background image

79 

Universal Plug and Play   

A standard that allows network devices to discover each other and configure themselves to be 
a part of the network   

Upgrade  

To install a more recent version of a software or firmware product   

Upload  

To send a request from one computer to another and have a file transmitted from the 
requesting computer to the other   

UPnP  

Universal Plug and Play   

URL  

Uniform Resource Locator is a unique address for files accessible on the Internet   

USB  

Universal Serial Bus   

UTP  

Unshielded Twisted Pair   

Virtual Private Network   

VPN: A secure tunnel over the Internet to connect remote offices or users to their company's 
network  

VLAN  

Virtual LAN   

Voice over IP   

Sending voice information over the Internet as opposed to the PSTN   

VoIP  

Voice over IP   

Wake on LAN   

Allows you to power up a computer though it's Network Interface Card   

WAN  

Wide Area Network   

WCN  

Содержание TEW-611BRP

Страница 1: ...1...

Страница 2: ...ncrease the separation between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced...

Страница 3: ...Contents 4 Minimum System Requirements 4 Wireless LAN Networking 6 Introduction 7 Features 7 Hardware Overview 8 Rear Panel 8 LEDs 9 Installation Considerations 10 Getting Started 10 Using the Configu...

Страница 4: ...ing conventions are used in this manual THE NOTE SYMBOL INDICATES ADDITIONAL INFORMATION ON THE TOPIC AT HAND THE TIP SYMBOL INDICATES HELPFULL INFORMATION AND TIPS TO IMPROVE YOUR NETWORK EXPERIENCE...

Страница 5: ...supply with a different voltage than the one included with your product will cause damage and void the warranty for this product Minimum System Requirements z Ethernet Based Cable or DSL Modem z Compu...

Страница 6: ...reless LAN networking technology Consult the Glossary for definitions of the terminology used in this section THE INFORMATION IN THIS SECTION IS FOR YOUR REFERENCE CHANGING NETWORK SETTINGS AND PARTIC...

Страница 7: ...Modems with Dynamic IP Static IP PPPoE PPTP L2TP or BigPong Connection Types Supports Super G Technology with Data Rate up to 108Mbps 8X Faster Enhance Wireless Coverage up to 800 More Coverage with M...

Страница 8: ...W 611BRP package Auto MDIX LAN Ports These ports automatically sense the cable type when connecting to Ethernet enabled computers Auto MDIX WAN Port This is the connection for the Ethernet cable to th...

Страница 9: ...a connection to an Ethernet enabled computer on ports 1 4 This LED blinks during data transmission WAN LED A solid light indicates connection on the WAN port This LED blinks during data transmission...

Страница 10: ...gree angle appears to be almost 3 feet 1 meter thick At a 2 degree angle it looks over 42 feet 14 meters thick Position devices so that the signal will travel straight through a wall or ceiling instea...

Страница 11: ...in the IP Address of the TEW 611BRP The TEW 611BRP s default IP Address is http 192 168 0 1 Open the Web browser Type in the IP Address of the Router http 192 168 0 1 If you have changed the default...

Страница 12: ...configuration options Wizard WAN LAN DHCP and Wireless Basic_Wizard Internet Connection Setup Wizard This wizard guides you through the following basic router setup steps Set your Password Select your...

Страница 13: ...N The WAN Wide Area Network section is where you configure your Internet Connection type There are several connection types to choose from Static IP DHCP PPPoE PPTP L2TP and BigPond If you are unsure...

Страница 14: ...o enter a Username and Password provided by your Internet Service Provider to gain access to the Internet Service Name Some ISP s may require that you enter a Service Name Only enter a Service Name if...

Страница 15: ...interval the machine can be idle before the L2TP connection is disconnected The Maximum Idle Time value is only used for the On demand connection mode Advanced These options apply to all WAN modes Use...

Страница 16: ...eir service The ISP will then only grant Internet access to requests from a computer or router with this particular MAC address Your new Wireless router has a different MAC address than the computer o...

Страница 17: ...ce It is recommended that you use the default settings if you do not have an existing network IP Address The IP address of your router on the local area network Your local area network settings are ba...

Страница 18: ...properly configured and this option is enabled the DHCP Server will manage the IP addresses and other network configuration information for computers and other devices connected to your Local Area Ne...

Страница 19: ...to 99 and 200 to 254 are NOT managed by the DHCP Server Computers or devices that use addresses from these ranges are to be manually configured Suppose you have a web server computer that has a manual...

Страница 20: ...11 22 33 or 00 0D 88 11 22 33 If your network device is a computer and the network card is already located inside the computer you can connect to the Wireless router from the computer and click the C...

Страница 21: ...security features This device supports three wireless security modes including WEP WPA Personal and WPA Enterprise WEP is the original wireless encryption standard WPA provides a higher level of secur...

Страница 22: ...channels in your area may have interference from other electronic devices Choose the clearest channel to help optimize the performance and coverage of your wireless network Transmission Rate By defau...

Страница 23: ...128 bit encryption WPA Personal and WPA Enterprise Both of these options select some variant of Wi Fi Protected Access WPA security standards published by the Wi Fi Alliance The WPA Mode further refi...

Страница 24: ...authentication server RADIUS Server Port The port number used to connect to the authentication server RADIUS Server Shared Secret A pass phrase that must match with the authentication server MAC Addre...

Страница 25: ...ices on your LAN This feature is useful for hosting online services such as FTP Web or game servers For each Virtual Server you define a public port on your router for redirection to an internal LAN I...

Страница 26: ...the Select Virtual Server list Selecting one of these entries fills some of the remaining parameters with standard values for that type of server IP Address The IP address of the system on your inter...

Страница 27: ...ess of the gateway or its dynamic DNS name from a machine on the LAN Your requests may not be looped back or you may be redirected to the Forbidden page This will happen if you have an Access Control...

Страница 28: ...nger Supports use of Microsoft Windows Messenger the Internet messaging client that ships with Microsoft Windows on LAN computers The SIP ALG must also be enabled when the Windows Messenger ALG is ena...

Страница 29: ...oftware application running on any computer on your network to connect to a web based server or another user on the Internet Name Enter a name for the Special Application Rule for example Game App whi...

Страница 30: ...e currently defined special applications rules A special applications rule can be changed by clicking the Edit icon or deleted by clicking the Delete icon When you click the Edit icon the item is high...

Страница 31: ...ter the UDP ports to open 6159 6180 99 Inbound Filter Select a filter that controls access as needed for this game rule If you do not see the filter you need in the list of filters go to the Advanced...

Страница 32: ...32 Advanced_Traffic Shaping The Traffic Shaping feature helps improve your network gaming performance by prioritizing applications By default the Traffic Shaping settings are disabled...

Страница 33: ...s you to set the uplink speed manually Uplink speed is the speed at which data can be transferred from the router to your ISP This is determined by your ISP ISPs often specify speed as a downlink upli...

Страница 34: ...ge set here Source Port Range The rule applies to a flow of messages whose LAN side port number is within the range set here Destination IP Range The rule applies to a flow of messages whose WAN side...

Страница 35: ...or WAN Interface Specifies the interface LAN or WAN that the IP packet must use to transit out of the router when this route is used Metric The relative cost of using this route Save Saves the new or...

Страница 36: ...r to peer utilities or games Enable By default the Access Control feature is disabled If you need Access Control check this option and you will see the following configuration sections Note Once you e...

Страница 37: ...e using click the Copy Your PC s MAC Address button Others If you want to restrict access for all devices that do not have an explicit rule configured for them then select Others for the Address Type...

Страница 38: ...e List is used for systems that have the Web filter option enabled in Access Control Enable Entries in the Allowed Web Site List can be activated or deactivated with this checkbox New entries are acti...

Страница 39: ...king the Delete icon When you click the Edit icon the item is highlighted and the Edit Web Site section is activated for editing Advanced_MAC Address Filter The MAC address filter section can be used...

Страница 40: ...pplied to wired network clients Add Edit MAC Address In this section you can add entries to the MAC Address List below or edit existing entries Enable MAC address entries can be activated or deactivat...

Страница 41: ...pplication has trouble working from behind the router you can expose one computer to the Internet and run the application on that computer Note Putting a computer in the DMZ may expose that computer t...

Страница 42: ...functions for example a Game Clan filter might allow all of the members of a particular gaming group to play several different games for which gaming entries have been created At the same time an Admi...

Страница 43: ...ake the changes effective and permanent Inbound Filter Rules List The section lists the current Inbound Filter Rules An Inbound Filter Rule can be changed by clicking the Edit icon or deleted by click...

Страница 44: ...lization hopping patterns new values for current MIB attributes and other requirements to extend the operation of 802 11 WLANs to new regulatory domains countries The current 802 11 standard defines o...

Страница 45: ...t existing entries Name Give the schedule a name that is meaningful to you such as Weekday rule Day s Place a checkmark in the boxes for the desired days or select the All Week radio button to select...

Страница 46: ...e in the following list When finished updating the Schedule Rules you must still click the button at the top of the page to make the changes effective and permanent Schedule Rules List The section sho...

Страница 47: ...n Time Syslog Email System Firmware and Dynamic DNS Tools_Admin The Admin option is used to set a password for access to the Web based management By default there is no password configured It is highl...

Страница 48: ...eout The amount of time before the administration session either remote or local is closed when there is no activity Save Configuration This option allows you to save the router s configuration to a f...

Страница 49: ...soft s current implementation of WCN you cannot save the wireless settings if a profile of the same name already exists To work around this limitation either delete the existing profile or change the...

Страница 50: ...et If you are using schedules or logs this is the best way to ensure that the schedules and logs are kept accurate NTP Server Select a Network Time Server for synchronization You can type in the addre...

Страница 51: ...Enable Logging to Syslog Server Enable this option if you have a syslog server currently running on the LAN and wish to send log messages to it Enabling this option causes the following parameter to...

Страница 52: ...this option is enabled router activity logs or firmware upgrade notifications can be emailed to a designated email address and the following parameters are displayed Email Settings From Email Address...

Страница 53: ...il Log When Full or on Schedule On Log Full Select this option if you want logs to be sent by email when the log is full Schedule Select this option if you want logs to be sent by email according to a...

Страница 54: ...ed from the factory Any settings that have not been saved will be lost If you want to save your router configuration settings you can do so from the Tools Admin page Tools_Firmware The Firmware Upgrad...

Страница 55: ...device To perform an upgrade ensure that you are using a PC that is connected to the router by wire Note Some firmware upgrades reset the router s configuration options to the factory defaults Before...

Страница 56: ...nter your domain name to connect to your server no matter what your IP address is Enable Dynamic DNS Enable this option only if you have purchased your own domain name and registered with a dynamic DN...

Страница 57: ...es to the Dynamic DNS if your dynamic IP address has not changed The timeout period is entered in hours Note After configuring the router for dynamic DNS you can open a browser and navigate to the URL...

Страница 58: ...and network connection details are displayed on the Device Info page The firmware version is also displayed here Some browsers have limitations that make it impossible to update the WAN status displa...

Страница 59: ...or the DHCP Release to break the WAN connection BigPond Connection Depending on whether you are currently logged in to BigPond you can click either the DHCP Renew to attempt to establish the WAN conne...

Страница 60: ...es or neighboring wireless networks and by obstacles between the router and the wireless device Status_Routing The routing section displays all of the routing details configured for your router A valu...

Страница 61: ...you to view the router logs You can define what types of events you want to view and the level of events to view This router also has external Syslog Server support so you can send the log files to a...

Страница 62: ...ou accessed the log Clear Clicking this button erases all log entries Email Now If you provided email information with the Tools Email screen clicking the Email Now button sends the router log to the...

Страница 63: ...f packets that were dropped due to Ethernet collisions two or more devices attempting to use an Ethernet circuit at the same time Errors The number of transmission failures that cause loss of a packet...

Страница 64: ...e given to outbound packets of this conversation by the Traffic Shaping logic Smaller numbers represent higher priority State When SPI Stateful Packet Inspection is enabled this is the state for sessi...

Страница 65: ...be made in both directions ADSL Asymmetric Digital Subscriber Line Advanced Encryption Standard AES Government encryption standard Alphanumeric Characters A Z and 0 9 Antenna Used to transmit and rece...

Страница 66: ...is available on the network B Backward Compatible The ability for new devices to communicate and interact with older legacy devices to guarantee interoperability Bandwidth The maximum amount of bytes...

Страница 67: ...ce It supports a 32 bit data path DMA and consumes less voltage CAT 5 Category 5 Used for 10 100 Mbps or 1Gbps Ethernet connections Client A program or user that requests data from a server Collision...

Страница 68: ...text Default A predetermined value or setting that is used by a program when no user input has been entered for this value or setting Demilitarized zone DMZ A single computer or group of computers tha...

Страница 69: ...missions at the sane time Dynamic DNS service Dynamic DNS is provided by companies to allow users with Dynamic IP addresses to obtain a Domain Name that will always by linked to their changing IP addr...

Страница 70: ...outside of the local network Firmware Programming that is inserted into a hardware device that tells it how to function Fragmentation Breaking up data into smaller pieces to make it easier to store FT...

Страница 71: ...t Transfer Protocol is used to transfer files from HTTP servers web servers to HTTP clients web browsers HTTPS HTTP over SSL is used to encrypt and decrypt HTTP transmissions Hub A networking device t...

Страница 72: ...at the packet processing layer of network communication Internet Service Provider An ISP provides access to the Internet to individuals or companies Intranet A private network Intrusion Detection A ty...

Страница 73: ...ng Diode Legacy Older devices or technology Local Area Network A group of computers in a building that usually access files from a server LPR LPD Line Printer Requestor Line Printer Daemon A TCP IP pr...

Страница 74: ...that can be transmitted on a packet based network like the Internet Multicast Sending data from one device to many devices on a network N NAT Network Address Translation allows many private IP address...

Страница 75: ...osed to sending the entire routing table at a regular interval which is how RIP functions P Password A sequence of characters that is used to authenticate requests to resources on a network Personal A...

Страница 76: ...ronize communication timing between devices on a network Q QoS Quality of Service R RADIUS Remote Authentication Dial In User Service allows for remote users to dial into a central server and be authe...

Страница 77: ...session between two computers Session layer The fifth layer of the OSI model which coordinates the connection and communication between applications on both ends Simple Mail Transfer Protocol Used for...

Страница 78: ...terface for collecting in one place the logs from different sources Originally written for UNIX it is now available for other operating systems including Windows T TCP Transmission Control Protocol TC...

Страница 79: ...the other UPnP Universal Plug and Play URL Uniform Resource Locator is a unique address for files accessible on the Internet USB Universal Serial Bus UTP Unshielded Twisted Pair V Virtual Private Net...

Страница 80: ...le to that of a wired network Wi Fi Wireless Fidelity Wi Fi Protected Access An updated version of security for wireless networks that provides authentication as well as encryption Wide Area Network T...

Страница 81: ...re than those specified in the manual Warranty service may be obtained by contacting TRENDware office within the applicable warranty period for a Return Material Authorization RMA number accompanied b...

Страница 82: ...IAL LOSS ARISING OUT OF OR IN CONNECTION WITH THE SALE INSTALLATION MAINTENANCE USE PERFORMANCE FAILURE OR INTERRUPTION OF THE POSSIBILITY OF SUCH DAMAGES AND LIMITS ITS LIABILITY TO REPAIR REPLACEMEN...

Страница 83: ......

Отзывы: