background image

21 

 

The device status. 

Management: 

 

Summary of Contents for TEW-815DAP

Page 1: ...802 11ac draft 2 0 TEW 815DAP Wireless Access Point TEW 815DAP Rev 0 1 User Manual ...

Page 2: ...ferent from that to which the receiver is connected z Consult the dealer or an experienced radio TV technician for help FCC Caution Any changes or modifications not expressly approved by the party responsible for compliance could void the user s authority to operate this equipment This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device ...

Page 3: ...romagnetic compatibility and Radio Spectrum Matters ERM ElectroMagnetic Compatibility EMC standard for radio equipment and services Part 1 Common technical requirements EN 301 489 17 V2 1 1 2009 05 Electromagnetic compatibility and Radio spectrum Matters ERM ElectroMagnetic Compatibility EMC standard for radio equipment Part 17 Specific conditions for 2 4 GHz wideband transmission systems 5 GHz hi...

Page 4: ...3 output power may be limited to 10 mW EIRP in the frequency range of 2454 2483 5 MHz For detailed information the end user should contact the national spectrum authority in France ...

Page 5: ...5 EC Español Spanish Por medio de la presente nombre del fabricante declara que el clase de equipo cumple con los requisitos esenciales y cualesquiera otras disposiciones aplicables o exigibles de la Directiva 1999 5 CE Ελληνική Greek ΜΕ ΤΗΝ ΠΑΡΟΥΣΑ name of manufacturer ΔΗΛΩΝΕΙ ΟΤΙ type of equipment ΣΥΜΜΟΡΦΩΝΕΤΑΙ ΠΡΟΣ ΤΙΣ ΟΥΣΙΩΔΕΙΣ ΑΠΑΙΤΗΣΕΙΣ ΚΑΙ ΤΙΣ ΛΟΙΠΕΣ ΣΧΕΤΙΚΕΣ ΔΙΑΤΑΞΕΙΣ ΤΗΣ ΟΔΗΓΙΑΣ 1999 5 ΕΚ...

Page 6: ...rme com os requisitos essenciais e outras disposições da Directiva 1999 5 CE Slovensk o Slovenian Ime proizvajalca izjavlja da je ta tip opreme v skladu z bistvenimi zahtevami in ostalimi relevantnimi določili direktive 1999 5 ES Slovensk y Slovak Meno výrobcu týmto vyhlasuje že typ zariadenia spĺňa základné požiadavky a všetky príslušné ustanovenia Smernice 1999 5 ES Suomi Finnish Valmistaja manu...

Page 7: ...60950 Product Safety z EN 300 328 Technical requirement for radio equipment z EN 301 489 1 17 General EMC requirements for radio equipment z EN 301 893 V1 5 1 2008 12 Trademark recognition All product names used in this manual are the properties of their respective owners and are acknowledged ...

Page 8: ...wing conventions are used in this manual THE NOTE SYMBOL INDICATES ADDITIONAL INFORMATION ON THE TOPIC AT HAND THE TIP SYMBOL INDICATES HELPFULL INFORMATION AND TIPS TO IMPROVE YOUR NETWORK EXPERIENCE THE CAUTION SYMBOL ALERTS YOU TO SITUATIONS THAT MAY DEGRADE YOUR NETWORKING EXPERIENCE OR COMPROMISE LIKE NOTES AND TIPS THE IMPORTANT SYMBOL INDICATES INFORMATION THAT CAN IMPROVE NETWORKING THIS I...

Page 9: ...l z Quick Installation Guide Using a power supply with a different voltage than the one included with your product will cause damage and void the warranty for this product Minimum System Requirements z Ethernet Based Cable or DSL Modem z Computers with Windows Macintosh or Linux based operating systems with an installed Ethernet adapter and CD ROM Drive z Internet Explorer Version 6 0 or higher Mo...

Page 10: ...on data rate again until it reaches the highest available transmission rate Types of Wireless Networks Wireless LAN networking works in either of the two modes ad hoc and infrastructure In infra structure mode wireless devices communicate to a wired LAN via access points Each access point and its wireless devices are known as a Basic Service Set BSS An Extended Service Set ESS is two or more BSSs ...

Page 11: ...10 ...

Page 12: ...am below communication is done through the access points which relay data packets to other wireless stations or devices connected to the wired network Wireless stations can then access resources such as a printer on the wired network In an ESS environment users are able to move from one access point to another without losing the ...

Page 13: ...12 connection In the diagram below when the user moves from BSS 1 to BSS 2 the WLAN client devices automatically switches to the channel used in BSS 2 Roaming in an ESS network diagram ...

Page 14: ...itch CE version only Supports simultaneous 2 4GHz 5GHz wireless networks Compliant with the latest draft 802 11ac wireless technology Backwards compatible with IEEE 802 11a b g n wireless standards High speed data rates up to 1300Mbps with 802 11ac and 450Mbps with 802 11n IPv6 Internet Protocol v6 basic function support Supports Wireless Distribution System WDS for wireless network bridging Advan...

Page 15: ...he TEW 815DAP and other network devices to a minimum each wall or ceiling can reduce your wireless product s range from 3 90 feet 1 30 meters Position your devices so that the number of walls or ceilings is minimized 2 Be aware of the direct line between network devices A wall that is 1 5 feet thick 5 meters at a 45 degree angle appears to be almost 3 feet 1 meter thick At a 2 degree angle it look...

Page 16: ...Cable or DSL modem to the TEW 815DAP Access Point WAN port 4 Ethernet LAN ports of the TEW 815DAP are Auto MDI MDIX and will work with both Straight Through and Cross Over cable Start 1 Plug in the power adapter and verify the Power Ethernet LEDs are light 2 To configure the Access Point open your browser type http 192 168 10 1 into the address bar 3 At the Password prompt the User name is admin a...

Page 17: ...16 Network Status Show your network status ...

Page 18: ...reless Setting You could configure the minimum number of Wireless settings for communication such as Network Name SSID and Security Mode The Access Point can be set simply with only the minimum setting items ...

Page 19: ...18 ...

Page 20: ...19 Administrator Status ...

Page 21: ...20 ...

Page 22: ...21 The device status Management ...

Page 23: ...ynamic DNS service provider The following parameters are displayed when the option is enabled Dynamic DNS Provider Select a dynamic DNS service provider from the pull down list Host Name Enter your host name fully qualified for example myhost mydomain net Account Enter the account provided by your service provider If the Dynamic DNS provider supplies only a key enter that key in all three fields P...

Page 24: ...23 Upload Firmware Once you have a firmware update on your computer use this option to browse for the file and then upload the information into the Access Point ...

Page 25: ...t Settings Use this option to restore previously saved Access Point configuration settings Load Factory Defaults This option restores all configuration settings back to the settings that were in effect at the time the Access Point was shipped from the factory Any settings that have not been saved will be lost If you want to save your Access Point configuration settings use the Export Settings opti...

Page 26: ...25 This restarts the Access Point It is useful for restarting when you are not near the device ...

Page 27: ...26 Status The device status ...

Page 28: ...27 IPv6 Status System log ...

Page 29: ...28 This page can be used to set remote log server and show the system log ...

Page 30: ...ea network Assign any unused IP address in the range of IP addresses available for the LAN Subnet Mask The subnet mask of the local area network Subnet Mask The subnet mask of the local area network Gateway The IP address of the Access Point on the local area network For example 192 168 10 1 IP Address The LAN address that you want to reserve ...

Page 31: ...ker on the bottom of a network device The MAC address is comprised of twelve digits Each pair of hexadecimal digits are usually separated by dashes or colons such as 00 0D 88 11 22 33 or 00 0D 88 11 22 33 If your network device is a computer and the network card is already located inside the computer you can connect to the Access Point from the computer and click the Copy Your PC s MAC Address but...

Page 32: ...ng technology and routes traffic between 6to4 and IPv6 networks Native IPv6 only Native IPv6 refers to the network where IPv6 is the only transport protocol running 6to4 Native IPv6 Support 6to4 and Native IPv6 simultaneously DNS server User need to key in the IPv6 DNS server address which is provided by ISP 6to4 subnet ID Specifies in hexadecimal notation a subnet ID other than 0 ...

Page 33: ...int can be set simply with only the minimum setting items Wireless Network Name SSID When you are browsing for available wireless networks this is the name that will appear in the list unless Visibility Status is set to Invisible see below This name is also referred to as the SSID For security purposes it is highly recommended to change from the pre configured ...

Page 34: ...security standard With the WPA2 option the Access Point tries WPA2 first but falls back to WPA if the client only supports WPA With the WPA2 Only option the Access Point associates only with clients that also support WPA2 security Cipher Type The encryption algorithm used to secure the data communication TKIP Temporal Key Integrity Protocol provides per packet key generation and is based on WEP AE...

Page 35: ...en WDS is enabled this access point functions as a wireless repeater and is able to wirelessly communicate with other APs via WDS links A WDS link is bidirectional so this AP must know the MAC Address creates the WDS link of the other AP and the other AP must have a WDS link back to this AP Make sure the APs are configured with same channel ...

Page 36: ...ress of the wireless device that also supports WDS in to the blank fields You can add up to four additional devices in the spaces provided Click on apply at the bottom of the page to apply your setting changes Enable the security seeing in security page each WDS APs need to use same security setting Note WDS supports wireless g n modes The use multiple Access Point will reduces the overall network...

Page 37: ...Beacon Period value between 20 and 1000 The default value is set to 100 milliseconds DTIM A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast messages When the wireless Access Point has buffered broadcast or multicast messages for associated clients it sends the next DTIM with a DTIM Interval value Wireless clients detect the beacons and awaken to re...

Page 38: ... excessive number of wireless packet collisions are occurring wireless performance can be improved by using the RTS CTS Request to Send Clear to Send handshake protocol The wireless transmitter will begin to send RTS frames and wait for CTS when data frame size in bytes is greater than the RTS Threshold This setting should remain at its default value of 2346 bytes Short Preamble and Slot Using a s...

Page 39: ...ew network The default PIN may be printed on the bottom of the Access Point For extra security a new PIN can be generated You can restore the default PIN at any time Only the Administrator admin account can change or reset the PIN Current PIN Shows the current value of the Access Point s PIN Reset To WPS Default Restore the default PIN of the Access Point ...

Page 40: ...39 Generate New PIN Create a random number that is a valid PIN This becomes the Access Point s PIN You can then copy this PIN to the user interface of the registrar ...

Page 41: ...rk ActiveX A Microsoft specification for the interaction of software components Address Resolution Protocol ARP Used to map MAC addresses to IP addresses so that conversions can be made in both directions Ad hoc network Peer to Peer network between wireless clients ADSL Asymmetric Digital Subscriber Line Advanced Encryption Standard AES Government encryption standard Alphanumeric Characters A Z an...

Page 42: ...n order to verify that the person or device is really who they are claiming to be Automatic Private IP Addressing APIPA An IP address that that a Windows computer will assign itself when it is configured to obtain an IP address automatically but no DHCP server is available on the network B Backward Compatible The ability for new devices to communicate and interact with older legacy devices to guar...

Page 43: ...rections at once Browser A program that allows you to access resources on the web and provides them to you graphically C Cable modem A device that allows you to connect a computer up to a coaxial cable and receive Internet access from your Cable provider CardBus A newer version of the PC Card or PCMCIA interface It supports a 32 bit data path DMA and consumes less voltage CAT 5 Category 5 Used for...

Page 44: ...managed updated as well as easily accessed by users or applications Data Link layer The second layer of the OSI model Controls the movement of data on the physical link of a network DB 25 A 25 ping male connector for attaching External modems or RS 232 serial devices DB 9 A 9 pin connector for RS 232 connections dBd Decibels related to dipole antenna dBi Decibels relative to isotropic radiator dBm...

Page 45: ... computer trades some of the protection of the Access Point s security mechanisms for the convenience of being directly addressable from the Internet DNS Domain Name System Translates Domain Names to IP addresses Domain name A name that is associated with an IP address Download To send a request from one computer to another and have the file transmitted back to the requesting computer DSL Digital ...

Page 46: ...es over glass or plastic wire or fiber File server A computer on a network that stores data so that the other computers on the network can all access it File sharing Allowing data from computers on a network to be accessed by other computers on the network with different levels of access rights Firewall A device that protects resources of the Local Area Network from unauthorized users outside of t...

Page 47: ...andard that provides consistency of voice and video transmissions and compatibility for videoconferencing devices Half duplex Data cannot be transmitted and received at the same time Hashing Transforming a string of characters into a shorter string with a predefined length Hexadecimal Characters 0 9 and A F Hop The action of data packets being transmitted from one Access Point to another Host Comp...

Page 48: ...d to ensure security for VPN connections Infrastructure In terms of a wireless network this is when wireless clients use an Access Point to gain access to the network Internet A system of worldwide networks which use TCP IP to allow for resources to be accessed from computers around the world Internet Explorer A World Wide Web browser created and provided by Microsoft Internet Protocol The method ...

Page 49: ...mputer that transmits data on the Internet or on an Intranet IPsec Internet Protocol Security IPX Internetwork Packet Exchange is a networking protocol developed by Novel to enable their Netware clients and servers to communicate ISP Internet Service Provider J Java A programming language used to create programs and applets for web pages K Kbps Kilobits per second Kbyte Kilobyte L L2TP Layer 2 Tun...

Page 50: ...he manufacturer Mbps Megabits per second MDI Medium Dependent Interface is an Ethernet port for a connection to a straight through cable MDIX Medium Dependent Interface Crossover is an Ethernet port for a connection to a crossover cable MIB Management Information Base is a set of objects that can be managed by using SNMP Modem A device that Modulates digital signals from a computer to an analog si...

Page 51: ...ed version of NetBIOS NetBIOS Network Basic Input Output System Netmask Determines what portion of an IP address designates the Network and which part designates the Host Network Interface Card A card installed in a computer or built onto the motherboard that allows the computer to connect to a network Network Layer The third layer of the OSI model which handles the routing of traffic on a network...

Page 52: ...meters Physical layer The first layer of the OSI model Provides the hardware means of transmitting electrical signals on a data carrier Ping A utility program that verifies that a given Internet address exists and can receive messages The utility sends a control packet to the given address and waits for a response PoE Power over Ethernet is the means of transmitting electricity over the unused pai...

Page 53: ...es on a network Reboot To restart a computer and reload it s operating software or firmware from nonvolatile storage Rendezvous Apple s version of UPnP which allows for devices on a network to discover each other and be connected without the need to configure any settings Repeater Retransmits the signal of an Access Point in order to extend it s coverage RIP Routing Information Protocol is used to...

Page 54: ...on between applications on both ends Simple Mail Transfer Protocol Used for sending and receiving email Simple Network Management Protocol Governs the management and monitoring of network devices SIP Session Initiation Protocol A standard protocol for initiating a user session that involves multimedia content such as voice or chat SMTP Simple Mail Transfer Protocol SNMP Simple Network Management P...

Page 55: ... different sources Originally written for UNIX it is now available for other operating systems including Windows T TCP Transmission Control Protocol TCP Raw A TCP IP protocol for transmitting streams of printer data TCP IP Transmission Control Protocol Internet Protocol TFTP Trivial File Transfer Protocol is a utility used for transferring files that is simpler to use than FTP but with less featur...

Page 56: ... computer to the other UPnP Universal Plug and Play URL Uniform Resource Locator is a unique address for files accessible on the Internet USB Universal Serial Bus UTP Unshielded Twisted Pair V Virtual Private Network VPN A secure tunnel over the Internet to connect remote offices or users to their company s network VLAN Virtual LAN Voice over IP Sending voice information over the Internet as oppos...

Page 57: ... be comparable to that of a wired network Wide Area Network The larger network that your LAN is connected to which may be the Internet itself or a regional or corporate network Wi Fi Wireless Fidelity Wi Fi Protected Access An updated version of security for wireless networks that provides authentication as well as encryption Wireless ISP A company that provides a broadband Internet connection ove...

Page 58: ...DSL A generic term for the family of digital subscriber line DSL technologies such as ADSL HDSL RADSL and SDSL Y Yagi antenna A directional antenna used to concentrate wireless signals on a specific location ...

Reviews: