background image

76 

Port  

A logical channel endpoint in a network. A computer might have only one physical channel (its 
Ethernet channel) but can have multiple ports (logical channels) each identified by a number.   

PPP  

Point-to-Point Protocol is used for two computers to communicate with each over a serial 
interface, like a phone line   

PPPoE  

Point-to-Point Protocol over Ethernet is used to connect multiple computers to a remote server 
over Ethernet   

PPTP  

Point-to-Point Tunneling Protocol is used for creating VPN tunnels over the Internet between 
two networks   

Preamble  

Used to synchronize communication timing between devices on a network   

QoS  

Quality of Service   

R  

RADIUS  

Remote Authentication Dial-In User Service allows for remote users to dial into a central server 
and be authenticated in order to access resources on a network   

Reboot  

To restart a computer and reload it's operating software or firmware from nonvolatile storage.   

Rendezvous  

Apple's version of UPnP, which allows for devices on a network to discover each other and be 
connected without the need to configure any settings   

Repeater  

Retransmits the signal of an Access Point in order to extend it's coverage   

RIP  

Routing Information Protocol is used to synchronize the routing table of all the routers on a 
network  

RJ-11  

The most commonly used connection method for telephones   

Summary of Contents for TEW-611BRP

Page 1: ...1...

Page 2: ...ncrease the separation between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced...

Page 3: ...Contents 4 Minimum System Requirements 4 Wireless LAN Networking 6 Introduction 7 Features 7 Hardware Overview 8 Rear Panel 8 LEDs 9 Installation Considerations 10 Getting Started 10 Using the Configu...

Page 4: ...ing conventions are used in this manual THE NOTE SYMBOL INDICATES ADDITIONAL INFORMATION ON THE TOPIC AT HAND THE TIP SYMBOL INDICATES HELPFULL INFORMATION AND TIPS TO IMPROVE YOUR NETWORK EXPERIENCE...

Page 5: ...supply with a different voltage than the one included with your product will cause damage and void the warranty for this product Minimum System Requirements z Ethernet Based Cable or DSL Modem z Compu...

Page 6: ...reless LAN networking technology Consult the Glossary for definitions of the terminology used in this section THE INFORMATION IN THIS SECTION IS FOR YOUR REFERENCE CHANGING NETWORK SETTINGS AND PARTIC...

Page 7: ...Modems with Dynamic IP Static IP PPPoE PPTP L2TP or BigPong Connection Types Supports Super G Technology with Data Rate up to 108Mbps 8X Faster Enhance Wireless Coverage up to 800 More Coverage with M...

Page 8: ...W 611BRP package Auto MDIX LAN Ports These ports automatically sense the cable type when connecting to Ethernet enabled computers Auto MDIX WAN Port This is the connection for the Ethernet cable to th...

Page 9: ...a connection to an Ethernet enabled computer on ports 1 4 This LED blinks during data transmission WAN LED A solid light indicates connection on the WAN port This LED blinks during data transmission...

Page 10: ...gree angle appears to be almost 3 feet 1 meter thick At a 2 degree angle it looks over 42 feet 14 meters thick Position devices so that the signal will travel straight through a wall or ceiling instea...

Page 11: ...in the IP Address of the TEW 611BRP The TEW 611BRP s default IP Address is http 192 168 0 1 Open the Web browser Type in the IP Address of the Router http 192 168 0 1 If you have changed the default...

Page 12: ...configuration options Wizard WAN LAN DHCP and Wireless Basic_Wizard Internet Connection Setup Wizard This wizard guides you through the following basic router setup steps Set your Password Select your...

Page 13: ...N The WAN Wide Area Network section is where you configure your Internet Connection type There are several connection types to choose from Static IP DHCP PPPoE PPTP L2TP and BigPond If you are unsure...

Page 14: ...o enter a Username and Password provided by your Internet Service Provider to gain access to the Internet Service Name Some ISP s may require that you enter a Service Name Only enter a Service Name if...

Page 15: ...interval the machine can be idle before the L2TP connection is disconnected The Maximum Idle Time value is only used for the On demand connection mode Advanced These options apply to all WAN modes Use...

Page 16: ...eir service The ISP will then only grant Internet access to requests from a computer or router with this particular MAC address Your new Wireless router has a different MAC address than the computer o...

Page 17: ...ce It is recommended that you use the default settings if you do not have an existing network IP Address The IP address of your router on the local area network Your local area network settings are ba...

Page 18: ...properly configured and this option is enabled the DHCP Server will manage the IP addresses and other network configuration information for computers and other devices connected to your Local Area Ne...

Page 19: ...to 99 and 200 to 254 are NOT managed by the DHCP Server Computers or devices that use addresses from these ranges are to be manually configured Suppose you have a web server computer that has a manual...

Page 20: ...11 22 33 or 00 0D 88 11 22 33 If your network device is a computer and the network card is already located inside the computer you can connect to the Wireless router from the computer and click the C...

Page 21: ...security features This device supports three wireless security modes including WEP WPA Personal and WPA Enterprise WEP is the original wireless encryption standard WPA provides a higher level of secur...

Page 22: ...channels in your area may have interference from other electronic devices Choose the clearest channel to help optimize the performance and coverage of your wireless network Transmission Rate By defau...

Page 23: ...128 bit encryption WPA Personal and WPA Enterprise Both of these options select some variant of Wi Fi Protected Access WPA security standards published by the Wi Fi Alliance The WPA Mode further refi...

Page 24: ...authentication server RADIUS Server Port The port number used to connect to the authentication server RADIUS Server Shared Secret A pass phrase that must match with the authentication server MAC Addre...

Page 25: ...ices on your LAN This feature is useful for hosting online services such as FTP Web or game servers For each Virtual Server you define a public port on your router for redirection to an internal LAN I...

Page 26: ...the Select Virtual Server list Selecting one of these entries fills some of the remaining parameters with standard values for that type of server IP Address The IP address of the system on your inter...

Page 27: ...ess of the gateway or its dynamic DNS name from a machine on the LAN Your requests may not be looped back or you may be redirected to the Forbidden page This will happen if you have an Access Control...

Page 28: ...nger Supports use of Microsoft Windows Messenger the Internet messaging client that ships with Microsoft Windows on LAN computers The SIP ALG must also be enabled when the Windows Messenger ALG is ena...

Page 29: ...oftware application running on any computer on your network to connect to a web based server or another user on the Internet Name Enter a name for the Special Application Rule for example Game App whi...

Page 30: ...e currently defined special applications rules A special applications rule can be changed by clicking the Edit icon or deleted by clicking the Delete icon When you click the Edit icon the item is high...

Page 31: ...ter the UDP ports to open 6159 6180 99 Inbound Filter Select a filter that controls access as needed for this game rule If you do not see the filter you need in the list of filters go to the Advanced...

Page 32: ...32 Advanced_Traffic Shaping The Traffic Shaping feature helps improve your network gaming performance by prioritizing applications By default the Traffic Shaping settings are disabled...

Page 33: ...s you to set the uplink speed manually Uplink speed is the speed at which data can be transferred from the router to your ISP This is determined by your ISP ISPs often specify speed as a downlink upli...

Page 34: ...ge set here Source Port Range The rule applies to a flow of messages whose LAN side port number is within the range set here Destination IP Range The rule applies to a flow of messages whose WAN side...

Page 35: ...or WAN Interface Specifies the interface LAN or WAN that the IP packet must use to transit out of the router when this route is used Metric The relative cost of using this route Save Saves the new or...

Page 36: ...r to peer utilities or games Enable By default the Access Control feature is disabled If you need Access Control check this option and you will see the following configuration sections Note Once you e...

Page 37: ...e using click the Copy Your PC s MAC Address button Others If you want to restrict access for all devices that do not have an explicit rule configured for them then select Others for the Address Type...

Page 38: ...e List is used for systems that have the Web filter option enabled in Access Control Enable Entries in the Allowed Web Site List can be activated or deactivated with this checkbox New entries are acti...

Page 39: ...king the Delete icon When you click the Edit icon the item is highlighted and the Edit Web Site section is activated for editing Advanced_MAC Address Filter The MAC address filter section can be used...

Page 40: ...pplied to wired network clients Add Edit MAC Address In this section you can add entries to the MAC Address List below or edit existing entries Enable MAC address entries can be activated or deactivat...

Page 41: ...pplication has trouble working from behind the router you can expose one computer to the Internet and run the application on that computer Note Putting a computer in the DMZ may expose that computer t...

Page 42: ...functions for example a Game Clan filter might allow all of the members of a particular gaming group to play several different games for which gaming entries have been created At the same time an Admi...

Page 43: ...ake the changes effective and permanent Inbound Filter Rules List The section lists the current Inbound Filter Rules An Inbound Filter Rule can be changed by clicking the Edit icon or deleted by click...

Page 44: ...lization hopping patterns new values for current MIB attributes and other requirements to extend the operation of 802 11 WLANs to new regulatory domains countries The current 802 11 standard defines o...

Page 45: ...t existing entries Name Give the schedule a name that is meaningful to you such as Weekday rule Day s Place a checkmark in the boxes for the desired days or select the All Week radio button to select...

Page 46: ...e in the following list When finished updating the Schedule Rules you must still click the button at the top of the page to make the changes effective and permanent Schedule Rules List The section sho...

Page 47: ...n Time Syslog Email System Firmware and Dynamic DNS Tools_Admin The Admin option is used to set a password for access to the Web based management By default there is no password configured It is highl...

Page 48: ...eout The amount of time before the administration session either remote or local is closed when there is no activity Save Configuration This option allows you to save the router s configuration to a f...

Page 49: ...soft s current implementation of WCN you cannot save the wireless settings if a profile of the same name already exists To work around this limitation either delete the existing profile or change the...

Page 50: ...et If you are using schedules or logs this is the best way to ensure that the schedules and logs are kept accurate NTP Server Select a Network Time Server for synchronization You can type in the addre...

Page 51: ...Enable Logging to Syslog Server Enable this option if you have a syslog server currently running on the LAN and wish to send log messages to it Enabling this option causes the following parameter to...

Page 52: ...this option is enabled router activity logs or firmware upgrade notifications can be emailed to a designated email address and the following parameters are displayed Email Settings From Email Address...

Page 53: ...il Log When Full or on Schedule On Log Full Select this option if you want logs to be sent by email when the log is full Schedule Select this option if you want logs to be sent by email according to a...

Page 54: ...ed from the factory Any settings that have not been saved will be lost If you want to save your router configuration settings you can do so from the Tools Admin page Tools_Firmware The Firmware Upgrad...

Page 55: ...device To perform an upgrade ensure that you are using a PC that is connected to the router by wire Note Some firmware upgrades reset the router s configuration options to the factory defaults Before...

Page 56: ...nter your domain name to connect to your server no matter what your IP address is Enable Dynamic DNS Enable this option only if you have purchased your own domain name and registered with a dynamic DN...

Page 57: ...es to the Dynamic DNS if your dynamic IP address has not changed The timeout period is entered in hours Note After configuring the router for dynamic DNS you can open a browser and navigate to the URL...

Page 58: ...and network connection details are displayed on the Device Info page The firmware version is also displayed here Some browsers have limitations that make it impossible to update the WAN status displa...

Page 59: ...or the DHCP Release to break the WAN connection BigPond Connection Depending on whether you are currently logged in to BigPond you can click either the DHCP Renew to attempt to establish the WAN conne...

Page 60: ...es or neighboring wireless networks and by obstacles between the router and the wireless device Status_Routing The routing section displays all of the routing details configured for your router A valu...

Page 61: ...you to view the router logs You can define what types of events you want to view and the level of events to view This router also has external Syslog Server support so you can send the log files to a...

Page 62: ...ou accessed the log Clear Clicking this button erases all log entries Email Now If you provided email information with the Tools Email screen clicking the Email Now button sends the router log to the...

Page 63: ...f packets that were dropped due to Ethernet collisions two or more devices attempting to use an Ethernet circuit at the same time Errors The number of transmission failures that cause loss of a packet...

Page 64: ...e given to outbound packets of this conversation by the Traffic Shaping logic Smaller numbers represent higher priority State When SPI Stateful Packet Inspection is enabled this is the state for sessi...

Page 65: ...be made in both directions ADSL Asymmetric Digital Subscriber Line Advanced Encryption Standard AES Government encryption standard Alphanumeric Characters A Z and 0 9 Antenna Used to transmit and rece...

Page 66: ...is available on the network B Backward Compatible The ability for new devices to communicate and interact with older legacy devices to guarantee interoperability Bandwidth The maximum amount of bytes...

Page 67: ...ce It supports a 32 bit data path DMA and consumes less voltage CAT 5 Category 5 Used for 10 100 Mbps or 1Gbps Ethernet connections Client A program or user that requests data from a server Collision...

Page 68: ...text Default A predetermined value or setting that is used by a program when no user input has been entered for this value or setting Demilitarized zone DMZ A single computer or group of computers tha...

Page 69: ...missions at the sane time Dynamic DNS service Dynamic DNS is provided by companies to allow users with Dynamic IP addresses to obtain a Domain Name that will always by linked to their changing IP addr...

Page 70: ...outside of the local network Firmware Programming that is inserted into a hardware device that tells it how to function Fragmentation Breaking up data into smaller pieces to make it easier to store FT...

Page 71: ...t Transfer Protocol is used to transfer files from HTTP servers web servers to HTTP clients web browsers HTTPS HTTP over SSL is used to encrypt and decrypt HTTP transmissions Hub A networking device t...

Page 72: ...at the packet processing layer of network communication Internet Service Provider An ISP provides access to the Internet to individuals or companies Intranet A private network Intrusion Detection A ty...

Page 73: ...ng Diode Legacy Older devices or technology Local Area Network A group of computers in a building that usually access files from a server LPR LPD Line Printer Requestor Line Printer Daemon A TCP IP pr...

Page 74: ...that can be transmitted on a packet based network like the Internet Multicast Sending data from one device to many devices on a network N NAT Network Address Translation allows many private IP address...

Page 75: ...osed to sending the entire routing table at a regular interval which is how RIP functions P Password A sequence of characters that is used to authenticate requests to resources on a network Personal A...

Page 76: ...ronize communication timing between devices on a network Q QoS Quality of Service R RADIUS Remote Authentication Dial In User Service allows for remote users to dial into a central server and be authe...

Page 77: ...session between two computers Session layer The fifth layer of the OSI model which coordinates the connection and communication between applications on both ends Simple Mail Transfer Protocol Used for...

Page 78: ...terface for collecting in one place the logs from different sources Originally written for UNIX it is now available for other operating systems including Windows T TCP Transmission Control Protocol TC...

Page 79: ...the other UPnP Universal Plug and Play URL Uniform Resource Locator is a unique address for files accessible on the Internet USB Universal Serial Bus UTP Unshielded Twisted Pair V Virtual Private Net...

Page 80: ...le to that of a wired network Wi Fi Wireless Fidelity Wi Fi Protected Access An updated version of security for wireless networks that provides authentication as well as encryption Wide Area Network T...

Page 81: ...re than those specified in the manual Warranty service may be obtained by contacting TRENDware office within the applicable warranty period for a Return Material Authorization RMA number accompanied b...

Page 82: ...IAL LOSS ARISING OUT OF OR IN CONNECTION WITH THE SALE INSTALLATION MAINTENANCE USE PERFORMANCE FAILURE OR INTERRUPTION OF THE POSSIBILITY OF SUCH DAMAGES AND LIMITS ITS LIABILITY TO REPAIR REPLACEMEN...

Page 83: ......

Reviews: