TRENDnet TEW-691GR Manual Download Page 32

32 

Port triggering is a special form of port forwarding, which is activated by outgoing traffic, and 
for which ports are only forwarded while the trigger is active.   
 
Few applications truly require the use of the DMZ host. Following are examples of when a   
 
DMZ host might be required:   

 A host needs to support several applications that might use overlapping ingress ports such 

that two port forwarding rules cannot be used because they would potentially be in conflict.   

 To handle incoming connections that use a protocol other than ICMP, TCP, UDP, and IGMP 

(also GRE and ESP, when these protocols are enabled by the PPTP and IPSec   

 
Enable DMZ   

Putting a computer in the DMZ may expose that computer to a variety of security risks. Use of 
this option is only recommended as a last resort.   

 
DMZ IP Address   

Specify the LAN IP address of the LAN computer that you want to have unrestricted Internet 
communication.  

Summary of Contents for TEW-691GR

Page 1: ... must accept any interference received including interference that may cause undesired operation IMPORTANT NOTE FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment This equipment should be installed and operated with minimum distance 20cm between the radiator your body This transmitter must not be co located or opera...

Page 2: ...ES Dansk Danish Undertegnede fabrikantens navn erklærer herved at følgende udstyr udstyrets typebetegnelse overholder de væsentlige krav og øvrige relevante krav i direktiv 1999 5 EF Deutsch German Hiermit erklärt Name des Herstellers dass sich das Gerät Gerätetyp in Übereinstimmung mit den grundlegenden Anforderungen und den übrigen einschlägigen Bestimmungen der Richtlinie 1999 5 EG befindet Ees...

Page 3: ... Portuguese Nome do fabricante declara que este tipo de equipamento está conforme com os requisitos essenciais e outras disposições da Directiva 1999 5 CE Slovensko Slovenian Ime proizvajalca izjavlja da je ta tip opreme v skladu z bistvenimi zahtevami in ostalimi relevantnimi določili direktive 1999 5 ES Slovensky Slovak Meno výrobcu týmto vyhlasuje že typ zariadenia spĺňa základné požiadavky a v...

Page 4: ...9 3 3 Installation Considerations 10 3 4 Getting Started 10 4 Using the Configuration Menu 11 4 1 Network 12 4 1 1 Network WAN Setting 12 4 1 2 Network LAN Setting 15 4 1 3 Network QoS 18 4 1 4 Network DHCP Client List 19 4 2 Wireless 20 4 2 1 Wireless Basic 20 4 2 2 Wireless Advanced 23 4 2 3 Wireless Security 25 4 2 4 Wireless WPS 28 4 2 5 Wireless Station List 30 4 3 Advanced 31 4 3 1 Advanced ...

Page 5: ...ed Gaming 40 4 3 7 Advanced Inbound Filter 42 4 3 8 Advanced Schedule 43 4 3 9 Advanced Advanced Network 44 4 4 Administrator 45 4 4 1 Administrator Management 45 4 4 2 Administrator Upload Firmware 47 4 4 3 Administrator Setting Management 48 4 4 4 Administrator Time 49 4 4 5 Administrator Status 50 4 5 Help 51 ...

Page 6: ...User s Guide z Multi Language Quick Installation Guide z CAT 5 Ethernet Cable z Power Adapter 12V 1A Using a power supply with a different voltage than the one included with your product will cause damage and void the warranty for this product 1 2 Minimum System Requirements z Ethernet Based Cable or DSL Modem z Computers with Windows Macintosh or Linux based operating systems with an installed Et...

Page 7: ...transmission rate 2 1 Introduction The TEW 691GR 2 4GHz 450Mbps Wireless N Gigabit Router is an high performance wireless router that supports high speed wireless networking at home at work or in public places Unlike most routers the TEW 691GR provides data transfers at up to 450Mbps when using 11n connection This router is also back compatible with 802 11g or 11b devices This means that you do no...

Page 8: ...rol IP Port range blocking Supports IPSec L2TP and PPTP VPN Pass Through Sessions Easy wireless setup via PBC or PIN of Wi Fi Protected Setup Support 4 x 10 100 1000Mbps Auto MDIX LAN Port and 1 x 10 100 1000Mbps Auto MDIX WAN Port Internet Built in 3 external antennas to support high speed performance and great coverage Window 7 compliance Support Video Turbine to get better performance Phase II ...

Page 9: ... Hardware Overview 3 1 LED Indications from left to right WPS WLAN Reserve LAN1 LAN2 LAN3 LAN4 WAN PWR 3 2 Rear panel from left to right DC IN RESET Power switch Wi Fi on off switch WAN LAN1 LAN2 LAN3 LAN4 ...

Page 10: ...45 degree angle appears to be almost 3 feet 1 meter thick At a 2 degree angle it looks over 42 feet 14 meters thick Position devices so that the signal will travel straight through a wall or ceiling instead of at an angle for better reception 3 Building Materials can impede the wireless signal a solid metal door or aluminum studs may have a negative effect on range Try to position wireless devices...

Page 11: ...nd typing in the IP Address of the TEW 691GR The TEW 691GR s default IP Address is http 192 168 10 1 Open the Web browser Type in the IP Address of the Router http 192 168 10 1 If you have changed the default IP Address assigned to the TEW 691GR make sure to enter the correct IP Address Select admin in the User Name field Leave the Password blank Click Login In ...

Page 12: ...information DHCP A method of connection where the ISP assigns your IP address when your router requests one from the ISP s server Host Name Some ISP s may check your computer s Host Name The Host Name identifies your system to the ISP s server PPPoE Select this option if your ISP requires you to use a PPPoE Point to Point Protocol over Ethernet connection DSL providers typically use this option Th...

Page 13: ...eway Dynamic If the ISP s servers assign the router s IP addressing upon establishing a connection select this option PPTP PPTP Point to Point Tunneling Protocol uses a virtual private network to connect to your ISP This method of connection is primarily used in Europe This method of connection requires you to enter a Username and Password provided by your Internet Service Provider to gain access ...

Page 14: ...onnections In either case network performance can suffer t modes MAC Address Clone Each networking device has it s own unique MAC address defined by the hardware manufacturer Some ISP s may check your computer s MAC address Some ISP s record the MAC address of the network adapter in the computer or router used to initially connect to their service The ISP will then only grant Internet access to re...

Page 15: ...ng IP Address The IP address of the this device on the local area network Assign any unused IP address in the range of IP addresses available for the LAN Subnet Mask The subnet mask of the local area network DHCP Server Settings ...

Page 16: ...twork Gateway The IP address of the router on the local area network For example 192 168 10 1 DHCP Lease Time The amount of time that a computer may have an IP address before it is required to renew the lease The lease functions just as a lease on an apartment would The initial lease designates the amount of time before the lease expires If the tenant wishes to retain the address when the lease is...

Page 17: ...screen discarding any changes you have made DHCP Reservations List This shows clients that you have specified to reserve DHCP addresses Click the Enable checkbox at the left to directly activate or de activate the entry An entry can be changed by clicking the Edit icon or can be deleted by clicking the Delete icon When you click the Edit icon the item is highlighted and the Edit DHCP Reservation s...

Page 18: ...18 4 1 3 Network QoS ...

Page 19: ...19 4 1 4 Network DHCP Client List In this section you can see the connected LAN devices are currently receiving an IP addresses ...

Page 20: ...reless devices you want to connect with this router can connect in the same transmission mode you can improve performance slightly by choosing the appropriate wireless mode If you have some devices that use a different transmission mode choose the appropriate wireless mode The TEW 691GR supports 2 4GHz wireless networks There are many different configuration options available to choose from Use th...

Page 21: ...Status is set to Invisible see below This name is also referred to as the SSID For security purposes it is highly recommended to change from the pre configured network name Add up to three additional SSIDs to create virtual wireless networks from one wireless Router Access Point device Add Additional Wireless Network Name SSID To add additional wireless Network Names simply add the name to the Mul...

Page 22: ...legacy compatible part Channel BandWidth Set channel width of wireless radio 20 20 40 20 Channel Width 20 MHz 20 40 Channel Width 20 40 MHz Guard Interval Support Short Long GI the purpose of the guard interval is to introduce immunity to propagation delays echoes and reflections to which digital data is normally very sensitive Long Auto Long Guard Interval 800 nsec Short Guard Interval 400 nsec M...

Page 23: ...ntation will occur when frame size in bytes is greater than the Fragmentation Threshold This setting should remain at its default value of 2346 bytes Setting the Fragmentation value too low may result in poor performance RTS Threshold When an excessive number of wireless packet collisions are occurring wireless performance can be improved by using the RTS CTS Request to Send Clear to Send handshak...

Page 24: ...se efficiency by aggregating multiple packets of application data into a single transmission frame In this way 802 11n networks can send multiple data packets with the fixed overhead cost of just a single frame ...

Page 25: ...ncryption requires a longer key than 64 bit encryption Keys are defined by entering in a string in HEX hexadecimal using characters 0 9 A F or ASCII American Standard Code for Information Interchange alphanumeric characters format ASCII format is provided so you can enter a string that is easier to remember The ASCII string is converted to HEX for use over the network Four keys can be defined so t...

Page 26: ...IUS Server to authenticate wireless clients Wireless clients should have established the necessary credentials before attempting to authenticate to the Server through this Gateway Furthermore it may be necessary to configure the RADIUS Server to allow this Gateway to authenticate users Authentication Timeout Amount of time before a client will be required to re authenticate RADIUS Server IP Addres...

Page 27: ...27 for WPA AES means the unicast and multicast key are all AES TKIP AES means multicast is TKIP But unicast can be AES or TKIP which depends on the peer ...

Page 28: ...28 4 2 4 Wireless WPS ...

Page 29: ...ou can restore the default PIN at any time Only the Administrator admin account can change or reset the PIN Current PIN Shows the current value of the router s PIN Reset To WPS Default Restore the default PIN of the router Generate New PIN Create a random number that is a valid PIN This becomes the router s PIN You can then copy this PIN to the user interface of the registrar PBC Settings The push...

Page 30: ...30 4 2 5 Wireless Station List All the wireless clients connecting to the router will be shown here you could monitor your network and prevent any unauthorized wireless connection easily ...

Page 31: ...ion the DMZ host is effectively outside the firewall Anyone considering using a DMZ host should also consider running a firewall on that DMZ host system to provide additional protection Packets received by the DMZ host have their IP addresses translated from the WAN side IP address of the router to the LAN side IP address of the DMZ host However port numbers are not translated so applications on t...

Page 32: ...pping ingress ports such that two port forwarding rules cannot be used because they would potentially be in conflict To handle incoming connections that use a protocol other than ICMP TCP UDP and IGMP also GRE and ESP when these protocols are enabled by the PPTP and IPSec Enable DMZ Putting a computer in the DMZ may expose that computer to a variety of security risks Use of this option is only rec...

Page 33: ...twork that will provide the virtual service for example 192 168 10 50 You can select a computer from the list of DHCP clients in the Computer Name drop down menu or you can manually enter the IP address of the server computer Protocol Select the protocol used by the service The common choices UDP TCP and both UDP and TCP can be selected from the drop down menu To specify any other protocol select ...

Page 34: ...4 Select a schedule for when the service will be enabled If you do not see the schedule you need in the list of schedules Clear Re initialize this area of the screen discarding any changes you have made ...

Page 35: ...nected to the router on the interface specified LAN or WAN Metric The route metric is a value from 1 to 16 that indicates the cost of using this route A value of 1 is the lowest cost and 15 is the highest cost A value of 16 indicates that the route is not reachable from this router When trying to reach a particular destination computers on your network will select the best route ignoring unreachab...

Page 36: ...tain required routes are predefined and cannot be changed Routes that you add can be changed by clicking the Edit icon or can be deleted by clicking the Delete icon When you click the Edit icon the item is highlighted and the Edit Route section is activated for editing Click the Enable checkbox at the left to directly activate or de activate the entry ...

Page 37: ... check this option Note When Access Control is disabled every device on the LAN has unrestricted access to the Internet However if you enable Access Control Internet access is restricted for those devices that have an Access Control Policy configured for them All other devices have unrestricted access to the Internet ...

Page 38: ...e for example Game App which will help you identify the rule in the future Alternatively you can select from the Application list of common applications Protocol Select the protocol used by the service The common choices UDP TCP and both UDP and TCP can be selected from the drop down menu Trigger Port Enter the outgoing port range used by your application for example 6500 6700 ...

Page 39: ...he screen discarding any changes you have made Port Trigger Rule List This is a list of the defined application rules Click the Enable checkbox at the left to directly activate or de activate the entry An entry can be changed by clicking the Edit icon or can be deleted by clicking the Delete icon ...

Page 40: ...ordingly However you should check whether the port values have changed since this list was created and you must fill in the IP address field IP Address Enter the local network IP address of the system hosting the server for example 192 168 10 50 You can select a computer from the list of DHCP clients in the Computer Name drop down menu or you can manually enter the IP address of the server compute...

Page 41: ...ange Rule List This is a list of the defined Port Range Rules Click the Enable checkbox at the left to directly activate or de activate the entry An entry can be changed by clicking the Edit icon or can be deleted by clicking the Delete icon When you click the Edit icon the item is highlighted and the Edit Port Forwarding Rule section is activated for editing ...

Page 42: ...ic entries in the list of ranges Clear Re initialize this area of the screen discarding any changes you have made Inbound Filter Rules List The section lists the current Inbound Filter Rules An entry can be changed by clicking the Edit icon or can be deleted by clicking the Delete icon When you click the Edit icon the item is highlighted and the Edit Inbound Filter Rule section is activated for ed...

Page 43: ...rt time is entered in two fields The first box is for the hour and the second box is for the minute Email events are normally triggered only by the start time End Time The end time is entered in the same format as the start time The hour in the first box and the minutes in the second box The end time is used for most other rules but is not normally used for email events Clear Re initialize this ar...

Page 44: ...44 4 3 9 Advanced Advanced Network ...

Page 45: ...4 4 1 Administrator Management Admin Password Enter a password for the user admin who will have full access to the Web based management interface Device Name The name of the router can be changed here Enable Dynamic DNS ...

Page 46: ...dynamic DNS service provider from the pull down list Host Name Enter your host name fully qualified for example myhost mydomain net Account Enter the account provided by your service provider If the Dynamic DNS provider supplies only a key enter that key in all three fields Password Enter the password provided by your service provider If the Dynamic DNS provider supplies only a key enter that key ...

Page 47: ...47 4 4 2 Administrator Upload Firmware Once you have a firmware update on your computer use this option to browse for the file and then upload the information into the router ...

Page 48: ...to restore previously saved router configuration settings Load Factory Defaults This option restores all configuration settings back to the settings that were in effect at the time the router was shipped from the factory Any settings that have not been saved will be lost If you want to save your router configuration settings use the Export Settings option above System Reboot This restarts the rout...

Page 49: ...Time Server over the Internet If you are using schedules or logs this is the best way to ensure that the schedules and logs are kept accurate Note that even when NTP Server is enabled you must still choose a time zone and set the daylight saving parameters NTP Server Used Select a Network Time Server for synchronization You can type in the address of a time server or select one from the list If yo...

Page 50: ...50 4 4 5 Administrator Status The device status ...

Page 51: ...51 4 4 Help Help section provides web based explanations on each configurable field ...

Page 52: ...that allows administrators to assign temporary IP addresses to network computers by leasing an IP address to a user for a limited amount of time instead of assigning permanent IP addresses DMZ Demilitarized Zone Removes the Router s firewall protection from one PC allowing it to be seen from the Internet DNS Domain Name Server The IP address of your ISP s server which translates the names of websi...

Page 53: ...to a different IP address for the Internet Packet A unit of data sent over a network Passphrase Used much like a password a passphrase simplifies the WEP encryption process by automatically generating the WEP encryption keys for Linksys products Ping Packet Internet Groper An Internet utility used to determine whether a particular IP address is online POP3 Post Office Protocol 3 A standard mail se...

Page 54: ...ate over a network Telnet A user command and TCP IP protocol used for accessing remote PCs TFTP Trivial File Transfer Protocol A version of the TCP IP FTP protocol that has no directory or password capability Throughput The amount of data moved successfully from one node to another in a given time period TKIP Temporal Key Integrity Protocol a wireless encryption protocol that provides dynamic encr...

Page 55: ...rn Material Authorization RMA number accompanied by a copy of the dated proof of the purchase Products returned to TRENDnet must be pre authorized by TRENDnet with RMA number marked on the outside of the package and sent prepaid insured and packaged appropriately for safe shipment WARRANTIES EXCLUSIVE IF THE TRENDNET PRODUCT DOES NOT OPERATE AS WARRANTED ABOVE THE CUSTOMER S SOLE REMEDY SHALL BE A...

Page 56: ...Warranty shall be governed by the laws of the state of California Note AC DC Power Adapter Cooling Fan Cables and Power Supply carry 1 Year Warranty Some TRENDnet products include software code written by third party developers These codes are subject to the GNU General Public License GPL or GNU Lesser General Public License LGPL Go to http www trendnet com gpl or http www trendnet com Download se...

Reviews: