background image

 

 

 

 

 

 

 

 

 

 

© Copyright 2013 TRENDnet. All Rights Reserved. 

 

 

 

13

 

 
TRENDnet User’s Guide

 

Appendix 

Appendix 

How to choose the type of security for your wireless network 

Setting up wireless security is very important. Leaving your wireless network open and 

unsecure could expose your entire network and personal files to outsiders. TRENDnet 

recommends reading through this entire section and setting up wireless security on your 

new router.  
There are a few different wireless security types supported in wireless networking each 

having its own characteristics which may be more suitable for your wireless network 

taking into consideration compatibility, performance, as well as the security strength 

along with using older wireless networking hardware (also called legacy hardware).  
It is strongly recommended to enable wireless security to prevent unwanted users from 

accessing your network and network resources (personal documents, media, etc.). 
In general, it is recommended that you choose the security type with the highest 

strength and performance supported by the wireless computers and devices in your 

network. Please review the security types to determine which one you should use for 

your network. 

Wireless Encryption Types 

 

WEP:

 Legacy encryption method supported by older 802.11b/g hardware. This is 

the oldest and least secure type of wireless encryption. It is generally not 

recommended to use this encryption standard, however if you have old 802.11 b or 

802.11g wireless adapters or computers with old embedded wireless cards(wireless 

clients), you may have to set your router to WEP to allow the old adapters to 

connect to the router. 

 

Note: This encryption standard will limit connection speeds to 54Mbps.  

 

 

WPA: 

This encryption is significantly more robust than the WEP technology. Much 

of the older 802.11g hardware was been upgraded (with firmware/driver upgrades) 

to support this encryption standard.  Total wireless speeds under this encryption 

type however are limited to 54Mbps. 

 

 

WPA-

Auto: This setting provides the router with the ability to detect wireless 

devices using either WPA or WPA2 encryption. Your wireless network will 

automatically change the encryption setting based on the first wireless device 

connected. For example, if the first wireless client that connects to your wireless 

network uses WPA encryption your wireless network will use WPA encryption. Only 

when all wireless clients disconnect to the network and a wireless client with WPA2 

encryption connects your wireless network will then change to WPA2 encryption.  

Note:  WPA2 encryption supports 802.11n speeds and WPA encryption will limit 

your connection speeds to 54Mbps

  

 

 

WPA2: 

This is the most secure wireless encryption available today, similar to WPA 

encryption but more robust.  This encryption standard also supports the highest 

connection speeds. TRENDnet recommends setting your router to this encryption 

standard. If you find that one of your wireless network devices does not support 

WPA2 encryption, then set your router to either WPA or WPA-Auto encryption.  

Note: Check the specifications of your wireless network adapters and wireless 

appliances to verify the highest level of encryption supported. 

 

Below is brief comparison chart of the wireless security types and the recommended 

configuration depending on which type you choose for your wireless network. 

Security Standard 

WEP 

WPA 

WPA2 

Compatible 

Wireless 

Standards 

IEEE 802.11a/b/g 

(802.11n devices 

will operate at 

802.11g to connect 

using this standard) 

IEEE 802.11a/b/g 

(802.11n devices 

will operate at 

802.11g to connect 

using this 

standard) 

IEEE 802.11a/b/g/n 

Highest 

Performance 

Under This 

Setting 

Up to 54Mbps 

Up to 54Mbps 

Up to 450Mbps

*

 

Encryption 

Strength 

Low 

Medium 

High 

Additional 

Options 

Open System or 

Shared Key, 

HEX or ASCII,  

Different key sizes 

TKIP or AES,  

Preshared Key or 

RADIUS 

TKIP or AES,  

Preshared Key or 

RADIUS 

Recommended 

Configuration 

Open System ASCII  

13 characters 

TKIP 

Preshared Key 

8-63 characters 

AES  

Preshared Key 

8-63 characters 

 

*Dependent on the maximum 802.11n/ac data rate supported by the device (150Mbps, 

300Mbps, 450Mbps or 867Mbps) 

Содержание TEW-624UB

Страница 1: ...TRENDnet User s Guide Cover Page...

Страница 2: ...stallation 3 Hardware Installation 3 Wireless Utility 4 Wireless Utility Setting 4 General 4 Profile 4 Available Networks 6 Status 6 Statistics 7 WiFi Protected Setup WPS 8 Pin Input Configuration PIN...

Страница 3: ...y of Service QoS technology prioritizes gaming Internet calls and video streams Computers purchased with integrated wireless most often come with either 150 Mbps or even slower 54 Mbps Wireless techno...

Страница 4: ...blink blue when WPS is activated Application Diagram A router is installed near the modem typically supplied by your ISP Internet Service Provider and physically connected to it from the router s WAN...

Страница 5: ...s CD ROM Drive and then click Install Utility 2 Follow the InstallShield Wizard Instructions 3 Click Finish to complete installation if prompted for computer restart the computer click OK Hardware In...

Страница 6: ...c mode Encryption Shows the current encryption type used SSID Shows the current SSID which must be the same as your wireless access point or router in order to establish the connection correctly Wirel...

Страница 7: ...ey for WEP data encryption feature o Open System and Shared Requires the user to set a WEP key to exchange data with other wireless clients that have the same WEP key WEP is considered basic level of...

Страница 8: ...utility version encryption encryption type region adapter s MAC address current connection data rate channel connection status the associated router or Access Point s SSID network type associated devi...

Страница 9: ...lays the status of the wireless adapter This information is useful when troubleshooting the connection of the wireless adapter and your wireless network SSID The SSID your wireless network is connecte...

Страница 10: ...ake sure you allow this time frame to prevent any failures 1 Click on the Pin Input Configuration PIN button the PIN is shown on the button of the windows 2 Enter the PIN code into the WPS Client PIN...

Страница 11: ...h Button Configuration PBC There are 2 ways to run WPS Push Button Configuration Follow the steps below when using the WPS configuration with the Push Button Configuration PBC method through the wirel...

Страница 12: ...er or access point In most cases the WPS LED will turn on when WPS is activated 2 Push and hold for 5 seconds the WPS button on the wireless adapter 3 Once the WPS LED turns off you can check if the a...

Страница 13: ...ndows 7 32 64 bit Vista 32 64 bit Windows XP 32 64 bit Dimensions LxWxH 33 9 x 17 x 7mm 1 3 x 0 7 x 0 3in Weight 3g 0 1oz Temperature Operating 0 40 C 32 104 F Storage 10 70 C 14 158 F Humidity Max 95...

Страница 14: ...Please refer to the User s Guide for more information regarding wireless network security 3 Check your TCP IP properties to ensure that Obtain an IP address automatically is selected 4 Double click t...

Страница 15: ...r are limited to 54Mbps WPA Auto This setting provides the router with the ability to detect wireless devices using either WPA or WPA2 encryption Your wireless network will automatically change the en...

Страница 16: ...ernet Protocol Version TCP IPv4 and then click Properties d Then click Obtain an IP address automatically and click OK Windows XP 2000 a Go into the Control Panel double click the Network Connections...

Страница 17: ...ification area then click View Available Wireless Networks 2 In Connect to a Network under Available Networks click the wireless network you would like to connect to 3 You may be prompted to enter a s...

Страница 18: ...ng two conditions 1 This device may not cause harmful interference and 2 this device must accept any interference received including interference that may cause undesired operation Operations in the 5...

Страница 19: ...ith the essential requirements and other relevant provisions of Directive 1999 5 EC Espa ol Spanish Por medio de la presente TRENDnet declara que el TEW 624UB cumple con los requisitos esenciales y cu...

Страница 20: ...of return packages and sent to TRENDnet prepaid insured and packaged appropriately for safe shipment Customers shipping from outside of the USA and Canada are responsible for return shipping fees Cust...

Страница 21: ......

Отзывы: