background image

 
 
 
 
 
 
 

 

802.11ac(draft 2.0) 

TEW-812DRU Gigabit Wireless Router

 

 

TEW-812DRU 

 
 
 
 
 

Rev 0.1 

 
 
 
 
 
 
 
 
 

User Manual 

 

Summary of Contents for TEW-812DRU

Page 1: ...802 11ac draft 2 0 TEW 812DRU Gigabit Wireless Router TEW 812DRU Rev 0 1 User Manual ...

Page 2: ...ferent from that to which the receiver is connected z Consult the dealer or an experienced radio TV technician for help FCC Caution Any changes or modifications not expressly approved by the party responsible for compliance could void the user s authority to operate this equipment This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device ...

Page 3: ...romagnetic compatibility and Radio Spectrum Matters ERM ElectroMagnetic Compatibility EMC standard for radio equipment and services Part 1 Common technical requirements EN 301 489 17 V2 1 1 2009 05 Electromagnetic compatibility and Radio spectrum Matters ERM ElectroMagnetic Compatibility EMC standard for radio equipment Part 17 Specific conditions for 2 4 GHz wideband transmission systems 5 GHz hi...

Page 4: ...3 output power may be limited to 10 mW EIRP in the frequency range of 2454 2483 5 MHz For detailed information the end user should contact the national spectrum authority in France ...

Page 5: ...5 EC Español Spanish Por medio de la presente nombre del fabricante declara que el clase de equipo cumple con los requisitos esenciales y cualesquiera otras disposiciones aplicables o exigibles de la Directiva 1999 5 CE Ελληνική Greek ΜΕ ΤΗΝ ΠΑΡΟΥΣΑ name of manufacturer ΔΗΛΩΝΕΙ ΟΤΙ type of equipment ΣΥΜΜΟΡΦΩΝΕΤΑΙ ΠΡΟΣ ΤΙΣ ΟΥΣΙΩΔΕΙΣ ΑΠΑΙΤΗΣΕΙΣ ΚΑΙ ΤΙΣ ΛΟΙΠΕΣ ΣΧΕΤΙΚΕΣ ΔΙΑΤΑΞΕΙΣ ΤΗΣ ΟΔΗΓΙΑΣ 1999 5 ΕΚ...

Page 6: ...rme com os requisitos essenciais e outras disposições da Directiva 1999 5 CE Slovensk o Slovenian Ime proizvajalca izjavlja da je ta tip opreme v skladu z bistvenimi zahtevami in ostalimi relevantnimi določili direktive 1999 5 ES Slovensk y Slovak Meno výrobcu týmto vyhlasuje že typ zariadenia spĺňa základné požiadavky a všetky príslušné ustanovenia Smernice 1999 5 ES Suomi Finnish Valmistaja manu...

Page 7: ...60950 Product Safety z EN 300 328 Technical requirement for radio equipment z EN 301 489 1 17 General EMC requirements for radio equipment z EN 301 893 V1 5 1 2008 12 Trademark recognition All product names used in this manual are the properties of their respective owners and are acknowledged ...

Page 8: ...wing conventions are used in this manual THE NOTE SYMBOL INDICATES ADDITIONAL INFORMATION ON THE TOPIC AT HAND THE TIP SYMBOL INDICATES HELPFULL INFORMATION AND TIPS TO IMPROVE YOUR NETWORK EXPERIENCE THE CAUTION SYMBOL ALERTS YOU TO SITUATIONS THAT MAY DEGRADE YOUR NETWORKING EXPERIENCE OR COMPROMISE LIKE NOTES AND TIPS THE IMPORTANT SYMBOL INDICATES INFORMATION THAT CAN IMPROVE NETWORKING THIS I...

Page 9: ... Quick Installation Guide Using a power supply with a different voltage than the one included with your product will cause damage and void the warranty for this product Minimum System Requirements z Ethernet Based Cable or DSL Modem z Computers with Windows Macintosh or Linux based operating systems with an installed Ethernet adapter and CD ROM Drive z Internet Explorer Version 6 0 or higher Mozil...

Page 10: ...on data rate again until it reaches the highest available transmission rate Types of Wireless Networks Wireless LAN networking works in either of the two modes ad hoc and infrastructure In infra structure mode wireless devices communicate to a wired LAN via access points Each access point and its wireless devices are known as a Basic Service Set BSS An Extended Service Set ESS is two or more BSSs ...

Page 11: ...10 ...

Page 12: ...am below communication is done through the access points which relay data packets to other wireless stations or devices connected to the wired network Wireless stations can then access resources such as a printer on the wired network In an ESS environment users are able to move from one access point to another without losing the ...

Page 13: ...12 connection In the diagram below when the user moves from BSS 1 to BSS 2 the WLAN client devices automatically switches to the channel used in BSS 2 Roaming in an ESS network diagram ...

Page 14: ...ards compatible with IEEE 802 11a b g n wireless standards High speed data rates up to 1300Mbps with 802 11ac and 450Mbps with 802 11n IPv6 Internet Protocol v6 basic function support Supports USB file sharing over FTP and Samba to be handled by K Codes Shares USB peripheral devices such as flash drives external hard drives or printers over the network Printer Control Center Utility supports Windo...

Page 15: ...Actual data throughput and coverage will vary depending on interference network traffic building materials and other conditions For maximum performance of up to 1300Mbps please use with a 3x3 802 11ac wireless adapter Printer Control Center utility installation required for each computer in order to access the print server Hardware Overview LED Indications from bottom to top PWR WPS WAN LAN1 LAN2 ...

Page 16: ...ck 5 meters at a 45 degree angle appears to be almost 3 feet 1 meter thick At a 2 degree angle it looks over 42 feet 14 meters thick Position devices so that the signal will travel straight through a wall or ceiling instead of at an angle for better reception 3 Building Materials can impede the wireless signal a solid metal door or aluminum studs may have a negative effect on range Try to position...

Page 17: ...t LEDs are light 2 To configure the router open your browser type http 192 168 10 1 into the address bar 3 At the Password prompt the User name is admin and password is admin Enter default username and password and press Login Network Status Show your network status ...

Page 18: ...reless Setting You could configure the minimum number of Wireless settings for communication such as Network Name SSID and Security Mode The Access Point can be set simply with only the minimum setting items ...

Page 19: ...18 ...

Page 20: ...19 Guest Network This page allows you to configure the Guest Network ...

Page 21: ...cess codes or other personal data A guest network is a small section of an organization s computer network designed for use by temporary visitors Besides helping to keep an organization s internal information private guest networks also help avoid spreading any computer worms that visitors may have on their systems Parental Control Parental Control by Web URL IP MAC filters ...

Page 22: ...21 ...

Page 23: ...etwork access Add MAC Filtering Rule Use this section to add MAC addresses to the list below MAC Address Enter the MAC address of a computer that you want to control with MAC filtering Computers that have obtained an IP address from the router s DHCP server will be in the DHCP Client List Select a device from the drop down menu Administrator Status ...

Page 24: ...23 ...

Page 25: ...24 The device status Management ...

Page 26: ... router can be changed here Enable Dynamic DNS Enable this option only if you have purchased your own domain name and registered with a dynamic DNS service provider The following parameters are displayed when the option is enabled Dynamic DNS Provider Select a dynamic DNS service provider from the pull down list Host Name Enter your host name fully qualified for example myhost mydomain net Account...

Page 27: ...rvice provider If the Dynamic DNS provider supplies only a key enter that key in all three fields Password Enter the password provided by your service provider If the Dynamic DNS provider supplies only a key enter that key in all three fields ...

Page 28: ...27 Upload Firmware Once you have a firmware update on your computer use this option to browse for the file and then upload the information into the router ...

Page 29: ... Import Settings Use this option to restore previously saved router configuration settings Load Factory Defaults This option restores all configuration settings back to the settings that were in effect at the time the router was shipped from the factory Any settings that have not been saved will be lost If you want to save your router configuration settings use the Export Settings option above Sys...

Page 30: ...29 This restarts the router It is useful for restarting when you are not near the device ...

Page 31: ...ic Time Configuration Enable NTP Server Select this option if you want to synchronize the router s clock to a Network Time Server over the Internet If you are using schedules or logs this is the best way to ensure that the schedules and logs are kept accurate Note that even when NTP Server is enabled you must still choose a time zone and set the daylight saving parameters NTP Server Used ...

Page 32: ...g one server select another Set the Date and Time Manually If you do not have the NTP Server option in effect you can either manually set the time for your router here Schedule Define schedule rules for various firewall features Add Edit Schedule Rule In this section you can add entries to the Schedule Rules List below or edit existing entries Name ...

Page 33: ...The first box is for the hour and the second box is for the minute Email events are normally triggered only by the start time End Time The end time is entered in the same format as the start time The hour in the first box and the minutes in the second box The end time is used for most other rules but is not normally used for email events Schedule Rules List This section shows the currently defined...

Page 34: ...33 Router Status ...

Page 35: ...34 The device status ...

Page 36: ...35 IPv6 Status ...

Page 37: ...36 System log This page can be used to set remote log server and show the system log ...

Page 38: ...ily residential networks without enterprise class devices that permits networked devices such as personal computers printers Internet gateways Wi Fi access points and mobile devices to seamlessly discover each other s presence on the network and establish functional network services for data sharing communications and entertainment WAN Ping By default the WAN Ping Respond feature is disabled Enabl...

Page 39: ...38 Setup LAN Setting ...

Page 40: ...Server these could therefore be used for manually configured devices or devices that cannot use DHCP to obtain network address details automatically It is possible for a computer or device that is manually configured to have an address that does reside within this range In this case the address should be reserved so that the DHCP Server knows that this specific address can only be used by a specif...

Page 41: ... a sticker on the bottom of a network device The MAC address is comprised of twelve digits Each pair of hexadecimal digits are usually separated by dashes or colons such as 00 0D 88 11 22 33 or 00 0D 88 11 22 33 If your network device is a computer and the network card is already located inside the computer you can connect to the router from the computer and click the Copy Your PC s MAC Address bu...

Page 42: ...n Type There are several connection types to choose from Static IP DHCP PPPoE PPTP L2TP and Russia PPTP If you are unsure of your connection method please contact your Internet Service Provider Static Used when your ISP provides you a set IP address that does not change The IP information is manually entered in your IP configuration settings You must enter the IP address Subnet Mask ...

Page 43: ...me that you wish to connect to the Internet Maximum Idle Time Time interval the machine can be idle before the PPPoE connection is disconnected The Maximum Idle Time value is only used for the On demand and Manual reconnect modes L2TP L2TP Layer Two Tunneling Protocol uses a virtual private network to connect to your ISP This method of connection requires you to enter a Username and Password provi...

Page 44: ...rval the machine can be idle before the PPPoE connection is disconnected The Maximum Idle Time value is only used for the On demand and Manual reconnect modes WAN Interface IP Type Static If your ISP has assigned a fixed IP address select this option The ISP provides the values for the following fields for WAN Interface IP Setting IP Address Subnet Mask Default Gateway and optional for DNS Server ...

Page 45: ...44 that computer and click the Clone Your PC s MAC Address button The WAN interface will then use the MAC address of the network adapter in your computer ...

Page 46: ...45 Routing The static routing option allows you to define fixed routes to specific destinations ...

Page 47: ... technology and routes traffic between 6to4 and IPv6 networks Native IPv6 only Native IPv6 refers to the network where IPv6 is the only transport protocol running 6to4 Native IPv6 Support 6to4 and Native IPv6 simultaneously DNS server User need to key in the IPv6 DNS server address which is provided by ISP 6to4 subnet ID Specifies in hexadecimal notation a subnet ID other than 0 ...

Page 48: ...47 QoS ...

Page 49: ...n by clearing the Enable check box Traffic Class Setting User could select the Low Mid highest priority that this port s traffic should receive relative to other applications and traffic when accessing the Internet Inbound class Setting For user to limit downlink bandwidth Outbound Class Setting For user to limit Min Max uplink bandwidth QoS Rule Add ...

Page 50: ... could set priority and limitation by IP MAC address Protocol or Port QoS List You can setup QoS per different protocol Application Wizard This wizard will guide you through a step by step process to configure your router and connect to the Internet example If you choice Static IP Address Connection than press Next ...

Page 51: ... up this connection you will need to have a complete list of IP information provided by your Internet Service Provider If you have a Static IP connection and do not have this information please contact your ISP ...

Page 52: ...51 Then press Apply ...

Page 53: ...52 ...

Page 54: ...int can be set simply with only the minimum setting items Wireless Network Name SSID When you are browsing for available wireless networks this is the name that will appear in the list unless Visibility Status is set to Invisible see below This name is also referred to as the SSID For security purposes it is highly recommended to change from the pre configured ...

Page 55: ...security standard With the WPA2 option the router tries WPA2 first but falls back to WPA if the client only supports WPA With the WPA2 Only option the router associates only with clients that also support WPA2 security Cipher Type The encryption algorithm used to secure the data communication TKIP Temporal Key Integrity Protocol provides per packet key generation and is based on WEP AES Advanced E...

Page 56: ...en WDS is enabled this access point functions as a wireless repeater and is able to wirelessly communicate with other APs via WDS links A WDS link is bidirectional so this AP must know the MAC Address creates the WDS link of the other AP and the other AP must have a WDS link back to this AP Make sure the APs are configured with same channel ...

Page 57: ...ress of the wireless device that also supports WDS in to the blank fields You can add up to four additional devices in the spaces provided Click on apply at the bottom of the page to apply your setting changes Enable the security seeing in security page each WDS APs need to use same security setting Note WDS supports wireless g n modes The use multiple Access Point will reduces the overall network...

Page 58: ...Beacon Period value between 20 and 1000 The default value is set to 100 milliseconds DTIM A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast messages When the wireless router has buffered broadcast or multicast messages for associated clients it sends the next DTIM with a DTIM Interval value Wireless clients detect the beacons and awaken to receive ...

Page 59: ... excessive number of wireless packet collisions are occurring wireless performance can be improved by using the RTS CTS Request to Send Clear to Send handshake protocol The wireless transmitter will begin to send RTS frames and wait for CTS when data frame size in bytes is greater than the RTS Threshold This setting should remain at its default value of 2346 bytes Short Preamble and Slot Using a s...

Page 60: ...n existing network or to create a new network The default PIN may be printed on the bottom of the router For extra security a new PIN can be generated You can restore the default PIN at any time Only the Administrator admin account can change or reset the PIN Current PIN Shows the current value of the router s PIN ...

Page 61: ...ult Restore the default PIN of the router Generate New PIN Create a random number that is a valid PIN This becomes the router s PIN You can then copy this PIN to the user interface of the registrar Security Access Control ...

Page 62: ...e When Access Control is disabled every device on the LAN has unrestricted access to the Internet However if you enable Access Control Internet access is restricted for those devices that have an Access Control Policy configured for them All other devices have unrestricted access to the Internet Firewall DMZ ...

Page 63: ...ranslated from the WAN side IP address of the router to the LAN side IP address of the DMZ host However port numbers are not translated so applications on the DMZ host can depend on specific port numbers The DMZ capability is just one of several means for allowing incoming requests that might appear unsolicited to the NAT In general the DMZ host should be used only if there are no other alternativ...

Page 64: ...an ICMP TCP UDP and IGMP also GRE and ESP when these protocols are enabled by the PPTP and IPSec Enable DMZ Putting a computer in the DMZ may expose that computer to a variety of security risks Use of this option is only recommended as a last resort Virtual Server ...

Page 65: ...mputer Name drop down menu or you can manually enter the IP address of the server computer Protocol Select the protocol used by the service The common choices UDP TCP can be selected from the drop down menu Private Port The port that will be used on your internal network Public Port The port that will be accessed from the Internet Schedule Select a schedule for when the service will be enabled If ...

Page 66: ...cifies whether the entry will be active or inactive Name Enter a name for the Special Application Rule for example Game App which will help you identify the rule in the future Alternatively you can select from the Application list of common applications Protocol ...

Page 67: ...ample 6500 6700 Schedule Select a schedule for when this rule is in effect Clear Re initialize this area of the screen discarding any changes you have made Port Trigger Rule List This is a list of the defined application rules Click the Enable checkbox at the left to directly activate or de activate the entry An entry can be changed by clicking the Edit icon or can be deleted by clicking the Delet...

Page 68: ... list Rule Enable Specifies whether the entry will be active or inactive IP Address Enter the local network IP address of the system hosting the server for example 192 168 10 50 You can select a computer from the list of DHCP clients in the Computer Name drop down menu or you can manually enter the IP address of the server computer ...

Page 69: ...59 6180 99 UDP Ports to Open Enter the UDP ports to open for example 6159 6180 99 Schedule Select a schedule for the times when this rule is in effect Clear Re initialize this area of the screen discarding any changes you have made ALG Application Level Gatwway ALG ...

Page 70: ...69 By default the ALG feature is enabled ALG configuration allows users to disable some application service USB SAMBA Server Enable the SAMBA server to share the files on USB storage ...

Page 71: ...70 FTP Server Enable the FTP server to share the files on USB storage ...

Page 72: ...71 Eject Device ...

Page 73: ...rk ActiveX A Microsoft specification for the interaction of software components Address Resolution Protocol ARP Used to map MAC addresses to IP addresses so that conversions can be made in both directions Ad hoc network Peer to Peer network between wireless clients ADSL Asymmetric Digital Subscriber Line Advanced Encryption Standard AES Government encryption standard Alphanumeric Characters A Z an...

Page 74: ...n order to verify that the person or device is really who they are claiming to be Automatic Private IP Addressing APIPA An IP address that that a Windows computer will assign itself when it is configured to obtain an IP address automatically but no DHCP server is available on the network B Backward Compatible The ability for new devices to communicate and interact with older legacy devices to guar...

Page 75: ...rections at once Browser A program that allows you to access resources on the web and provides them to you graphically C Cable modem A device that allows you to connect a computer up to a coaxial cable and receive Internet access from your Cable provider CardBus A newer version of the PC Card or PCMCIA interface It supports a 32 bit data path DMA and consumes less voltage CAT 5 Category 5 Used for...

Page 76: ...managed updated as well as easily accessed by users or applications Data Link layer The second layer of the OSI model Controls the movement of data on the physical link of a network DB 25 A 25 ping male connector for attaching External modems or RS 232 serial devices DB 9 A 9 pin connector for RS 232 connections dBd Decibels related to dipole antenna dBi Decibels relative to isotropic radiator dBm...

Page 77: ...he DMZ computer trades some of the protection of the router s security mechanisms for the convenience of being directly addressable from the Internet DNS Domain Name System Translates Domain Names to IP addresses Domain name A name that is associated with an IP address Download To send a request from one computer to another and have the file transmitted back to the requesting computer DSL Digital ...

Page 78: ...es over glass or plastic wire or fiber File server A computer on a network that stores data so that the other computers on the network can all access it File sharing Allowing data from computers on a network to be accessed by other computers on the network with different levels of access rights Firewall A device that protects resources of the Local Area Network from unauthorized users outside of t...

Page 79: ... standard that provides consistency of voice and video transmissions and compatibility for videoconferencing devices Half duplex Data cannot be transmitted and received at the same time Hashing Transforming a string of characters into a shorter string with a predefined length Hexadecimal Characters 0 9 and A F Hop The action of data packets being transmitted from one router to another Host Compute...

Page 80: ...o ensure security for VPN connections Infrastructure In terms of a wireless network this is when wireless clients use an Access Point to gain access to the network Internet A system of worldwide networks which use TCP IP to allow for resources to be accessed from computers around the world Internet Explorer A World Wide Web browser created and provided by Microsoft Internet Protocol The method of ...

Page 81: ...mputer that transmits data on the Internet or on an Intranet IPsec Internet Protocol Security IPX Internetwork Packet Exchange is a networking protocol developed by Novel to enable their Netware clients and servers to communicate ISP Internet Service Provider J Java A programming language used to create programs and applets for web pages K Kbps Kilobits per second Kbyte Kilobyte L L2TP Layer 2 Tun...

Page 82: ...he manufacturer Mbps Megabits per second MDI Medium Dependent Interface is an Ethernet port for a connection to a straight through cable MDIX Medium Dependent Interface Crossover is an Ethernet port for a connection to a crossover cable MIB Management Information Base is a set of objects that can be managed by using SNMP Modem A device that Modulates digital signals from a computer to an analog si...

Page 83: ...ed version of NetBIOS NetBIOS Network Basic Input Output System Netmask Determines what portion of an IP address designates the Network and which part designates the Host Network Interface Card A card installed in a computer or built onto the motherboard that allows the computer to connect to a network Network Layer The third layer of the OSI model which handles the routing of traffic on a network...

Page 84: ...ers Physical layer The first layer of the OSI model Provides the hardware means of transmitting electrical signals on a data carrier Ping A utility program that verifies that a given Internet address exists and can receive messages The utility sends a control packet to the given address and waits for a response PoE Power over Ethernet is the means of transmitting electricity over the unused pairs ...

Page 85: ...urces on a network Reboot To restart a computer and reload it s operating software or firmware from nonvolatile storage Rendezvous Apple s version of UPnP which allows for devices on a network to discover each other and be connected without the need to configure any settings Repeater Retransmits the signal of an Access Point in order to extend it s coverage RIP Routing Information Protocol is used...

Page 86: ...on between applications on both ends Simple Mail Transfer Protocol Used for sending and receiving email Simple Network Management Protocol Governs the management and monitoring of network devices SIP Session Initiation Protocol A standard protocol for initiating a user session that involves multimedia content such as voice or chat SMTP Simple Mail Transfer Protocol SNMP Simple Network Management P...

Page 87: ... different sources Originally written for UNIX it is now available for other operating systems including Windows T TCP Transmission Control Protocol TCP Raw A TCP IP protocol for transmitting streams of printer data TCP IP Transmission Control Protocol Internet Protocol TFTP Trivial File Transfer Protocol is a utility used for transferring files that is simpler to use than FTP but with less featur...

Page 88: ... computer to the other UPnP Universal Plug and Play URL Uniform Resource Locator is a unique address for files accessible on the Internet USB Universal Serial Bus UTP Unshielded Twisted Pair V Virtual Private Network VPN A secure tunnel over the Internet to connect remote offices or users to their company s network VLAN Virtual LAN Voice over IP Sending voice information over the Internet as oppos...

Page 89: ... be comparable to that of a wired network Wide Area Network The larger network that your LAN is connected to which may be the Internet itself or a regional or corporate network Wi Fi Wireless Fidelity Wi Fi Protected Access An updated version of security for wireless networks that provides authentication as well as encryption Wireless ISP A company that provides a broadband Internet connection ove...

Page 90: ...DSL A generic term for the family of digital subscriber line DSL technologies such as ADSL HDSL RADSL and SDSL Y Yagi antenna A directional antenna used to concentrate wireless signals on a specific location ...

Reviews: