background image

49 

Advanced: Virtual Server 

 

 

 

Summary of Contents for TEW-811DRU

Page 1: ...802 11ac draft 2 0 TEW 811DRU Gigabit Wireless Router TEW 811DRU Rev 0 1 User Manual...

Page 2: ...Caution Any changes or modifications not expressly approved by the party responsible for compliance could void the user s authority to operate this equipment This device complies with Part 15 of the...

Page 3: ...omagnetic compatibility and Radio Spectrum Matters ERM ElectroMagnetic Compatibility EMC standard for radio equipment and services Part 1 Common technical requirements EN 301 489 17 V2 1 1 2009 05 Ele...

Page 4: ...3 output power may be limited to 10 mW EIRP in the frequency range of 2454 2483 5 MHz For detailed information the end user should contact the national spectrum authority in France...

Page 5: ...requirements and other relevant provisions of Directive 1999 5 EC Espa ol Spanish Por medio de la presente nombre del fabricante declara que el clase de equipo cumple con los requisitos esenciales y c...

Page 6: ...rme com os requisitos essenciais e outras disposi es da Directiva 1999 5 CE Slovensk o Slovenian Ime proizvajalca izjavlja da je ta tip opreme v skladu z bistvenimi zahtevami in ostalimi relevantnimi...

Page 7: ...60950 Product Safety EN 300 328 Technical requirement for radio equipment EN 301 489 1 17 General EMC requirements for radio equipment EN 301 893 V1 5 1 2008 12 Trademark recognition All product name...

Page 8: ...ing conventions are used in this manual THE NOTE SYMBOL INDICATES ADDITIONAL INFORMATION ON THE TOPIC AT HAND THE TIP SYMBOL INDICATES HELPFULL INFORMATION AND TIPS TO IMPROVE YOUR NETWORK EXPERIENCE...

Page 9: ...ick Installation Guide Using a power supply with a different voltage than the one included with your product will cause damage and void the warranty for this product Minimum System Requirements Ethern...

Page 10: ...n data rate again until it reaches the highest available transmission rate Types of Wireless Networks Wireless LAN networking works in either of the two modes ad hoc and infrastructure In infra struct...

Page 11: ...10...

Page 12: ...m below communication is done through the access points which relay data packets to other wireless stations or devices connected to the wired network Wireless stations can then access resources such a...

Page 13: ...12 connection In the diagram below when the user moves from BSS 1 to BSS 2 the WLAN client devices automatically switches to the channel used in BSS 2 Roaming in an ESS network diagram...

Page 14: ...ards compatible with IEEE 802 11a b g n wireless standards High speed data rates up to 867Mbps with 802 11ac and 300Mbps with 802 11n IPv6 Internet Protocol v6 basic function support Supports USB file...

Page 15: ...s Actual data throughput and coverage will vary depending on interference network traffic building materials and other conditions For maximum performance of up to 867Mbps please use with a 2x2 802 11a...

Page 16: ...k 5 meters at a 45 degree angle appears to be almost 3 feet 1 meter thick At a 2 degree angle it looks over 42 feet 14 meters thick Position devices so that the signal will travel straight through a w...

Page 17: ...rt 1 Plug in the power adapter and verify the Power Ethernet LEDs are light 3 To configure the router open your browser type http tew 811dru into the address bar and click Go to get to the setup wizar...

Page 18: ...the User name is admin and password is admin Enter default username and password and press ok Setup Wizard is an easy way to set up the TEW 811DRU step by step The Wizard will teach user to set up th...

Page 19: ...18 5 You could click Launch Internet ConnectionSetup Wizard and follow Wizard to complete your setting example...

Page 20: ...19 If you choice Static IP Address Connection than press Next...

Page 21: ...20...

Page 22: ...21 Then press Apply...

Page 23: ...22 6 You also could click Launch Wireless Security Setup Wizard and follow Wizard to complete your setting example...

Page 24: ...23 Select the 2 4G 5G security mode Enter your password...

Page 25: ...24 Press Apply...

Page 26: ...25 Set up completed...

Page 27: ...t Protocol over Ethernet connection DSL providers typically use this option This method of connection requires you to enter a Username and Password provided by your Internet Service Provider to gain a...

Page 28: ...PPTP Point to Point Tunneling Protocol uses a virtual private network to connect to your ISP This method of connection is primarily used in Europe This method of connection requires you to enter a Use...

Page 29: ...uests from a computer or router with this particular MAC address This router has a different MAC address than the computer or router that initially connected to the ISP If you need to change the MAC a...

Page 30: ...ther network configuration information for computers and other devices connected to your Local Area Network There is no need for you to do this yourself The computers and other devices connected to yo...

Page 31: ...ress before it is required to renew the lease The lease functions just as a lease on an apartment would The initial lease designates the amount of time before the lease expires If the tenant wishes to...

Page 32: ...4 network through the automatic tunneling technology and routes traffic between 6to4 and IPv6 networks Native IPv6 only Native IPv6 refers to the network where IPv6 is the only transport protocol runn...

Page 33: ...32 Specifies in hexadecimal notation a subnet ID other than 0 Network QoS...

Page 34: ...raffic should receive relative to other applications and traffic when accessing the Internet Inbound class Setting For user to limit downlink bandwidth Outbound Class Setting For user to limit Min Max...

Page 35: ...34 Network DHCP Client List In this section you can see the connected LAN devices are currently receiving an IP addresses...

Page 36: ...35 Wireless Wireless Basic...

Page 37: ...less networks from one wireless Router Access Point device Add Additional Wireless Network Name SSID To add additional wireless Network Names simply add the name to the Multiple SSID field and click o...

Page 38: ...apply your setting changes Enable the security seeing in security page each WDS APs need to use same security setting Note WDS supports wireless g n modes The use multiple Access Point will reduces th...

Page 39: ...d broadcast or multicast messages for associated clients it sends the next DTIM with a DTIM Interval value Wireless clients detect the beacons and awaken to receive the broadcast and multicast message...

Page 40: ...handshake protocol The wireless transmitter will begin to send RTS frames and wait for CTS when data frame size in bytes is greater than the RTS Threshold This setting should remain at its default val...

Page 41: ...40 Wireless Security...

Page 42: ...otocol provides per packet key generation and is based on WEP AES Advanced Encryption Standard is a very secure block based encryption With the TKIP and AES option the router negotiates the cipher typ...

Page 43: ...lect a device from the drop down menu The rule of thumb In mixed mode multicast key has to be TKIP but unicast key can be different per stations In WPA or WPA2 only mode unicast and multicast key can...

Page 44: ...t needing to expose private Wi Fi access codes or other personal data A guest network is a small section of an organization s computer network designed for use by temporary visitors Besides helping to...

Page 45: ...44 Wireless WPS Enable Enable the WPS feature...

Page 46: ...new PIN can be generated You can restore the default PIN at any time Only the Administrator admin account can change or reset the PIN Current PIN Shows the current value of the router s PIN Reset To...

Page 47: ...46 Wireless Station List All the wireless clients connecting to the router will be shown here you could monitor your network and prevent any unauthorized wireless connection easily...

Page 48: ...ion on that computer When a LAN host is configured as a DMZ host it becomes the destination for all incoming packets that do not match some other incoming session or rule If any other ingress rule is...

Page 49: ...to cyberattacks than any other system on the LAN Thought should be given to using other configurations instead a virtual server a port forwarding rule or a port trigger Virtual servers open one port...

Page 50: ...49 Advanced Virtual Server...

Page 51: ...puter Name drop down menu or you can manually enter the IP address of the server computer Protocol Select the protocol used by the service The common choices UDP TCP can be selected from the drop down...

Page 52: ...51 Advanced Routing Add Edit Route Adds a new route to the IP routing table or edits an existing route Destination IP The IP address of packets that will take this route Gateway...

Page 53: ...our network will select the best route ignoring unreachable routes Interface Specifies the interface LAN or WAN that the IP packet must use to transit out of the router when this route is used Clear R...

Page 54: ...53 Advanced Access Control...

Page 55: ...54 Enable By default the Access Control feature is disabled If you need Access Control check this option...

Page 56: ...e on the LAN has unrestricted access to the Internet However if you enable Access Control Internet access is restricted for those devices that have an Access Control Policy configured for them All oth...

Page 57: ...56 ALG Application Level Gatwway ALG By default the ALG feature is enabled ALG configuration allows users to disable some application service...

Page 58: ...57 Advanced Special Applications...

Page 59: ...oices UDP TCP and both UDP and TCP can be selected from the drop down menu Trigger Port Enter the outgoing port range used by your application for example 6500 6700 Schedule Select a schedule for when...

Page 60: ...59 Advanced Gaming...

Page 61: ...for example 192 168 10 50 You can select a computer from the list of DHCP clients in the Computer Name drop down menu or you can manually enter the IP address of the server computer TCP Ports to Open...

Page 62: ...61 Advanced Filter Add Edit Filter Rule Here you can add entries to the Filter Rules List below or edit existing entries Action The rule can either Allow or Deny messages Filter Rules List...

Page 63: ...t icon the item is highlighted and the Edit Filter Rule section is activated for editing In addition to the filters listed here two predefined filters are available wherever filters can be applied All...

Page 64: ...63 Advanced Schedule...

Page 65: ...enter the time here The start time is entered in two fields The first box is for the hour and the second box is for the minute Email events are normally triggered only by the start time End Time The e...

Page 66: ...rily residential networks without enterprise class devices that permits networked devices such as personal computers printers Internet gateways Wi Fi access points and mobile devices to seamlessly dis...

Page 67: ...66 By default the WAN Ping Respond feature is disabled Enable WAN Ping Respond will reply information of router to outside network Administrator Administrator Management...

Page 68: ...67...

Page 69: ...following parameters are displayed when the option is enabled Dynamic DNS Provider Select a dynamic DNS service provider from the pull down list Host Name Enter your host name fully qualified for exa...

Page 70: ...69 Administrator Upload Firmware Once you have a firmware update on your computer use this option to browse for the file and then upload the information into the router...

Page 71: ...estore previously saved router configuration settings Load Factory Defaults This option restores all configuration settings back to the settings that were in effect at the time the router was shipped...

Page 72: ...71 Administrator file sharing...

Page 73: ...72...

Page 74: ...g data from computers on a network to be accessed by other computers on the network with different levels of access rights User Account List Enter username password of each computer and setting permis...

Page 75: ...utomatic Time Configuration Enable NTP Server Select this option if you want to synchronize the router s clock to a Network Time Server over the Internet If you are using schedules or logs this is the...

Page 76: ...n type in the address of a time server or select one from the list If you have trouble using one server select another Set the Date and Time Manually If you do not have the NTP Server option in effect...

Page 77: ...76 Administrator System log This page can be used to set remote log server and show the system log...

Page 78: ...77 Administrator Status...

Page 79: ...78 The device status...

Page 80: ...k ActiveX A Microsoft specification for the interaction of software components Address Resolution Protocol ARP Used to map MAC addresses to IP addresses so that conversions can be made in both directi...

Page 81: ...order to verify that the person or device is really who they are claiming to be Automatic Private IP Addressing APIPA An IP address that that a Windows computer will assign itself when it is configur...

Page 82: ...ections at once Browser A program that allows you to access resources on the web and provides them to you graphically C Cable modem A device that allows you to connect a computer up to a coaxial cable...

Page 83: ...anaged updated as well as easily accessed by users or applications Data Link layer The second layer of the OSI model Controls the movement of data on the physical link of a network DB 25 A 25 ping mal...

Page 84: ...e DMZ computer trades some of the protection of the router s security mechanisms for the convenience of being directly addressable from the Internet DNS Domain Name System Translates Domain Names to I...

Page 85: ...s over glass or plastic wire or fiber File server A computer on a network that stores data so that the other computers on the network can all access it File sharing Allowing data from computers on a n...

Page 86: ...standard that provides consistency of voice and video transmissions and compatibility for videoconferencing devices Half duplex Data cannot be transmitted and received at the same time Hashing Transfo...

Page 87: ...ensure security for VPN connections Infrastructure In terms of a wireless network this is when wireless clients use an Access Point to gain access to the network Internet A system of worldwide networ...

Page 88: ...puter that transmits data on the Internet or on an Intranet IPsec Internet Protocol Security IPX Internetwork Packet Exchange is a networking protocol developed by Novel to enable their Netware client...

Page 89: ...e manufacturer Mbps Megabits per second MDI Medium Dependent Interface is an Ethernet port for a connection to a straight through cable MDIX Medium Dependent Interface Crossover is an Ethernet port fo...

Page 90: ...d version of NetBIOS NetBIOS Network Basic Input Output System Netmask Determines what portion of an IP address designates the Network and which part designates the Host Network Interface Card A card...

Page 91: ...rs Physical layer The first layer of the OSI model Provides the hardware means of transmitting electrical signals on a data carrier Ping A utility program that verifies that a given Internet address e...

Page 92: ...rces on a network Reboot To restart a computer and reload it s operating software or firmware from nonvolatile storage Rendezvous Apple s version of UPnP which allows for devices on a network to disco...

Page 93: ...n between applications on both ends Simple Mail Transfer Protocol Used for sending and receiving email Simple Network Management Protocol Governs the management and monitoring of network devices SIP S...

Page 94: ...different sources Originally written for UNIX it is now available for other operating systems including Windows T TCP Transmission Control Protocol TCP Raw A TCP IP protocol for transmitting streams o...

Page 95: ...computer to the other UPnP Universal Plug and Play URL Uniform Resource Locator is a unique address for files accessible on the Internet USB Universal Serial Bus UTP Unshielded Twisted Pair V Virtual...

Page 96: ...be comparable to that of a wired network Wide Area Network The larger network that your LAN is connected to which may be the Internet itself or a regional or corporate network Wi Fi Wireless Fidelity...

Page 97: ...SL A generic term for the family of digital subscriber line DSL technologies such as ADSL HDSL RADSL and SDSL Y Yagi antenna A directional antenna used to concentrate wireless signals on a specific lo...

Reviews: