7.5. Entries in this table are used to assign the precedence for each incoming packet based on physical LAN port, TCP/UDP port number, and source/destination IP address/subnet masks. Fig 3.7.5 3.7.6 Anti-dos Click Anti-dos in the sub-menu to open the screen of Fig 3.7.6.
Fig 3.7.6 3.6.7 Port Mapping Click Port Mapping in the sub-menu to open the screen of Fig 3.6.7. In this page, you can bind the WAN interface and the LAN interface to the same group. To manipulate a mapping group: 1. Select a group from the table. 2. Select interfaces from the WAN and LAN interface list and add them to the grouped interface list using the arrow buttons to manipulate the required mapping of the ports. 3. Click "Apply Changes" button to save the changes.
Fig 3.6.7 3.7.8 Other Click Others in the sub-menu to open the menu in the left bar,whick contains four items:IGMP Proxy, UPNP, Bridge and IP PassThrough. 3.7.8.1 IGMP Proxy Click IGMP Proxy in the left bar to open the screen of Fig 3.7.8.1. IGMP proxy enables the system to issue IGMP host messages on behalf of hosts that the system discovered through standard IGMP interfaces. The system acts as a proxy for its hosts after you enable it. Click Apply Changes to save the settings of this page.
Fig 3.7.8.1 3.7.8.2 UPNP Click UPNP in the left bar to open the screen of Fig 3.7.8.2. This page is used to configure UPnP. The system acts as a daemon after you enable it. Click Apply Changes to save the settings of this page. Fig 3.7.8.2 3.7.8.3 Bridge Click Bridge in the left bar to open the screen of Fig 3.7.8.3-1. This page is used to configure the bridge parameters. Here you can change the settings or view some information on the bridge and its attached ports.
Fig 3.7.8.3-1 Click Show MACs button in Fig 3.7.8.3-1, the below window will appear. This table shows a list of learned MAC addresses for this bridge. Fig 3.7.8.3-2 3.7.7.4 IP PassThrough Click IP PassThrough in the left bar to open the screen of Fig 3.7.8.4. The IP PassThrough has the other name ZIPB or IP Extension. In this page, you can enable and configure IP PassThrough function.
Fig 3.7.8.4 3.8 Admin Click Admin in the menu to open the sub-menu which contains 11 items: Remote Access, Commit/Reboot, Password, Backup/Restore, Upgrade Fireware, Time Zone, System Log, SNMP, TR069, ACL and Logout. 3.8.1 Remote Access Click Remote Access in the sub-menu to open the screen of Fig 3.8.1. In this page, you can enable or disable the services which will be used by remote host.
Fig 3.8.2 Label Description Reset to default settings Commit current settings Reboot Select this checkbox to reset router to default settings. Select this checkbox to save the current settings and reboot router. Click this button to reboot the router according to the above option. 3.8.3 Password Click Login Password in the sub-menu to open the screen of Fig 3.8.3. In this page, you can change the password of the user, include admin and user.
Old Password New Password Confirmed Password Apply Changes Reset and user. After selected the user name, input the old password of the user here. Input the new password what you want to set of the user. Input the new password again. Click this button to save the settings of this page. Click this button to begin configuring the password afresh. 3.8.4 Backup/Restore Click Backup/Restore in the sub-menu to open the screen of Fig 3.8.4.
Fig 3.8.5 Label Description Select File Upload Click the Browse button to select the Fireware file. Selected the Fireware file, click Upload button to begin upgrading the Fireware. Click this button to begin selecting the Fireware file afresh. Reset 3.8.6 Time Zone Click Time Zone in the sub-menu to open the screen of Fig 3.8.6. In this page, you can set the system time manually or get the system time from the time server.
Fig 3.8.6 Label Description Refresh Time Mode Click this button to refresh the system shown in the page. If select Time Server, the router will get the system time from the time server. If select Manual, you should configure the system time manually. If select this checkbox, you can choose the correct SNTP Server which you want. Choose the SNTP Server here. Select the Time Zone of in which area you are. Click this button to save the settings of this page.
Fig 3.8.7 Label Description System Log Apply Changes Refresh You can enable or disable the System Log function. Click this button to save the settings of this page. Click this button to refresh the system log shown in the textfield. 3.8.8 SNMP Click SNMP in the sub-menu to open the screen of Fig 3.8.8. In this page, you can set the SNMP parameters. Fig 3.8.
Label Description Trap IP Address Input the Trap Host’s IP here. The trap information will be sent to this host. The network administrators must use this password to read the information of this router. The network administrators must use this password to configure the information of this router. Click this button to save the settings of this page. Click this button to begin configuring this screen afresh. Community name(read-only) Community name(write-only) Apply Changes Reset 3.8.
3.8.10 ACL Click ACL in the sub-menu to open the screen of Fig 3.8.10. In this page, you can configure the IP Address for Access Control List. If ACL enabled, only the effective IP in ACL can access ADSL Router. Step 1: If you want to enable ACL, please choose "Enable" then press "Apply Changes"; Step 2: Config Access Control List; Step 3: Press "take effect" to effect the configuration.
Fig 3.9.1 Label Description Host Address Go! Enter the IP Address here. Click this button to begin to Ping the Host Address. 3.9.2 ATM Loopback Click ATM Loopback in the sub-menu to open the screen of Fig 3.9.2. In this page, you can use VCC loopback function to check the connectivity of the VCC. Fig 3.9.2 Go!: Click this button to begin testing. 3.9.3 ADSL Click ADSL in the sub-menu to open the screen of Fig 3.9.3. This page is used for ADSL Tone Diagnostics.
Fig 3.9.3 Go!: Click this button to begin ADSL Tone Diagnostics. 3.9.4 Diagnostic Click Diagnostic in the sub-menu to open the screen of Fig 3.9.4. This page is used for testing your DSL connection. Fig 3.9.4 Run Diagnostic Test:Click this button to begin testing.
4. FCC Information FCC Information This equipment complies with CFR 47, Part 15.19 of the FCC rules. Operation of the equipment is subject to the following conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received; including interference that may cause undesired operation.