Page 1: ......
Page 2: ...ies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device may not cause harmful interference and 2 this device must accept any interference received including interference that may cause undesired operation FCC Caution Any changes or modifications not expressly approved by the party responsible for compliance could void the user s authority to operate thi...
Page 3: ...ontents 4 Minimum System Requirements 4 Wireless LAN Networking 5 Introduction 9 Features 9 Hardware Overview 10 Rear Panel 10 LEDs 11 Installation Considerations 12 Getting Started 12 Using the Configuration Menu 13 Basic 14 Advanced 24 Tools 53 Status 68 Glossary 79 ...
Page 4: ...wing conventions are used in this manual THE NOTE SYMBOL INDICATES ADDITIONAL INFORMATION ON THE TOPIC AT HAND THE TIP SYMBOL INDICATES HELPFULL INFORMATION AND TIPS TO IMPROVE YOUR NETWORK EXPERIENCE THE CAUTION SYMBOL ALERTS YOU TO SITUATIONS THAT MAY DEGRADE YOUR NETWORKING EXPERIENCE OR COMPROMISE LIKE NOTES AND TIPS THE IMPORTANT SYMBOL INDICATES INFORMATION THAT CAN IMPROVE NETWORKING THIS I...
Page 5: ... different voltage than the one included with your product will cause damage and void the warranty for this product Minimum System Requirements z Ethernet Based Cable or DSL Modem z Computers with Windows Macintosh or Linux based operating systems with an installed Ethernet adapter and CD ROM Drive z Internet Explorer Version 6 0 or Netscape Navigator Version 7 0 and Above ...
Page 6: ...on data rate again until it reaches the highest available transmission rate Types of Wireless Networks Wireless LAN networking works in either of the two modes ad hoc and infrastructure In infra structure mode wireless devices communicate to a wired LAN via access points Each access point and its wireless devices are known as a Basic Service Set BSS An Extended Service Set ESS is two or more BSSs ...
Page 7: ...6 ...
Page 8: ...ou have a Basic Service Set BSS In the ESS diagram below communication is done through the access points which relay data packets to other wireless stations or devices connected to the wired network Wireless stations can then access resources such as a printer on the wired network ...
Page 9: ...to move from one access point to another without losing the connection In the diagram below when the user moves from BSS 1 to BSS 2 the WLAN client devices automatically switches to the channel used in BSS 2 Roaming in an ESS network diagram ...
Page 10: ...ds Support OFDM and CCK modulation High Speed up to 300Mbps Data Rate using IEEE 802 11n draft connection Supports Cable DSL Modems with Dynamic IP Static IP PPPoE PPTP L2TP or BigPond Connection Types Firewall features Network Address Translation NAT and Stateful Packet Inspection SPI protects against Dos attacks Traffic Control with Virtual Server max 64 configurable servers and DMZ UPnP Univers...
Page 11: ...31BRP package Reset Button Pressing the reset button restores the router to its original factory default settings WLAN Slide Switch To turn wireless function ON OFF Auto MDI MDIX WAN Port This is the connection for the Ethernet cable to the Cable or DSL modem Auto MDI MDIX LAN Ports These ports automatically sense the cable type when connecting to Ethernet enabled computers ...
Page 12: ...Solid lights indicate connections to Ethernet enabled computers on ports 1 4 LED blinks during data transmission WAN LED A solid light indicates connection on the WAN port This LED blinks during data transmission WLAN LED A solid light indicates that the wireless segment is ready This LED blinks during wireless data transmission ...
Page 13: ...degree angle appears to be almost 3 feet 1 meter thick At a 2 degree angle it looks over 42 feet 14 meters thick Position devices so that the signal will travel straight through a wall or ceiling instead of at an angle for better reception 3 Building Materials can impede the wireless signal a solid metal door or aluminum studs may have a negative effect on range Try to position wireless devices an...
Page 14: ...d typing in the IP Address of the TEW 631BRP The TEW 631BRP s default IP Address is http 192 168 1 1 Open the Web browser Type in the IP Address of the Router http 192 168 1 1 If you have changed the default IP Address assigned to the TEW 631BRP make sure to enter the correct IP Address Select admin in the User Name field Leave the Password blank Click Login In ...
Page 15: ...If you are new to networking and have never configured a router before click on Setup Wizard and the router will guide you through a few simple steps to get your network up and running Manual Configure If you consider yourself an advanced user and have configured a router before click Manual Configure to input all the settings manually ...
Page 16: ...s network To protect your privacy use the wireless security mode to configure the wireless security features This device supports three wireless security modes including WEP WPA Personal and WPA Enterprise WEP is the original wireless encryption standard WPA Enterprise provides a higher level of security WPA Personal does not require an authentication server The WPA Enterprise option does require ...
Page 17: ...mode you can improve performance slightly by choosing the appropriate Only mode If you have some devices that use a different transmission mode choose the appropriate Mixed mode Channel Width The Auto 20 40 MHz option is usually best The other options are available for special circumstances Note that when 20 40MHz option is selected an extended channel will be used to extend the data rate Transmis...
Page 18: ...of these options select some variant of Wi Fi Protected Access WPA security standards published by the Wi Fi Alliance The WPA Mode further refines the variant that the router should employ WPA Mode WPA is the older standard select this option if the clients that will be used with the router only support the older standard WPA2 is the newer implementation of the stronger IEEE 802 11i security stand...
Page 19: ...the authentication server RADIUS Server Shared Secret A pass phrase that must match with the authentication server MAC Address Authentication If this is selected the user must connect from the same computer whenever logging into the wireless network Advanced Optional Backup RADIUS Server This option enables configuration of an optional second RADIUS server A second RADIUS server can be used as bac...
Page 20: ...ernal network settings of your router The IP Address that is configured here is the IP Address that you use to access the Web based management interface If you change the IP Address here you may need to adjust your PC s network settings to access the network again ...
Page 21: ...me to the AP that domain name will override any name you enter here DNS Relay When DNS Relay is enabled the router plays the role of a DNS server DNS requests sent to the router are forwarded to the ISP s DNS server This provides a constant DNS address that LAN computers can use even when the router obtains a different DNS server address from the ISP upon re establishing the WAN connection You sho...
Page 22: ... Any addresses that are outside of this range are not managed by the DHCP Server these could therefore be used for manually configured devices or devices that cannot use DHCP to obtain network address details automatically It is possible for a computer or device that is manually configured to have an address that does reside within this range In this case the address should be reserved see Static ...
Page 23: ...th the specified MAC address any time it requests an IP address This is almost the same as when a device has a static IP address except that the device must still request an IP address from the router The router will provide the device the same IP address every time DHCP Reservations are helpful for server computers on the local network that are hosting applications such as Web and FTP Servers on ...
Page 24: ...you have specified to have reserved DHCP addresses An entry can be changed by clicking the Edit icon or deleted by clicking the Delete icon When you click the Edit icon the item is highlighted and the Edit DHCP Reservation section is activated for editing Number of Dynamic DHCP Clients In this section you can see what LAN devices are currently leasing IP addresses Revoke The Revoke option is avail...
Page 25: ...ual Server The Virtual Server option gives Internet users access to services on your LAN This feature is useful for hosting online services such as FTP Web or game servers For each Virtual Server you define a public port on your router for redirection to an internal LAN IP Address and LAN port Example You are hosting a Web Server on a PC that has LAN IP Address of 192 168 0 50 and your ISP is bloc...
Page 26: ...ress The IP address of the system on your internal network that will provide the virtual service for example 192 168 0 50 You can select a computer from the list of DHCP clients in the Computer Name drop down menu or you can manually enter the IP address of the server computer Protocol Select the protocol used by the service The common choices UDP TCP and both UDP and TCP can be selected from the ...
Page 27: ...hlighted and the Edit Virtual Server section is activated for editing You might have trouble accessing a virtual server using its public identity WAN side IP address of the gateway or its dynamic DNS name from a machine on the LAN Your requests may not be looped back or you may be redirected to the Forbidden page This will happen if you have an Access Control Rule configured for this LAN machine T...
Page 28: ...er to allow a software application running on any computer on your network to connect to a web based server or another user on the Internet Name Enter a name for the Special Application Rule for example Game App which will help you identify the rule in the future Alternatively you can select from the Application list of common applications Application Instead of entering a name for the Special App...
Page 29: ...range of ports from 6000 6200 for incoming traffic from the Internet whenever any computer on the internal network opens up an application that sends data to the Internet using a port in the range of 6500 6700 Add Edit Special Applications Rule This section is where you define and edit Special Applications Rules Save Saves the new or edited Special Applications Rule in the following list When fini...
Page 30: ...used to open multiple ports or a range of ports in your router and redirect data through those ports to a single PC on your network You can enter ports in various formats Range 50 100 Individual 80 68 888 Mixed 1020 5000 689 Example Suppose you are hosting an online game server that is running on a PC with a private IP Address of 192 168 0 50 This game requires that you open multiple ports 6159 61...
Page 31: ...n this rule is in effect If you do not see the schedule you need in the list of schedules go to the Tools Schedules screen and create a new schedule With the above example values filled in and this Gaming Rule enabled all TCP and UDP traffic on ports 6159 through 6180 and port 99 is passed through the router and redirected to the Internal Private IP Address of your Game Server at 192 168 0 50 Edit...
Page 32: ... improve your network gaming performance by prioritizing the data flows of network applications StreamEngine Setup Enable StreamEngine Enable this option for better performance and experience with online games and other interactive applications such as VoIP ...
Page 33: ...plink speed with a service such as www dslreports com Note however that sites such as DSL Reports because they do not consider as many network protocol overheads will generally note speeds slightly lower than the Measured Uplink Speed or the ISP rated speed Connection Type By default the router automatically determines whether the underlying connection is an xDSL Frame relay network or some other ...
Page 34: ...ge The rule applies to a flow of messages whose LAN side port number is within the range set here Destination IP Range The rule applies to a flow of messages whose WAN side IP address falls within the range set here Destination Port Range The rule applies to a flow of messages whose WAN side port number is within the range set here Add Edit StreamEngine Rule Enable Each entry in StreamEngine Rules...
Page 35: ...ies there is no next hop and the IP address matched is directly connected to the router on the interface specified LAN or WAN Interface Specifies the interface LAN or WAN that the IP packet must use to transit out of the router when this route is used Metric The route metric is a value from 1 to 16 that indicates the cost of using this route A value of 1 is the lowest cost and 15 is the highest co...
Page 36: ...o make the changes effective and permanent Routes List The section shows the current routing table entries Certain required routes are predefined and cannot be changed Routes that you add can be changed by clicking the Edit icon or deleted by clicking the Delete icon When you click the Edit icon the item is highlighted and the Edit Route section is activated for editing ...
Page 37: ...to the Internet Policy Wizard The Policy Wizard guides you through the steps of defining each access control policy A policy is the Who What When and How of access control whose computer will be affected by the control what internet addresses are controlled when will the control be in effect and how is the control implemented You can define multiple policies The Policy Wizard starts when you click...
Page 38: ...ntinel service refer to Tools Sentinel Web Filter Parameters Web Site Enter the address of the web site that you want to allow for example google com Do not enter the http preceding the address Enter the most inclusive domain for example enter t and access will be permitted to both www u media com and support u media com Many web sites construct pages with images and content from other web sites A...
Page 39: ...ting the Allowed Web Site List you must still click the Save Settings button at the top of the page to make the changes effective and permanent Allowed Web Site List The section lists the currently allowed web sites An allowed web site can be changed by clicking the Edit icon or deleted by clicking the Delete icon When you click the Edit icon the item is highlighted and the Edit Web Site section i...
Page 40: ...n of this feature can prevent any machine from accessing the network In such a situation you can regain access by activating the factory defaults button on the router itself Filter Settings Mode When only allow listed machines is selected only computers with MAC addresses listed in the MAC Address List are granted network access When only deny listed machines is selected any computer with a MAC ad...
Page 41: ...PC s MAC Address button Save Saves the new or edited MAC Address entry in the following list When finished updating the MAC Address List you must still click the Save Settings button at the top of the page to make the changes effective and permanent MAC Address List The section lists the current MAC Address filters A MAC Address entry can be changed by clicking the Edit icon or deleted by clicking...
Page 42: ...king your LAN invisible to Internet cyber attackers However some network applications cannot run with a tight firewall Those applications need to selectively open ports in the firewall to function correctly The options on this page control several ways of opening the firewall to address the needs of specific types of applications See also Virtual Server Port Forwarding Application Rules and UPnP f...
Page 43: ...ame IP address with which a connection was established This allows the remote application to send data back through a port different from the one used when the outgoing session was created Port And Address Restricted The NAT does not forward any incoming connection requests with the same port address as an already establish connection Note that some of these options can interact with other port re...
Page 44: ... appear unsolicited to the NAT In general the DMZ host should be used only if there are no other alternatives because it is much more exposed to cyber attacks than any other system on the LAN Thought should be given to using other configurations instead a virtual server a port forwarding rule or a port trigger Virtual servers open one port for incoming sessions bound for a specific application and...
Page 45: ...s enabled LAN computers can establish PPTP VPN connections either with the same or with different VPN servers When the PPTP ALG is disabled the router allows VPN operation in a restricted way LAN computers are typically able to establish VPN tunnels to different VPN Internet servers but not to the same server The advantage of disabling the PPTP ALG is to increase VPN performance Enabling the PPTP ...
Page 46: ...and devices have the ability to discover NAT devices and work around them This ALG may interfere with the operation of such devices If you are having trouble making VoIP calls try turning this ALG off Wake On LAN This feature enables forwarding of magic packets that is specially formatted wake up packets from the WAN to a LAN computer or other device that is Wake on LAN WOL capable The WOL device ...
Page 47: ...friends whom you have invited to play the games on that server Inbound Filters can be used for limiting access to a server on your network to a system or group of systems Filter rules can be used with Virtual Server Gaming or Remote Administration features Each filter can be used for several functions for example a Game Clan filter might allow all of the members of a particular gaming group to pla...
Page 48: ...that is meaningful to you Action The rule can either Allow or Deny messages Source IP Range Define the ranges of Internet addresses this rule applies to For a single IP address enter the same address in both the Start and End boxes Up to eight ranges can be entered The Enable checkbox allows you to turn on or off specific entries in the list of ranges ...
Page 49: ...n Inbound Filter Rule can be changed by clicking the Edit icon or deleted by clicking the Delete icon When you click the Edit icon the item is highlighted and the Edit Inbound Filter Rule section is activated for editing In addition to the filters listed here two predefined filters are available wherever inbound filters can be applied Allow All Permit any WAN user to access the related capability ...
Page 50: ... wireless area Beacon Period Beacons are packets sent by a wireless router to synchronize wireless devices Specify a Beacon Period value between 20 and 1000 The default value is set to 100 milliseconds RTS Threshold This setting should remain at its default value of 2346 If you encounter inconsistent data flow only minor modifications to the value are recommended Fragmentation Threshold This setti...
Page 51: ... one of these additional regulatory domains WMM Enable Enabling WMM can help control latency and jitter when transmitting multimedia content over a wireless connection Short GI Using a short 400ns guard interval can increase throughput However it can also increase error rate in some installations due to increased sensitivity to radio frequency reflections Select the option that works best for your...
Page 52: ... equipment software and peripherals This router has optional UPnP capability and can work with other UPnP devices and software Enable UPnP If you need to use the UPnP functionality you can enable it here WAN Ping Pinging public WAN IP addresses is a common method used by hackers to test whether your WAN IP address is valid Enable WAN Ping Respond ...
Page 53: ... the other settings Multicast Streams The router uses the IGMP protocol to support efficient multicasting transmission of identical content such as multimedia from a source to a number of recipients Enable Multicast Streams This option must be enabled if any applications on the LAN participate in a multicast group If you have a multimedia LAN application that is not receiving content as expected t...
Page 54: ...m Firmware Dynamic DNS Windows Connect Now System Check Schedules Tools_Admin The Admin option is used to set a password for access to the Web based management By default there is no password configured It is highly recommended that you create a password to keep your new router secure Admin Password ...
Page 55: ...ere on the Internet Disabling Remote Management allows you to manage the router only from computers on your LAN Remote Admin Port The port that you will use to address the management interface from the Internet For example if you specify port 1080 here then to access the router from the Internet you would use a URL of the form http my domain com 1080 Remote Admin Inbound Filter Select a filter tha...
Page 56: ...r Daylight saving can also be configured to automatically adjust the time when needed Time Configuration Current Router Time Displays the time currently maintained by the router If this is not correct use the following options to configure the time correctly Time Zone Select your local time zone from pull down menu Enable Daylight Saving Check this option if your location observes daylight saving ...
Page 57: ...logs are kept accurate NTP Server Used Select a Network Time Server for synchronization You can type in the address of a time server or select one from the list If you have trouble using one server select another Set the Date and Time Manually If you do not have the NTP Server option in effect you can either manually set the time for your router here or you can click the Copy Your Computer s Time ...
Page 58: ...s option is enabled router activity logs or firmware upgrade notifications can be emailed to a designated email address and the following parameters are displayed Email Settings From Email Address This email address will appear as the sender when you receive a log file or firmware upgrade notification via email To Email Address Enter the email address where you want the email sent SMTP Server Addr...
Page 59: ...option if you want logs to be sent by email when the log is full On Schedule Select this option if you want logs to be sent by email according to a schedule Schedule If you selected the On Schedule option select one of the defined schedule rules If you do not see the schedule you need in the list of schedules go to the Tools Schedules screen and create a new schedule Normally email is sent at the ...
Page 60: ...e sure to save the configuration before performing a firmware upgrade Load Settings From Local Hard Drive Use this option to restore previously saved router configuration settings Restore To Factory Default Settings This option restores all configuration settings back to the settings that were in effect at the time the router was shipped from the factory Any settings that have not been saved will ...
Page 61: ... upgrade file on your computer 2 Once you have found the file to be used click the Upload button below to start the firmware upgrade process This can take a minute or more 3 Wait for the router to reboot This can take another minute or more 4 Confirm updated firmware revision on status page Firmware Information Here are displayed the version numbers of the firmware currently installed in your rout...
Page 62: ...cted to the router by wire Some firmware upgrades reset the configuration options to the factory defaults Before performing an upgrade be sure to save the current configuration from the Tools Admin screen Upload Once you have a firmware update on your computer use this option to browse for the file and then upload the information into the router ...
Page 63: ... connect to your server no matter what your IP address is Enable Dynamic DNS Enable this option only if you have purchased your own domain name and registered with a dynamic DNS service provider The following parameters are displayed when the option is enabled Server Address Select a dynamic DNS service provider from the pull down list Host Name Enter your host name fully qualified for example myh...
Page 64: ...ered in hours If a dynamic DNS update fails for any reason for example when incorrect parameters are entered the router automatically disables the Dynamic DNS feature and records the failure in the log After configuring the router for dynamic DNS you can open a browser and navigate to the URL for your domain for example http www mydomain info and the router will attempt to forward the request to p...
Page 65: ...t s Windows Connect Now technology Save Configuration to Wireless Network Setup Wizard This will save the current wireless configuration from the router to your computer through Microsoft s Windows Connect Now technology and allow future propagation of the setting through Microsoft s Wireless Network Setup Wizard ...
Page 66: ... or IP Address Enter either the IP address of the target computer or enter its fully qualified domain name Ping Start pinging the specified host Stop The host is pinged repeatedly until you press this button Example Host Name or IP Address www whitehouse gov Ping Result Please wait resolving www whitehouse gov Resolved to 205 161 7 102 Response from 205 161 7 102 received in 7 milliseconds Respons...
Page 67: ... entries Name Give the schedule a name that is meaningful to you such as Weekday rule Day s Place a checkmark in the boxes for the desired days or select the All Week radio button to select all seven days of the week All Day 24 hrs Select this option if you want this schedule in effect all day for the selected day s Start Time If you don t use the All Day option then you enter the time here The st...
Page 68: ...he following list When finished updating the Schedule Rules you must still click the Save Settings button at the top of the page to make the changes effective and permanent Schedule Rules List This section shows the currently defined Schedule Rules A Schedule Rule can be changed by clicking the Edit icon or deleted by clicking the Delete icon When you click the Edit icon the item is highlighted an...
Page 69: ...t and network connection details are displayed on the Device Info page The firmware version is also displayed here Some browsers have limitations that make it impossible to update the WAN status display when the status changes Some browsers require that you refresh the display to obtain updated status Some browsers report an error condition when trying to obtain WAN status ...
Page 70: ...69 ...
Page 71: ...you are currently logged in to BigPond you can click either the BigPond Login to attempt to establish the WAN connection or the BigPond Logout to break the WAN connection LAN Computers This area of the screen continually updates to show all DHCP enabled computers and devices connected to the LAN side of your router The detection range is limited to the address range as configured in DHCP Server Co...
Page 72: ...he client Values are 11a 11b or 11g for 802 11a 802 11b or 802 11g respectively Rate The actual transmission rate of the client in megabits per second Signal This is a relative measure of signal quality The value is expressed as a percentage of theoretical best quality Signal quality can be reduced by distance by interference from other radio frequency sources such as cordless telephones or neighb...
Page 73: ...s configured for your router A value of 0 0 0 0 for gateway means there is no next hop and the IP address is directly connected to the router on the interface specified LAN or WAN A value of 0 0 0 0 in both the destination IP and netmask means that this is the default route ...
Page 74: ...test events are retained The Logs option allows you to view the router logs You can define what types of events you want to view and the level of events to view This router also has external Syslog Server support so you can send the log files to a computer on your network that is running a Syslog utility What to View Select the kinds of events that you want to view Firewall and Security System Rou...
Page 75: ...sh Clicking this button refreshes the display of log entries There may be new events since the last time you accessed the log Clear Clicking this button erases all log entries Email Now If you provided email information with the Tools Email screen clicking the Email Now button sends the router log to the configured email address Save Log Select this option to save the router log to a file on you c...
Page 76: ...r TX Packets Dropped The number of packets that were dropped while being sent due to errors collisions or router resource limitations RX Packets Dropped The number of packets that were dropped while being received due to errors collisions or router resource limitations Collisions The number of packets that were dropped due to Ethernet collisions two or more devices attempting to use an Ethernet ci...
Page 77: ...76 Errors The number of transmission failures that cause loss of a packet A noisy radio frequency environment can cause a high error rate on the wireless LAN ...
Page 78: ...on on a LAN side computer and a program or application on a WAN side computer Internal The IP address and port number of the LAN side application Protocol The communications protocol used for the conversation External The IP address and port number of the WAN side application NAT The port number of the LAN side application as viewed by the WAN side application Priority ...
Page 79: ...Wait is fully closed LA Last ACK Waiting for a short time while a connection that was in Close Wait is fully closed CL Closed The connection is no longer active but the session is being tracked in case there are any retransmitted packets still pending Dir The direction of initiation of the conversation Out Initiated from LAN to WAN In Initiated from WAN to LAN Time Out The number of seconds of idl...
Page 80: ... be made in both directions ADSL Asymmetric Digital Subscriber Line Advanced Encryption Standard AES Government encryption standard Alphanumeric Characters A Z and 0 9 Antenna Used to transmit and receive RF signals AppleTalk A set of Local Area Network protocols developed by Apple for their computer systems AppleTalk Address Resolution Protocol AARP Used to map the MAC addresses of Apple computer...
Page 81: ...r is available on the network B Backward Compatible The ability for new devices to communicate and interact with older legacy devices to guarantee interoperability Bandwidth The maximum amount of bytes or bits per second that can be transmitted to and from a network device Basic Input Output System BIOS A program that the processor of a computer uses to startup the system once it is turned on Baud...
Page 82: ...ace It supports a 32 bit data path DMA and consumes less voltage CAT 5 Category 5 Used for 10 100 Mbps or 1Gbps Ethernet connections Client A program or user that requests data from a server Collision When do two devices on the same Ethernet network try and transmit data at the exact same time Cookie Information that is stored on the hard drive of your computer that holds your preferences to the s...
Page 83: ... text Default A predetermined value or setting that is used by a program when no user input has been entered for this value or setting Demilitarized zone DMZ A single computer or group of computers that can be accessed by both users on the Internet as well as users on the Local Network but that is not protected by the same security as the Local Network DHCP Dynamic Host Configuration Protocol Used...
Page 84: ...smissions at the sane time Dynamic DNS service Dynamic DNS is provided by companies to allow users with Dynamic IP addresses to obtain a Domain Name that will always by linked to their changing IP address The IP address is updated by either client software running on a computer or by a router that supports Dynamic DNS whenever the IP address changes Dynamic IP address IP address that is assigned b...
Page 85: ... outside of the local network Firmware Programming that is inserted into a hardware device that tells it how to function Fragmentation Breaking up data into smaller pieces to make it easier to store FTP File Transfer Protocol Easiest way to transfer files between computers on the Internet Full duplex Sending and Receiving data at the same time G Gain The amount an amplifier boosts the wireless sig...
Page 86: ...xt Transfer Protocol is used to transfer files from HTTP servers web servers to HTTP clients web browsers HTTPS HTTP over SSL is used to encrypt and decrypt HTTP transmissions Hub A networking device that connects multiple devices together I ICMP Internet Control Message Protocol IEEE Institute of Electrical and Electronics Engineers IGMP Internet Group Management Protocol is used to make sure tha...
Page 87: ... at the packet processing layer of network communication Internet Service Provider An ISP provides access to the Internet to individuals or companies Intranet A private network Intrusion Detection A type of security that scans a network to detect attacks coming from inside and outside of the network IP Internet Protocol IP address A 32 bit number when talking about Internet Protocol Version 4 that...
Page 88: ...ing Diode Legacy Older devices or technology Local Area Network A group of computers in a building that usually access files from a server LPR LPD Line Printer Requestor Line Printer Daemon A TCP IP protocol for transmitting streams of printer data L2TP Layer 2 Tunneling Protocol M MAC address A unique hardware ID assigned to every Ethernet adapter by the manufacturer Mbps Megabits per second MDI ...
Page 89: ... that can be transmitted on a packet based network like the Internet Multicast Sending data from one device to many devices on a network N NAT Network Address Translation allows many private IP addresses to connect to the Internet or another network through one IP address NetBEUI NetBIOS Extended User Interface is a Local Area Network communication protocol This is an updated version of NetBIOS Ne...
Page 90: ...posed to sending the entire routing table at a regular interval which is how RIP functions P Password A sequence of characters that is used to authenticate requests to resources on a network Personal Area Network The interconnection of networking devices within a range of 10 meters Physical layer The first layer of the OSI model Provides the hardware means of transmitting electrical signals on a d...
Page 91: ...hronize communication timing between devices on a network Q QoS Quality of Service R RADIUS Remote Authentication Dial In User Service allows for remote users to dial into a central server and be authenticated in order to access resources on a network Reboot To restart a computer and reload it s operating software or firmware from nonvolatile storage Rendezvous Apple s version of UPnP which allows...
Page 92: ... session between two computers Session layer The fifth layer of the OSI model which coordinates the connection and communication between applications on both ends Simple Mail Transfer Protocol Used for sending and receiving email Simple Network Management Protocol Governs the management and monitoring of network devices SIP Session Initiation Protocol A standard protocol for initiating a user sess...
Page 93: ...nterface for collecting in one place the logs from different sources Originally written for UNIX it is now available for other operating systems including Windows T TCP Transmission Control Protocol TCP IP Transmission Control Protocol Internet Protocol TCP Raw A TCP IP protocol for transmitting streams of printer data TFTP Trivial File Transfer Protocol is a utility used for transferring files th...
Page 94: ...o the other UPnP Universal Plug and Play URL Uniform Resource Locator is a unique address for files accessible on the Internet USB Universal Serial Bus UTP Unshielded Twisted Pair V Virtual Private Network VPN A secure tunnel over the Internet to connect remote offices or users to their company s network VLAN Virtual LAN Voice over IP Sending voice information over the Internet as opposed to the P...
Page 95: ... Fi Protected Access An updated version of security for wireless networks that provides authentication as well as encryption Wide Area Network The larger network that your LAN is connected to which may be the Internet itself or a regional or corporate network Wireless ISP A company that provides a broadband Internet connection over a wireless connection Wireless LAN Connecting to a Local Area Netw...
Page 96: ...ntenna used to concentrate wireless signals on a specific location Z 1 802 11 A family of specifications for wireless local area networks WLANs developed by a working group of the Institute of Electrical and Electronics Engineers IEEE ...
Page 97: ...epaid insured and packaged appropriately for safe shipment WARRANTIES EXCLUSIVE IF THE TRENDNET PRODUCT DOES NOT OPERATE AS WARRANTED ABOVE THE CUSTOMER S SOLE REMEDY SHALL BE AT TRENDNET S OPTION REPAIR OR REPLACEMENT THE FOREGOING WARRANTIES AND REMEDIES ARE EXCLUSIVE AND ARE IN LIEU OF ALL OTHER WARRANTIES EXPRESSED OR IMPLIED EITHER IN FACT OR BY OPERATION OF LAW STATUTORY OR OTHERWISE INCLUDI...
Page 98: ...REMEDY PROVIDED HEREIN SHALL FAIL OF ITS ESSENTIAL PURPOSE Governing Law This Limited Warranty shall be governed by the laws of the state of California Note AC DC Power Adapter Cooling Fan and Power Supply carry 1 Year Warranty ...
Page 99: ...98 ...