background image

Table of Contents

 

Getting Started ............................................................................................ 5 

Package Contents .................................................................................... 5 
Minimum System Requirements .............................................................. 5 

Introduction ................................................................................................. 6 

Features ................................................................................................... 6 
Wireless Performance Considerations ..................................................... 7 

Overview ..................................................................................................... 8 

Network Diagram ..................................................................................... 8 
FronT panel (LEDs): ................................................................................. 8 
Rear panel: ............................................................................................... 8 

Using the Configuration Menu .................................................................... 9 
Network ..................................................................................................... 10 

WAN Setting ........................................................................................... 10 
LAN Setting ............................................................................................ 12 
QoS ........................................................................................................ 14 
DHCP Client List .................................................................................... 14 

Wireless .................................................................................................... 15 

Basic ...................................................................................................... 15 
Advanced ............................................................................................... 17 
MAC Filter .............................................................................................. 18 
Security .................................................................................................. 19 
WPS ....................................................................................................... 20 
Station List .............................................................................................. 21 

Advanced .................................................................................................. 21 

DMZ ....................................................................................................... 21 
Virtual Server ......................................................................................... 22 
Routing ................................................................................................... 23 
Access Control ....................................................................................... 24 
Special Applications ............................................................................... 25 
Gaming ................................................................................................... 26 
Inbound Filter ......................................................................................... 27 
Schedule ................................................................................................ 28 
Advance Network ................................................................................... 29 

Administrator ............................................................................................. 30 

Wizard .................................................................................................... 30 

Summary of Contents for TEV-639GR

Page 1: ...1 ...

Page 2: ...ject to the following two conditions 1 This device may not cause harmful interference and 2 this device must accept any interference received including interference that may cause undesired operation FCC Caution Any changes or modifications not expressly approved by the party responsible for compliance could void the user s authority to operate this equipment IMPORTANT NOTE FCC Radiation Exposure ...

Page 3: ...nT panel LEDs 8 Rear panel 8 Using the Configuration Menu 9 Network 10 WAN Setting 10 LAN Setting 12 QoS 14 DHCP Client List 14 Wireless 15 Basic 15 Advanced 17 MAC Filter 18 Security 19 WPS 20 Station List 21 Advanced 21 DMZ 21 Virtual Server 22 Routing 23 Access Control 24 Special Applications 25 Gaming 26 Inbound Filter 27 Schedule 28 Advance Network 29 Administrator 30 Wizard 30 ...

Page 4: ...4 Management 30 Upload Firmware 31 Setting Management 32 Time 32 Status 33 Help 34 Network Glossary 35 Specifications 38 Limited Warranty 39 ...

Page 5: ...de 1 x Network cable Power Adapter 12V 1A Using a power supply with a different voltage than the one included with your product will cause damage and void the warranty for this product If any item is found missing or damaged please contact your local reseller for replacement MINIMUM SYSTEM REQUIREMENTS Ethernet Based Cable or DSL Modem Computers with Windows Macintosh or Linux based operating syst...

Page 6: ...en away 1 x external Wi Fi Protected Setup WPS button One touch wireless security setup using the Wi Fi Protected Setup WPS button when connecting to a WPS adapter Wireless Distribution System WDS support Compatible with most popular cable DSL Internet service providers using Dynamic Static IP PPPoE PPTP and L2TP High speed wireless data rates up to 300Mbps using an IEEE 802 11n connection 3 exter...

Page 7: ... Although the phone may not be in use the base can still transmit wireless signal Move the phone s base station as far away as possible from your wireless devices If you are still experiencing low or no signal consider repositioning the wireless devices or installing additional access points The use of higher gain antennas may also provide the necessary coverage depending on the environment limit ...

Page 8: ...8 Overview NETWORK DIAGRAM FRONT PANEL LEDS PWR WAN LAN1 LAN2 LAN3 LAN4 Wireless WPS REAR PANEL DC IN RESET WAN LAN1 LAN2 LAN3 LAN4 ...

Page 9: ...and typing in the IP Address of the TEW 639GR The TEW 639GR s default IP Address is http 192 168 10 1 Open the Web browser Type in the IP Address of the Router http 192 168 10 1 If you have changed the default IP Address assigned to the TEW 639GR make sure to enter the correct IP Address Select admin in the User Name field Default password is admin Click OK ...

Page 10: ... the ISP s server Host Name Some ISP s may check your computer s Host Name The Host Name identifies your system to the ISP s server PPPoE Select this option if your ISP requires you to use a PPPoE Point to Point Protocol over Ethernet connection DSL providers typically use this option This method of connection requires you to enter a Username and Password provided by your Internet Service Provider...

Page 11: ...rameter if necessary The value may be the same as the Gateway IP Address Reconnect Mode Typically PPPoE connections are not always on The router allows you to set the reconnection mode The settings are Always on A connection to the Internet is always maintained On demand A connection to the Internet is made as needed Manual You have to open up the Web based management interface and click the Conne...

Page 12: ...ter that initially connected to the ISP connect to the router using that computer and click the Clone Your PC s MAC Address button The WAN interface will then use the MAC address of the network adapter in your computer LAN SETTING IP Address The IP address of the this device on the local area network Assign any unused IP address in the range of IP addresses available for the LAN Subnet Mask The su...

Page 13: ...ess any time it requests an IP address This is almost the same as when a device has a static IP address except that the device must still request an IP address from the router The router will provide the device the same IP address every time DHCP Reservations are helpful for server computers on the local network that are hosting applications such as Web and FTP Servers on your network should eithe...

Page 14: ...n of network traffic QoS can be targeted at a network interface toward a given server or router s performance or in terms of specific applications DHCP CLIENT LIST In this section you can see the connected LAN devices are currently receiving an IP addresses ...

Page 15: ...requency range and will allow both wireless b and wireless g client to connect and access the TEW 639GR at 11Mbps for wireless b at 54Mbps for wireless g and share access at the same time Although the wireless b g operates in the 2 4GHz frequency it will allow the use of other 2 4GHz client devices Wireless n g 54Mbps to connect and access at the same time 2 4GHz 802 11 n only This wireless mode w...

Page 16: ...m to handle communication between clients Some channels in your area may have interference from other electronic devices Choose the clearest channel to help optimize the performance and coverage of your wireless network Wireless Distribution System WDS When WDS is enabled this access point functions as a wireless repeater and is able to wirelessly communicate with other APs via WDS links A WDS lin...

Page 17: ...fault value of 2346 bytes Short Preamble Using a short 400ns guard interval can increase throughput However it can also increase error rate in some installations due to increased sensitivity to radio frequency reflections Select the option that works best for your installation IAPP Inter Access Point Protocol IEEE 802 11F or Inter Access Point Protocol is a recommendation that describes an optiona...

Page 18: ... MAC Filtering Disable When Disable is selected MAC addresses are not used to control network access Add MAC Filtering Rule Use this section to add MAC addresses to the list below MAC Address Enter the MAC address of a computer that you want to control with MAC filtering Computers that have obtained an IP address from the router s DHCP server will be in the DHCP Client List Select a device from th...

Page 19: ... refines the variant that the router should employ WPA Mode WPA is the older standard select this option if the clients that will be used with the router only support the older standard WPA2 is the newer implementation of the stronger IEEE 802 11i security standard With the WPA2 option the router tries WPA2 first but falls back to WPA if the client only supports WPA With the WPA2 Only option the r...

Page 20: ...port TKIP on multicast WPS Enable Enable the WPS feature Lock Wireless Security Settings Locking the wireless security settings prevents the settings from being changed by any new external registrar using its PIN Devices can still be added to the wireless network using WPS PIN Settings A PIN is a unique number that can be used to add the router to an existing network or to create a new network The...

Page 21: ...in place that will be used instead of sending packets to the DMZ host so an active session virtual server active port trigger or port forwarding rule will take priority over sending a packet to the DMZ host The DMZ policy resembles a default port forwarding rule that forwards every port that is not specifically sent anywhere else The router provides only limited firewall protection for the DMZ hos...

Page 22: ...ns truly require the use of the DMZ host Following are examples of when a DMZ host might be required A host needs to support several applications that might use overlapping ingress ports such that two port forwarding rules cannot be used because they would potentially be in conflict To handle incoming connections that use a protocol other than ICMP TCP UDP and IGMP also GRE and ESP when these prot...

Page 23: ...next hop and the IP address matched is directly connected to the router on the interface specified LAN or WAN Metric The route metric is a value from 1 to 16 that indicates the cost of using this route A value of 1 is the lowest cost and 15 is the highest cost A value of 16 indicates that the route is not reachable from this router When trying to reach a particular destination computers on your ne...

Page 24: ...s option Note When Access Control is disabled every device on the LAN has unrestricted access to the Internet However if you enable Access Control Internet access is restricted for those devices that have an Access Control Policy configured for them All other devices have unrestricted access to the Internet ALG ...

Page 25: ... SPECIAL APPLICATIONS Add Edit Port Trigger Rule Enable Specifies whether the entry will be active or inactive Name Enter a name for the Special Application Rule for example Game App which will help you identify the rule in the future Alternatively you can select from the Application list of common applications Protocol Select the protocol used by the service The common choices UDP TCP and both UD...

Page 26: ...uter from the list of DHCP clients in the Computer Name drop down menu or you can manually enter the IP address of the server computer TCP Ports to Open Enter the TCP ports to open for example 6159 6180 99 UDP Ports to Open Enter the UDP ports to open for example 6159 6180 99 Inbound Filter Select a filter that controls access as needed for this rule Schedule Select a schedule for the times when t...

Page 27: ...ies in the list of ranges Clear Re initialize this area of the screen discarding any changes you have made Inbound Filter Rules List The section lists the current Inbound Filter Rules An entry can be changed by clicking the Edit icon or can be deleted by clicking the Delete icon When you click the Edit icon the item is highlighted and the Edit Inbound Filter Rule section is activated for editing I...

Page 28: ...is entered in two fields The first box is for the hour and the second box is for the minute Email events are normally triggered only by the start time End Time The end time is entered in the same format as the start time The hour in the first box and the minutes in the second box The end time is used for most other rules but is not normally used for email events Clear Re initialize this area of th...

Page 29: ... provides compatibility among networking equipment software and peripherals UPnP enabled Router will only work with other UPnP devices software If user does not want to use the UPnP functionality select Disabled to disable it WAN Ping Respond Enable this option to allow WAN pint responses from your router ...

Page 30: ...30 Administrator WIZARD Follow Internet Connection Setup Wizard or Wireless Security Setup Wizard to get your Internet connection up and running MANAGEMENT ...

Page 31: ...Provider Select a dynamic DNS service provider from the pull down list Host Name Enter your host name fully qualified for example myhost mydomain net Account Enter the account provided by your service provider If the Dynamic DNS provider supplies only a key enter that key in all three fields Password Enter the password provided by your service provider If the Dynamic DNS provider supplies only a k...

Page 32: ...ttings that were in effect at the time the router was shipped from the factory Any settings that have not been saved will be lost If you want to save your router configuration settings use the Export Settings option above System Reboot This restarts the router It is useful for restarting when you are not near the device TIME Time Configuration Current Router Time Displays the time currently mainta...

Page 33: ...er is enabled you must still choose a time zone and set the daylight saving parameters NTP Server Used Select a Network Time Server for synchronization You can type in the address of a time server or select one from the list If you have trouble using one server select another Set the Date and Time Manually If you do not have the NTP Server option in effect you can either manually set the time for ...

Page 34: ...34 Help Help section provides web based explanations on each configurable field ...

Page 35: ...rking protocol that allows administrators to assign temporary IP addresses to network computers by leasing an IP address to a user for a limited amount of time instead of assigning permanent IP addresses DMZ Demilitarized Zone Removes the Router s firewall protection from one PC allowing it to be seen from the Internet DNS Domain Name Server The IP address of your ISP s server which translates the...

Page 36: ...cal area network to a different IP address for the Internet Packet A unit of data sent over a network Passphrase Used much like a password a passphrase simplifies the WEP encryption process by automatically generating the WEP encryption keys for Linksys products Ping Packet Internet Groper An Internet utility used to determine whether a particular IP address is online POP3 Post Office Protocol 3 A...

Page 37: ...col Internet Protocol A set of instructions PCs use to communicate over a network Telnet A user command and TCP IP protocol used for accessing remote PCs TFTP Trivial File Transfer Protocol A version of the TCP IP FTP protocol that has no directory or password capability Throughput The amount of data moved successfully from one node to another in a given time period TKIP Temporal Key Integrity Pro...

Page 38: ...e Servers DNS Static or WAN assigned DNS servers 4 verified services for DDNS Internet Access Control Time based Internet access port range service filtering Internet domain restriction 32 user defined schedules 24 MAC address filter entries LED Indicator Power LAN1 LAN4 WAN WLAN WPS Power Switch On Off power switch Power Adapter 12V DC 1A external power adapter Power Consumption 779mA Dimension L...

Page 39: ...rvice may be obtained by contacting TRENDnet within the applicable warranty period and providing a copy of the dated proof of the purchase Upon proper submission of required documentation a Return Material Authorization RMA number will be issued An RMA number is required in order to initiate warranty service support for all TRENDnet products Products that are sent to TRENDnet for RMA service must ...

Page 40: ...gnu org licenses gpl txt or http www gnu org licenses lgpl txt for specific terms of each license REPAIR OR MODIFY OR ANY OTHER CAUSE BEYOND THE RANGE OF THE INTENDED USE OR BY ACCIDENT FIRE LIGHTNING OR OTHER HAZARD LIMITATION OF LIABILITY TO THE FULL EXTENT ALLOWED BY LAW TRENDNET ALSO EXCLUDES FOR ITSELF AND ITS SUPPLIERS ANY LIABILITY WHETHER BASED IN CONTRACT OR TORT INCLUDING NEGLIGENCE FOR ...

Page 41: ...41 ...

Reviews: