background image

         

 

                                         

 

53

Kbps  

Kilobits per second   

Kbyte  

Kilobyte  

LAN  

Local Area Network   

Latency  

The amount of time that it takes a packet to get from the one point to another on a 
network. Also referred to as delay   

LED  

Light Emitting Diode   

Legacy  

Older devices or technology   

Local Area Network   

A group of computers in a building that usually access files from a server   

LPR/LPD  

"Line Printer Requestor"/"Line Printer Daemon". A TCP/IP protocol for transmitting 
streams of printer data.   

L2TP  

Layer 2 Tunneling Protocol   

MAC address   

A unique hardware ID assigned to every Ethernet bridge by the manufacturer.   

Mbps  

Megabits per second   

MDI  

Summary of Contents for TEW-687GA

Page 1: ... 1 450Mbps Wireless N Gaming Adapter TEW 687GA User Manual Revision 0 1 Revision History Date Version Author Remark 12 17 2010 0 1 Rex Liu ...

Page 2: ...fferent from that to which the receiver is connected z Consult the dealer or an experienced radio TV technician for help FCC Caution Any changes or modifications not expressly approved by the party responsible for compliance could void the user s authority to operate this equipment This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device...

Page 3: ...requirements under article 3 2 of the R TTE Directive EN 301 489 1 V1 8 1 2008 04 Electromagnetic compatibility and Radio Spectrum Matters ERM ElectroMagnetic Compatibility EMC standard for radio equipment and services Part 1 Common technical requirements EN 301 489 17 V2 1 1 2009 05 Electromagnetic compatibility and Radio spectrum Matters ERM ElectroMagnetic Compatibility EMC standard for radio e...

Page 4: ... 4 output power may be limited to 10 mW EIRP in the frequency range of 2454 2483 5 MHz For detailed information the end user should contact the national spectrum authority in France ...

Page 5: ... 5 EC Español Spanish Por medio de la presente nombre del fabricante declara que el clase de equipo cumple con los requisitos esenciales y cualesquiera otras disposiciones aplicables o exigibles de la Directiva 1999 5 CE Ελληνική Greek ΜΕ ΤΗΝ ΠΑΡΟΥΣΑ name of manufacturer ΗΛΩΝΕΙ ΟΤΙ type of equipment ΣΥΜΜΟΡΦΩΝΕΤΑΙ ΠΡΟΣ ΤΙΣ ΟΥΣΙΩ ΕΙΣ ΑΠΑΙΤΗΣΕΙΣ ΚΑΙ ΤΙΣ ΛΟΙΠΕΣ ΣΧΕΤΙΚΕΣ ΙΑΤΑΞΕΙΣ ΤΗΣ Ο ΗΓΙΑΣ 1999 5 ΕΚ ...

Page 6: ...orme com os requisitos essenciais e outras disposições da Directiva 1999 5 CE Slovensko Slovenian Ime proizvajalca izjavlja da je ta tip opreme v skladu z bistvenimi zahtevami in ostalimi relevantnimi določili direktive 1999 5 ES Slovensky Slovak Meno výrobcu týmto vyhlasuje že typ zariadenia spĺňa základné požiadavky a všetky príslušné ustanovenia Smernice 1999 5 ES Suomi Finnish Valmistaja manuf...

Page 7: ...an Norms z EN 60950 Product Safety z EN 300 328 Technical requirement for radio equipment z EN 301 489 1 17 General EMC requirements for radio equipment Trademark recognition All product names used in this manual are the properties of their respective owners and are acknowledged ...

Page 8: ...nel 13 3 3 Top View 13 3 4 Bottom View 13 3 3 Installation Considerations 14 3 4 Getting Start 15 4 Using the Configuration Menu 26 4 1 Network 27 4 1 1 LAN Setting 27 4 2 Wireless 28 4 2 1 Profile 28 4 2 2 Link Status 31 4 2 2 Site Survey 31 4 2 3 Statistics 33 4 2 4 Advance 34 4 2 5 QoS 36 4 2 6 WPS 37 4 3 Administrator 40 4 3 1 Management 40 4 3 2 Upload Firmware 42 4 3 3 Setting Management 43 ...

Page 9: ...9 B 46 C 47 D 48 E 49 F 49 G 50 H 50 I 51 J 52 K 53 L 53 M 53 N 54 O 55 P 55 Q 56 R 57 S 57 T 59 U 59 V 60 W 60 X 62 Y 62 Z 62 ...

Page 10: ...ulti Language Quick Installation Guide z CAT 5 Ethernet Cable z Power Adapter 12V 0 5A Using a power supply with a different voltage than the one included with your product will cause damage and void the warranty for this product 1 2 Minimum System Requirements Installation Requirements z Web Browser Internet Explorer 6 or higher Mozilla or Safari z A computer with a network adapter or wireless ad...

Page 11: ...dually replacing the 11b g devices with 11n devices 2 1 Features z Wi Fi compliant with IEEE 802 11n standard z Compatible with IEEE 802 11g and IEEE 802 11b devices z Connects network ready game consoles including Nintendo Wii Xbox Xbox 360 PlayStation 2 and PlayStation 3 to a high speed wireless n network z Supports online gaming and head to head play z Supports Multiple Input Multiple Output MI...

Page 12: ...12 3 1 LED Indications ...

Page 13: ...13 3 2 Rear Panel 3 3 Top View 3 4 Bottom View ...

Page 14: ...eless product s range from 3 90 feet 1 30 meters Position your devices so that the number of walls or ceilings is minimized 2 Be aware of the direct line between network devices A wall that is 1 5 feet thick 5 meters at a 45 degree angle appears to be almost 3 feet 1 meter thick At a 2 degree angle it looks over 42 feet 14 meters thick Position devices so that the signal will travel straight throu...

Page 15: ...adapter and verify the Power Ethernet LEDs are light 3 To configure the router open your browser type http 192 168 10 110 or http tew687ga trendnet into the address bar and click Go to get to the setup wizard page 4 At the Password prompt the User name is admin and password is admin Enter default username and password and press ok ...

Page 16: ... TEW 687GA step by step The Wizard will teach user to set up the TEW 687GA just few steps 5 You could click Import Setting button to restore your configuration setting by importing the file or press NEXT and follow Wizard to complete your setting ...

Page 17: ...subnet mask for your LAN segment Default IP is 192 168 10 110 We suggest using DHCP Client mode as LAN connection Type that is to assure the setup wizard is able to re config after setup wizard complete Step 2 Setup Wireless Settings There are 2 options to configure this Gaming Adapter WPS Wi Fi Protected Setup or Manual ...

Page 18: ...18 setup Manual Setup Select this option if you want to setup your network manually Wi Fi Protected Setup Select this option if you want to use Wi Fi Protected Setup ...

Page 19: ...19 Manual Setup You can enter the Wireless Network Name of AP or use scan to find the AP Please input the correct security mode and security password ...

Page 20: ...20 Please record the device configuration and press Apply to save you setting to device Device is starting the connection ...

Page 21: ...21 Congratulations you have configured you TEW 687GA You can use Export Setting button to backup your device configuration ...

Page 22: ...ur wireless network PIN Personal Identification Number Enter the above PIN information into your AP and click the below Next button PBC Push Button Configuration Select the PBC option or press the push button on your device and click the below Next button within 120 seconds ...

Page 23: ...23 Please record the device configuration and press Apply to save you setting to device and device will start the WPS process ...

Page 24: ...24 WPS starting Wait for WPS process within 120 seconds Note when the WPS has solid led on TEW 687GA it means the connection has established otherwise please try again ...

Page 25: ...25 Congratulations you have configured you TEW 687GA You can use Export Setting button to backup your device configuration ...

Page 26: ...browser and typing in the IP Address of the TEW 687GA The TEW 687GA s default IP Address is http 192 168 10 110 Open the Web browser Type in the IP Address of the Bridge http 192 168 10 110 If you have changed the default IP Address assigned to the TEW 687GA make sure to enter the correct IP Address Select admin in the User Name field Password is admin ...

Page 27: ...you need to assign a fixed address to the AP In this case you must also configure the following fields IP Address The IP address of this Gaming Adapter on the local area network Assign any unused IP address in the range of IP addresses available from your network For example 192 168 10 110 Subnet Mask The subnet mask of the local area network Default Gateway ...

Page 28: ...tom profiles and store new profile for later use Configure the setting to connect to a wireless network selection option for network type SSID and wireless security The profile can be edited deleted and made active from this option There are several ways to connect to your wireless network go through the setup wizard add a new profile or search using site survey feature ...

Page 29: ...d of encrypting data for wireless communication intended to provide the same level of privacy as a wired network WEP is not as secure as WPA encryption To gain access to a WEP network you must know the key The key is a string of characters that you create When using WEP you must determine the level of encryption The type of encryption determines the key length 128 bit encryption requires a longer ...

Page 30: ...ers 128 bit 26 characters 13 characters WPA Personal or WPA2 Personal This option uses Wi Fi Protected Access with a Pre Shared Key PSK Pre Shared Key The key is entered as a pass phrase of up to 63 alphanumeric characters AES or TKIP type in ASCII American Standard Code for Information Interchange format at both ends of the wireless connection It cannot be shorter than eight characters although f...

Page 31: ...rch for wireless networks around the TEW 687GA bridge Click on the Scan button to search for wireless network to join From this window you can also add the selected network to your profile by clicking the Add Profile button To connect to the desire wireless network click on the Connect button to join a wireless network from this site survey window ...

Page 32: ...32 ...

Page 33: ...33 4 2 4 Statistics View the current operating status of the TEW 687GA see the Transmit and Receive data ...

Page 34: ... TEW 687GA at 11Mbps for wireless b at 54Mbps for wireless g and share access at the same time Although the wireless b g operates in the 2 4GHz frequency it will allow the use of other 2 4GHz client devices Wireless n g 54Mbps to connect and access at the same time 2 4GHz 802 11 n only This wireless mode works in the 2 4GHz frequency range and will only allow the use of wireless n client devices t...

Page 35: ...transmitted with a preamble compatible with the legacy 802 11g n the rest of the packet has a new format In this mode the receiver shall be able to decode both the Mixed Mode packets and legacy packets Green Field In this mode high throughput packets are transmitted without a legacy compatible part Channel Bandwidth Set channel width of wireless radio 20 Channel Width 20 MHz 20 40 Channel Width 20...

Page 36: ... transmission rate will be selected You have the option of selecting the speed if necessary 4 2 6 QoS WMM Wireless Multi Media use this feature allows wireless devices to take advantage of the wireless environment over other wireless devices WMM Power Saving An option that allows wireless clients such as notebooks or Laptops to save battery life by sending less transmission during idle times Add a...

Page 37: ...gs are polled by the priority given to the option in this section AC_BE Best Effort AC_BK Background AC_VI Video signal AC_VO Voice signal The options allow users to select which Access Category is needed to turn on while the power saving mode is enabled 4 2 6 WPS You can setup security easily by choosing PIN or PBC method to do Wi Fi Protected Setup ...

Page 38: ...t Enable the WPS feature PIN Settings A PIN is a unique number that can be used to add to the router and use that as an authentication key to join the existing wireless network Client PIN Shows the current value of the bridge ...

Page 39: ...s PIN to the wireless router s WPS section PBC Settings The push button method can be used to allow wireless clients to connect to the router without entering remember any encryption keys The user can use the PBC method by pressing the WPS button on the side of the router or select the Start PBC option here ...

Page 40: ...40 4 3Administrator 4 3 1 Wizard You could use Wizard to help you setting TEW 687GA again 4 3 2 Management At this page you can configure administrator account and password ...

Page 41: ...41 ...

Page 42: ...irmware By assigning firmware location you can upload firmware at this page Once you have a firmware saved on your computer use this option to browse for the file and then click Apply to upload the file into the bridge ...

Page 43: ...gs This option allows you to export and then save the router s configuration to a file on your computer Be sure to save the configuration before performing a firmware upgrade Import Settings Use this option to restore previously saved router configuration settings Load Factory Defaults This option restores all configuration settings back to the settings that were in effect at the ...

Page 44: ...ory Any settings that have not been saved will be lost If you want to save your router configuration settings use the Export Settings option above System Reboot This restarts the router It is useful for restarting when you are not near the device ...

Page 45: ...tus You can check system information and network configurations on this page Glossary A Access Control List ACL This is a database of network devices that are allowed to access resources on the network Access Point ...

Page 46: ...s system of characters is most commonly used for text files Attenuation The loss in strength of digital and analog signals The loss is greater when the signal is being transmitted over long distances Authentication To provide credentials like a Password in order to verify that the person or device is really who they are claiming to be Automatic Private IP Addressing APIPA An IP address that that a...

Page 47: ... Bits per second BOOTP Bootstrap Protocol Allows for computers to be booted up and given an IP address with no user intervention Broadcast Transmitting data in all directions at once Browser A program that allows you to access resources on the web and provides them to you graphically C CAT 5 Category 5 Used for 10 100 Mbps or 1Gbps Ethernet connections Client A program or user that requests data f...

Page 48: ... to isotropic radiator dBm Decibels relative to one milliwatt Decrypt To unscramble an encrypted message back into plain text Default A predetermined value or setting that is used by a program when no user input has been entered for this value or setting DHCP Dynamic Host Configuration Protocol Used to automatically assign IP addresses from a predefined pool of addresses to computers or devices th...

Page 49: ...erver and that may change Cable Internet providers usually use this method to assign IP addresses to their customers E EAP Extensible Authentication Protocol Encryption Converting data into cyphertext so that it cannot be easily read Ethernet The most widely used technology for Local Area Networks F File server A computer on a network that stores data so that the other computers on the network can...

Page 50: ...etween computers on the Internet Full duplex Sending and Receiving data at the same time G Gain The amount an amplifier boosts the wireless signal Gateway A device that connects your network to another like the internet Gbps Gigabits per second Gigabit Ethernet Transmission technology that provides a data rate of 1 billion bits per second GUI Graphical user interface H Half duplex Data cannot be t...

Page 51: ...ther I ICMP Internet Control Message Protocol IEEE Institute of Electrical and Electronics Engineers IGMP Internet Group Management Protocol is used to make sure that computers can report their multicast group membership to adjacent APs IIS Internet Information Server is a WEB server and FTP server provided by Microsoft Infrastructure In terms of a wireless network this is when wireless clients us...

Page 52: ...te network Intrusion Detection A type of security that scans a network to detect attacks coming from inside and outside of the network IP Internet Protocol IP address A 32 bit number when talking about Internet Protocol Version 4 that identifies each computer that transmits data on the Internet or on an Intranet IPsec Internet Protocol Security IPX Internetwork Packet Exchange is a networking prot...

Page 53: ...t Emitting Diode Legacy Older devices or technology Local Area Network A group of computers in a building that usually access files from a server LPR LPD Line Printer Requestor Line Printer Daemon A TCP IP protocol for transmitting streams of printer data L2TP Layer 2 Tunneling Protocol M MAC address A unique hardware ID assigned to every Ethernet bridge by the manufacturer Mbps Megabits per secon...

Page 54: ...g from the phone lines to digital signals for your computer MPPE Microsoft Point to Point Encryption is used to secure data transmissions over PPTP connections MTU Maximum Transmission Unit is the largest packet that can be transmitted on a packet based network like the Internet Multicast Sending data from one device to many devices on a network N NAT Network Address Translation allows many privat...

Page 55: ...d NTP Network Time Protocol O OFDM Orthogonal Frequency Division Multiplexing is the modulation technique for both 802 11a and 802 wireless g OSI Open Systems Interconnection is the reference model for how data should travel between two devices on a network OSPF Open Shortest Path First is a routing protocol that is used more than RIP in larger scale networks because only changes to the routing ta...

Page 56: ...over the unused pairs in a category 5 Ethernet cable Port A logical channel endpoint in a network A computer might have only one physical channel its Ethernet channel but can have multiple ports logical channels each identified by a number PPP Point to Point Protocol is used for two computers to communicate with each over a serial interface like a phone line PPPoE Point to Point Protocol over Ethe...

Page 57: ...ted without the need to configure any settings Repeater Retransmits the signal of an Access Point in order to extend it s coverage RIP Routing Information Protocol is used to synchronize the routing table of all the APs on a network RJ 11 The most commonly used connection method for telephones RJ 45 The most commonly used connection method for Ethernet RS 232C The interface for serial communicatio...

Page 58: ...rk Management Protocol Governs the management and monitoring of network devices SIP Session Initiation Protocol A standard protocol for initiating a user session that involves multimedia content such as voice or chat SMTP Simple Mail Transfer Protocol SNMP Simple Network Management Protocol SOHO Small Office Home Office SPI Stateful Packet Inspection SSH Secure Shell is a command line interface th...

Page 59: ...for UNIX it is now available for other operating systems including Windows T TCP Transmission Control Protocol TCP IP Transmission Control Protocol Internet Protocol TCP Raw A TCP IP protocol for transmitting streams of printer data TFTP Trivial File Transfer Protocol is a utility used for transferring files that is simpler to use than FTP but with less features Throughput The amount of data that ...

Page 60: ...file transmitted from the requesting computer to the other UPnP Universal Plug and Play URL Uniform Resource Locator is a unique address for files accessible on the Internet USB Universal Serial Bus UTP Unshielded Twisted Pair V Virtual Private Network VPN A secure tunnel over the Internet to connect remote offices or users to their company s network VLAN Virtual LAN Voice over IP Sending voice in...

Page 61: ...ll of the information on the World Wide Web WEP Wired Equivalent Privacy is security for wireless networks that is supposed to be comparable to that of a wired network Wi Fi Wireless Fidelity Wi Fi Protected Access An updated version of security for wireless networks that provides authentication as well as encryption Wide Area Network The larger network that your LAN is connected to which may be t...

Page 62: ...s A Wi Fi security enhancement that provides improved data encryption relative to WEP X xDSL A generic term for the family of digital subscriber line DSL technologies such as ADSL HDSL RADSL and SDSL Y Yagi antenna A directional antenna used to concentrate wireless signals on a specific location Z ...

Page 63: ...vice the product through any unauthorized service center This warranty is voided if i the product has been modified or repaired by any unauthorized service center ii the product was subject to accident abuse or improper use iii the product was subject to conditions more severe than those specified in the manual Warranty service may be obtained by contacting TRENDnet office within the applicable wa...

Page 64: ...R FINANCIAL LOSS ARISING OUT OF OR IN CONNECTION WITH THE SALE INSTALLATION MAINTENANCE USE PERFORMANCE FAILURE OR INTERRUPTION OF THE POSSIBILITY OF SUCH DAMAGES AND LIMITS ITS LIABILITY TO REPAIR REPLACEMENT OR REFUND OF THE PURCHASE PRICE PAID AT TRENDNET S OPTION THIS DISCLAIMER OF LIABILITY FOR DAMAGES WILL NOT BE AFFECTED IF ANY REMEDY PROVIDED HEREIN SHALL FAIL OF ITS ESSENTIAL PURPOSE Gove...

Page 65: ...65 ...

Reviews: