background image

Summary of Contents for TEW-630APB - Wireless Access Point

Page 1: ...1 ...

Page 2: ... an outlet on a circuit different from that to which the receiver is connected z Consult the dealer or an experienced radio TV technician for help FCC Caution Any changes or modifications not expressly approved by the party responsible for compliance could void the user s authority to operate this equipment This device complies with Part 15 of the FCC Rules Operation is subject to the following tw...

Page 3: ...mission of the European Community Compliance with these directives implies conformity to the following European Norms z EN 60950 Product Safety z EN 300 328 Technical requirement for radio equipment z EN 301 489 1 17 General EMC requirements for radio equipment Trademark recognition All product names used in this manual are the properties of their respective owners and are acknowledged ...

Page 4: ...ontents 6 Minimum System Requirements 6 Wireless LAN Networking 7 Introduction 10 Features 10 Hardware Overview 11 Rear Panel 11 LEDs 12 Installation Considerations 13 Getting Started 13 Using the Configuration Menu 14 Basic 15 Advanced 24 Tool 28 Status 34 Glossary 38 ...

Page 5: ...nventions are used in this manual THE NOTE SYMBOL INDICATES ADDITIONAL INFORMATION ON THE TOPIC AT HAND THE TIP SYMBOL INDICATES HELPFULL INFORMATION AND TIPS TO IMPROVE YOUR NETWORK EXPERIENCE THE CAUTION SYMBOL ALERTS YOU TO SITUATIONS THAT MAY DEGRADE YOUR NETWORKING EXPERIENCE OR COMPROMISE YOUR SECURITY LIKE NOTES AND TIPS THE IMPORTANT SYMBOL INDICATES INFORMATION THAT CAN IMPROVE NETWORKING...

Page 6: ...is Auto MDIX z Power Adapter Using a power supply with a different voltage than the one included with your product will cause damage and void the warranty for this product Minimum System Requirements z Computers with Windows Macintosh or Linux based operating systems with an installed Ethernet adapter and CD ROM z Internet Explorer Version 6 0 or Netscape Navigator Version 7 0 and Above ...

Page 7: ...wever when the communication quality improves again the TEW 630APB gradually increases the transmission data rate again until it reaches the highest available transmission rate Types of Wireless Networks Wireless LAN networking works in either of the two modes ad hoc and infrastructure In infra structure mode wireless devices communicate to a wired LAN via access points Each access point and its w...

Page 8: ...ou have a Basic Service Set BSS In the ESS diagram below communication is done through the access points which relay data packets to other wireless stations or devices connected to the wired network Wireless stations can then access resources such as a printer on the wired network ...

Page 9: ...nment users are able to move from one access point to another without losing the connection In the diagram below when the user moves from BSS 1 to BSS 2 the TEW 630APB automatically switches to the channel used in BSS 2 ...

Page 10: ...Wireless LAN Networking 10 Roaming in an ESS network diagram ...

Page 11: ...11 ...

Page 12: ... network by gradually replacing the 802 11g devices with 802 11n draft devices Features Wi Fi Compliant with IEEE 802 11g and IEEE 802 11b Standards High Speed up to 300Mbps Data Rate using IEEE 802 11n draft connection Built in 3 External Antennas MIMO technology to support high speed performance and great coverage Supports Access Point Mode and WDS feature Supports 64 128 bit WEP Hex Encryption ...

Page 13: ...supply power to the TEW 630APB Please use the power adapter provided in the TEW 630APB package Auto MDIX LAN Port This port automatically senses the cable type when connecting an Ethernet device Reset Button Pressing the reset button restores the AP to its original factory default settings ...

Page 14: ... to the power supply LAN LED A solid light indicates a connection to an Ethernet devicer on the LAN port This LED blinks during data transmission WLAN LED A solid light indicates that the wireless segment is ready This LED blinks during wireless data transmission ...

Page 15: ...feet 14 meters thick Position the devices so that the signal will travel straight through a wall or ceiling instead of at an angle for better reception 3 Building Materials can impede the wireless signal a solid metal door or aluminum studs may have a negative effect on range Try to position wireless devices and computers with wireless adapters so that the signal passes through drywall or open doo...

Page 16: ...ng in the IP Address of the TEW 630APB The TEW 630APB s default IP Address is http 192 168 1 100 Open the Web browser Type in the IP Address of the AP http 192 168 1 100 If you have changed the default IP Address assigned to the TEW 630APB make sure to enter the correct IP Address Type admin in the User Name field Leave the Password blank Click Login In ...

Page 17: ...onfigure the wireless settings for your Access Point Note that changes made in this section will also need to be duplicated on wireless clients that you want connected to your wireless network To protect your privacy use the wireless security mode to configure the wireless security features This device supports three wireless security modes including WEP WPA Personal and WPA Enterprise WEP is the ...

Page 18: ...as the SSID For security purposes it is highly recommended to change from the pre configured network name Enable Auto Channel Scan If you select this option the Access Point automatically finds the channel with the least interference and uses that channel for wireless networking If you disable this option the Access Point uses the channel that you specify with the following Wireless Channel option...

Page 19: ...ork When Invisible mode is enabled you must enter the Wireless Network Name SSID on the client manually to connect to the network Security Mode Unless one of these encryption modes is selected wireless transmissions to and from your wireless network can be easily intercepted and interpreted by unauthorized users WEP A method of encrypting data for wireless communication intended to provide the sam...

Page 20: ... standard WPA2 is the newer implementation of the stronger IEEE 802 11i security standard With the WPA or WPA2 option the Access Point tries WPA2 first but falls back to WPA if the client only supports WPA The strongest cipher that the client supports will be used With the WPA2 Only option the Access Point associates only with clients that also support WPA2 security The AES cipher will be used acr...

Page 21: ...onnect to the authentication server RADIUS Server Shared Secret A pass phrase that must match with the authentication server MAC Address Authentication If this is selected the user must connect from the same computer whenever logging into the wireless network Advanced Optional Backup RADIUS Server This option enables configuration of an optional second RADIUS server A second RADIUS server can be u...

Page 22: ...t LAN IP From Choose DHCP Dynamic if your router supports DHCP and you want the router to assign an IP address to the AP In this case you do not need to fill in the following fields Choose Static IP Manual if your router does not support DHCP or if for any other reason you need to assign a fixed address to the AP In this case you must also configure the following fields Note that you cannot choose...

Page 23: ...isabled However if for any reason the router does not provide DHCP services enable this option The AP s DHCP Server will then manage the IP addresses and other network configuration information for wireless clients associated with the AP The computers and other devices connected to your LAN also need to have their TCP IP configuration set to DHCP or Obtain an IP address automatically When you set ...

Page 24: ... lease expires and the address is no longer needed than another client may use the address Always Broadcast If all the computers on the LAN successfully obtain their IP addresses from the Access Point s DHCP server as expected this option can remain disabled However if one of the computers on the LAN fails to obtain an IP address from the Access Point s DHCP server it may have an old DHCP client t...

Page 25: ...he physical address displayed for the adapter connecting to the Access Point is the MAC address Mac OS X Go to the Apple Menu select System Preferences select Network and select the Ethernet Adapter connecting to the Access Point Select the Ethernet button and the Ethernet ID will be listed This is the same as the MAC address DHCP Reservations List This shows clients that you have specified to hav...

Page 26: ...is most useful to prevent unauthorized wireless devices from connecting to your network A MAC address is a unique ID assigned by the manufacturer of the network adapter Enable MAC Address Filter When this is enabled computers are granted or denied network access depending on the mode of the filter Configuring this feature incorrectly can prevent your computers from accessing the network In such a ...

Page 27: ...MAC Address List below or edit existing entries Enable MAC address entries can be activated or deactivated with this checkbox MAC Address Enter the MAC address of the desired computer or connect to the Access Point from the desired computer and click the Copy Your PC s MAC Address button Save Save the new or edited MAC Address entry in the following list When finished updating the MAC Address List...

Page 28: ... wireless area Beacon Period Beacons are packets sent by a wireless Access Point to synchronize wireless devices Specify a Beacon Period value between 20 and 1000 The default value is set to 100 milliseconds RTS Threshold This setting should remain at its default value of 2346 If you encounter inconsistent data flow only minor modifications to the value are recommended Fragmentation Threshold This...

Page 29: ...able to wirelessly communicate with other APs via WDS links Note that WDS is incompatible with WPA both features cannot be used at the same time A WDS link is bidirectional so this AP must know the MAC Address creates the WDS link of the other AP and the other AP must have a WDS link back to this AP Make sure the APs are configured with the same channel number Short GI Using a short 400ns guard in...

Page 30: ...ere is no password configured It is highly recommended that you create a password to keep your new Access Point secure Admin Password Enter a password for the user admin who will have full access to the Web based management interface User Password Enter a password for the user user who will have read only access to the Web based management interface System Name The name of the Access Point can be ...

Page 31: ...time zone that you are in and set the Time Server Daylight saving can also be configured to automatically adjust the time when needed Time Configuration Current AP Time Displays the time currently maintained by the Access Point If this is not correct use the following options to configure the time correctly Time Zone Select your local time zone from pull down menu Enable Daylight Saving ...

Page 32: ... third Sunday of October at 2 00 AM Set the Date and Time Manually If you do not have the NTP Server option configured you can either manually set the time for your Access Point here or you can click the button to copy the time from the computer you are using Make sure that computer s time is set correctly Note If the Access Point loses power for any reason it cannot keep its clock settings and wi...

Page 33: ...n to a file on your computer Be sure to save the configuration before performing a firmware upgrade Load Settings From Local Hard Drive Use this option to restore previously saved Access Point configuration settings Restore To Factory Default Settings This option restores all configuration settings back to the settings that were in effect at the time the Access Point was shipped from the factory A...

Page 34: ... your computer 2 Once you have found the file to be used click the Upload button below to start the firmware upgrade process This can take a minute or more 3 Wait for the Access Point to reboot This can take another minute or more 4 Confirm updated firmware revision on status page Firmware Information Displays the version number of the firmware currently installed in your Access Point and the date...

Page 35: ...Access Point by wire Some firmware upgrades reset the configuration options to the factory defaults Before performing an upgrade be sure to save the current configuration from the Tools System screen Upload Once you have a firmware update on your computer use this option to browse for the file and then upload the information into the Access Point ...

Page 36: ...rovides the following configuration options Device Info Wireless and Statistics Status_Device Info All of your network connection details are displayed on the Device Info page The firmware version is also displayed here LAN Computers ...

Page 37: ...hat have an address outside of this range will not show If the DHCP Client i e a computer configured to Automatically obtain an address supplies a Host Name then that will also be shown Any computer or device that has a static IP address that lies within the detection range may show however its host name will not Status_Wireless The wireless section allows you to view the wireless clients that are...

Page 38: ...pectively Rate The actual transmission rate of the client in megabits per second Signal This is a relative measure of signal quality The value is expressed as a percentage of theoretical best quality Signal quality can be reduced by distance by interference from other radio frequency sources such as cordless telephones or neighboring wireless networks and by obstacles between the Access Point and ...

Page 39: ...t due to errors collisions or Access Point resource limitations RX Packets Dropped The number of packets that were dropped while being received due to errors collisions or Access Point resource limitations Collisions The number of packets that were dropped due to Ethernet collisions two or more devices attempting to use an Ethernet circuit at the same time Errors The number of transmission failure...

Page 40: ...racters A Z and 0 9 Antenna Used to transmit and receive RF signals ASCII American Standard Code for Information Interchange This system of characters is most commonly used for text files Attenuation The loss in strength of digital and analog signals The loss is greater when the signal is being transmitted over long distances Authentication To provide credentials like a Password in order to verify...

Page 41: ...ond BOOTP Bootstrap Protocol Allows for computers to be booted up and given an IP address with no user intervention Broadcast Transmitting data in all directions at once Browser A program that allows you to access resources on the web and provides them to you graphically C CAT 5 Category 5 Used for 10 100 Mbps or 1Gbps Ethernet connections Client A program or user that requests data from a server ...

Page 42: ...entered for this value or setting DHCP Dynamic Host Configuration Protocol Used to automatically assign IP addresses from a predefined pool of addresses to computers or devices that request them Digital certificate An electronic method of providing credentials to a server in order to have access to it or a network Direct Sequence Spread Spectrum DSSS Modulation technique used by 802 11b wireless d...

Page 43: ... can all access it File sharing Allowing data from computers on a network to be accessed by other computers on the network with different levels of access rights Firewall A device that protects resources of the Local Area Network from unauthorized users outside of the local network Firmware Programming that is inserted into a hardware device that tells it how to function Fragmentation Breaking up ...

Page 44: ...rs into a shorter string with a predefined length Hexadecimal Characters 0 9 and A F Hop The action of data packets being transmitted from one AP to another Host Computer on a network HTTP Hypertext Transfer Protocol is used to transfer files from HTTP servers web servers to HTTP clients web browsers HTTPS HTTP over SSL is used to encrypt and decrypt HTTP transmissions Hub A networking device that...

Page 45: ...he method of transferring data from one computer to another on the Internet Internet Protocol Security IPsec provides security at the packet processing layer of network communication Internet Service Provider An ISP provides access to the Internet to individuals or companies Intranet A private network Intrusion Detection A type of security that scans a network to detect attacks coming from inside ...

Page 46: ... to another on a network Also referred to as delay LED Light Emitting Diode Legacy Older devices or technology Local Area Network A group of computers in a building that usually access files from a server LPR LPD Line Printer Requestor Line Printer Daemon A TCP IP protocol for transmitting streams of printer data L2TP Layer 2 Tunneling Protocol M MAC address A unique hardware ID assigned to every ...

Page 47: ...secure data transmissions over PPTP connections MTU Maximum Transmission Unit is the largest packet that can be transmitted on a packet based network like the Internet Multicast Sending data from one device to many devices on a network N NAT Network Address Translation allows many private IP addresses to connect to the Internet or another network through one IP address NetBEUI NetBIOS Extended Use...

Page 48: ...anges to the routing table are sent to all the other APs in the network as opposed to sending the entire routing table at a regular interval which is how RIP functions P Password A sequence of characters that is used to authenticate requests to resources on a network Personal Area Network The interconnection of networking devices within a range of 10 meters Physical layer The first layer of the OS...

Page 49: ...synchronize communication timing between devices on a network Q QoS Quality of Service R RADIUS Remote Authentication Dial In User Service allows for remote users to dial into a central server and be authenticated in order to access resources on a network Reboot To restart a computer and reload it s operating software or firmware from nonvolatile storage Rendezvous Apple s version of UPnP which al...

Page 50: ...ion session between two computers Session layer The fifth layer of the OSI model which coordinates the connection and communication between applications on both ends Simple Mail Transfer Protocol Used for sending and receiving email Simple Network Management Protocol Governs the management and monitoring of network devices SIP Session Initiation Protocol A standard protocol for initiating a user s...

Page 51: ...g interface for collecting in one place the logs from different sources Originally written for UNIX it is now available for other operating systems including Windows T TCP Transmission Control Protocol TCP IP Transmission Control Protocol Internet Protocol TCP Raw A TCP IP protocol for transmitting streams of printer data TFTP Trivial File Transfer Protocol is a utility used for transferring files...

Page 52: ... to the other UPnP Universal Plug and Play URL Uniform Resource Locator is a unique address for files accessible on the Internet USB Universal Serial Bus UTP Unshielded Twisted Pair V Virtual Private Network VPN A secure tunnel over the Internet to connect remote offices or users to their company s network VLAN Virtual LAN Voice over IP Sending voice information over the Internet as opposed to the...

Page 53: ... Wi Fi Protected Access An updated version of security for wireless networks that provides authentication as well as encryption Wide Area Network The larger network that your LAN is connected to which may be the Internet itself or a regional or corporate network Wireless ISP A company that provides a broadband Internet connection over a wireless connection Wireless LAN Connecting to a Local Area N...

Page 54: ...l antenna used to concentrate wireless signals on a specific location Z 1 802 11 A family of specifications for wireless local area networks WLANs developed by a working group of the Institute of Electrical and Electronics Engineers IEEE ...

Page 55: ...RRANTED ABOVE THE CUSTOMER S SOLE REMEDY SHALL BE AT TRENDNET S OPTION REPAIR OR REPLACEMENT THE FOREGOING WARRANTIES AND REMEDIES ARE EXCLUSIVE AND ARE IN LIEU OF ALL OTHER WARRANTIES EXPRESSED OR IMPLIED EITHER IN FACT OR BY OPERATION OF LAW STATUTORY OR OTHERWISE INCLUDING WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE TRENDNET NEITHER ASSUMES NOR AUTHORIZES ANY OTHER PERSON...

Page 56: ...Page 56 ...

Reviews: