SMA Solar Technology AG Commissioning
User Manual SWebBox-BEN111033 27
6.6 Configuring Sunny WebBox for the Local Network
6.6.1 Information on Integrating the Sunny WebBox into a Local
Network
The next sections describe how to integrate the Sunny WebBox via static network settings into your
local network with a router.
In rare cases, further network settings are necessary. Examples of further network settings include
integrating the Sunny WebBox via DHCP into your network, or making the Sunny WebBox accessible
via the Internet. If this is the case, contact your network administrator and refer to section
10.3"Ethernet Network" (page62).
6.6.2 Configuring the Static Network Settings of the Sunny
WebBox
1. Select "WebBox > Settings > Network" in the Sunny WebBox user interface.
2. In the "Obtain IP address" field, select the value "Static".
3. In the "IP Address" field enter the static IP address, under which the Sunny WebBox is to be
reachable in the local network (see section 15.1"Allocating an IP Address in a Local Network"
(page85)).
4. Enter the subnet mask of your network in the "Subnet mask" field. Normally, you can find this
information in the router manual.
5. Enter the gateway IP address of your network in the "Gateway address" field. Usually, this is the
IP address of the router.
6. In the "DNS server Address" field, enter the IP address of the DNS server (Domain Name System
Server). Usually, this is the IP address of the router.
7. Select [Save] and [Confirm].
☑ The Sunny WebBox saves the network settings and will not longer be accessible from your
computer.
8. Remove the plug-in power supply of the Sunny WebBox from the plug socket.
9. Remove the blue network cable (crossover cable).
Sunny WebBox Assistant
It is recommended to use the Sunny WebBox Assistant for the commissioning of the Sunny
WebBox and for the integration into a network. You can download the Sunny WebBox
Assistant on the Internet from www.SMA.de/en.
Protecting the Ethernet network from external access
Protect your Ethernet network through suitable security measures such as a firewall or the
allocation of secure passwords.