TRENDnet Not available Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung TRENDnet Not available an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von TRENDnet Not available, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung TRENDnet Not available die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung TRENDnet Not available. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung TRENDnet Not available sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts TRENDnet Not available
- Den Namen des Produzenten und das Produktionsjahr des Geräts TRENDnet Not available
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts TRENDnet Not available
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von TRENDnet Not available zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von TRENDnet Not available und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service TRENDnet finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von TRENDnet Not available zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts TRENDnet Not available, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von TRENDnet Not available widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    1[...]

  • Seite 2

    Federal Communication Commission Interference S t atement This equipment has been tested and found t o comply with the limits for a Class B dig ital device, pursuant to Part 15 of the FCC Rules. These limits are d esigned to provide reasonable protection against harmful interference in a r esidential inst allation. This equ ipment generates, uses a[...]

  • Seite 3

    - EN 301 489-1 V1.8.1: (2008-04) - Electromagnetic compatibility and R adio S pectrum Matters (ERM); ElectroMagnetic Compatibility (EMC) standard for radio equipment and services; Part 1: Common technical requirement s - EN 301 489-17 V1.3.2 (2008-04) - Electromagnetic compatibility and R adio spectrum Matters (ERM); ElectroMagnetic Compatibility ([...]

  • Seite 4

    Table of contents Introduction .............................................................................................................................. ............... 5  Features .............................................................................................................................. ................ 5  Getting S t[...]

  • Seite 5

    Introduction TRENDnet’s 450Mbp s Wireless N Gigabit Router , model TEW-691GR, redefines wireless route r performance. This router’s raw horsepower seamlessly streams HD movies to your entertainment center , transfers content from countless users, and generates record wireless coverag e. Gigabit Wide Area Network and Local Area Network ports tra[...]

  • Seite 6

    Getting Started Congratulations on purchasing the TEW -691GR! Thi s manual provides information for setting up and configuring the TEW -691GR. This manual is intended for bot h home users and professionals. PACKAGE CONTENTS • TEW-691GR 450Mbps Wireless N Gigabit Router • CD-ROM (User’s Guide) • Multi-Language Quick Installation Guide • CA[...]

  • Seite 7

    HARDWARE OVERVIEW LED Indications: (from left to right)  WPS  WLAN  Reserve  LAN1  LAN2  LAN3  LAN4  WAN  PWR Rear panel: (from left to right)  DC-IN  RESET  Power switch  Wi-Fi on/off switch  WAN  LAN1  LAN2  LAN3  LAN4 7[...]

  • Seite 8

    WIRELESS PERFORMANCE CONSIDERATIONS There are a number of factors that can impact the range of wireless devices. 1. Adjust your wireless devices so that the signal is traveling in a straight path, rather than at an angle. The more material the signal has to pass through the more signal you will lose. 2. Keep the number of obstructions to a minimum.[...]

  • Seite 9

    Using the Configuration Menu Whenever you want to configure your TEW-691GR, you can access the Configuration Menu th rough your PC by opening the Web-browser and typing in th e IP Address of the TEW-691GR. The TEW-691GR’s default IP Address is http://192.168.10.1 ¾ Open the Web browser. ¾ Type in the IP Address of the Router ( http://192.168.10[...]

  • Seite 10

    Network WAN SETTING WAN Connection Type There are several connection types to choose fr om: Static IP, DHCP, PPPoE, PPTP, L2TP, and Russia PPTP. If you are unsure of your connection method, please contact your Internet Service Provider. Static Used when your ISP provides you a set IP address that does not change. The IP information is manually ente[...]

  • Seite 11

    Maximum Idle Time: Time interval the machine can be idle before the PPPoE connection is disconnected. The Maximum Idle Time value is only used for the "On demand" and "Manual" reconnect modes. L2TP L2TP (Layer Two Tunneling Protocol) uses a virtual private network to connect to your ISP. This method of connection requires you to[...]

  • Seite 12

    The Maximum Transmission Unit (MTU) is a parameter that determines the largest packet size (in bytes) that the router will send to the WAN. If LAN devices send larger packets, the router will br eak them into smaller packets. Ideally, you should set this to match the MTU of the connection to your ISP. Typical values are 1500 bytes for an Ethernet c[...]

  • Seite 13

    LAN SETTING IP Address The IP address of the this device on the local area network. Assign any unused IP ad dress in the range of IP addresses available for the LAN. Subnet Mask The subnet mask of the local area network. DHCP Server Settings DHCP stands for Dynamic Host Configuration Protoc ol. The DHCP section is where you configure the built-in D[...]

  • Seite 14

    Once your router is properly configured and this option is enabled, the D HCP Server will manage the IP addresses and other network configuration information for computers and other d evices connected to your Local Area Network. There is no need for you to do this yourself. The computers (and other devices) connected to your LAN also need to have t[...]

  • Seite 15

    can be deleted by clicking the Delete icon. When you click the Edit icon, the item is highlighted, and the "Edit DHCP Reservation" section is activated for editing. QOS DHCP CLIENT LIST In this section you can see the connected LAN devices are currently receiving an IP addresses. 15[...]

  • Seite 16

    Wireless BASIC Radio On/Off This indicates the wireless operating status. The wireless can be turne d on or off by the slide switch. When the radio is on, the following parameters are in effect. Wireless Mode If all of the wireless devices you want to connect with this router can con nect in the same transmission mode, you can improve performance s[...]

  • Seite 17

    operates in the 2.4GHz frequency, it will allow the use of other 2.4GHz client devices (Wireless n/ g @ 54Mbps) to connect and access at the same time. 2.4GHz 802.11 n only – This wireless mode works in the 2.4GHz frequency range and will only allow the use of wireless n client devices to connect a nd access the TEW-691GR up to 450Mbps*. Although[...]

  • Seite 18

     20/40 20 Channel Width = 20 MHz 20/40 Channel Width = 20/40 MHz Guard Interval: Support Short/Long GI, the purpose of the guard inte rval is to introduce immunity to propagation delays, echoes and reflections, to which di gital data is normally very sensitive.  Long  Auto Long Guard Interval, 800 nsec Short Guard Interval, 400 nsec MCS: F[...]

  • Seite 19

    When an excessive number of wireless packet collisions are occurring, wireless perfor mance can be improved by using the RTS/CTS (Request to Send/Clear to Send) handshake protocol. The wireless transmitter will begin to send RTS frames (and wait for CTS) when data frame size in bytes is greater than the RTS Threshold. This setting should remain at [...]

  • Seite 20

    requires a longer key than 64-bit encryption. Keys are defined by entering in a string in HEX (hexadecimal - using characters 0-9, A-F) or ASCII (American Standard Code for Information Interchange - alphanumeric characters) format. ASCII form at is provided so you can enter a string that is easier to remember. The ASCII string is convert ed to HEX [...]

  • Seite 21

    MAC Address Enter the MAC address of a computer that you want to control with MAC filtering. Computers that have obtained an IP address from the router's DHCP server will be in the DHCP Client List. Select a device from the drop down menu. The rule of thumb:In mixed mode, multicast key has to be TKIP, but unicast key can be different per stati[...]

  • Seite 22

    Enable Enable the WPS feature. Lock Wireless Security Settings Locking the wireless security setting s prevents t he settings from being changed by any new external registrar using its PIN. Devices can still be added to the wireless netwo rk using WPS. PIN Settings A PIN is a unique number that can be used to add the router to an existing network o[...]

  • Seite 23

    Advanced DMZ DMZ Setting DMZ means "Demilitarized Zone." If an application has trouble working from behind the router, you can expose one computer to the Internet and run the application on that computer. When a LAN host is configured as a DMZ host, it becomes the destinat ion for all incoming packets that do not match some other incoming[...]

  • Seite 24

    ‧ To handle incoming connections that use a protocol other than ICMP, TCP, UDP, and IGMP (also GRE and ESP, when these protocols are enabled by the PPTP and IPSec Enable DMZ Putting a computer in the DMZ may expose that computer to a variety of security risks. Use of this option is only recommended as a last resort. DMZ IP Address Specify the LAN[...]

  • Seite 25

    The port that will be used on your internal network. Public Port The port that will be accessed from the Internet. Schedule Select a schedule for when the service will be enabled. If you do not see the schedule you need in the list of schedules. Clear Re-initialize this area of the screen, discarding an y changes you have made. ROUTING Add/Edit Rou[...]

  • Seite 26

    router. When trying to reach a particular destination, computers on your network will select the best route, ignoring unreachable routes. Interface Specifies the interface -- LAN or WAN -- that the IP packet must use to transit out of the router, when this route is used. Clear Re-initialize this area of the screen, discarding an y changes you have [...]

  • Seite 27

    SPECIAL APPLICATIONS Add/Edit Port Trigger Rule Enable Specifies whether the entry will be active or inactive. Name Enter a name for the Special Application Rule, for example Game App , which will help you identify the rule in the future. Alternatively, you can select from the Application list of common applications. Protocol Select the protocol us[...]

  • Seite 28

    This is a list of the defined applicatio n rules. Click the Enable checkbox at the left to directly activate or de-activate the entry. An entry can be changed by clicking the Edit icon o r can be deleted by clicking the Delete icon. GAMING Add/Edit Port Range Rule Use this section to add a Port Range Rule to the following list or to edit a rule alr[...]

  • Seite 29

    Clear Re-initialize this area of the screen, discarding an y changes you have made. Port Range Rule List This is a list of the defined Port Range Rules. Click t he Enable checkbox at the left to directly activate or de-activate the entry. An entry can be changed by clicking the Edit icon or can be deleted by clicking the Delete icon. When you click[...]

  • Seite 30

    Deny All Prevent all WAN users from accessing the relat ed capability. (LAN users are not affected by Inbound Filter Rules.) SCHEDULE Add/Edit Schedule Rule In this section you can add entries to the Schedul e Rules List below or edit existing entries. Name Give the schedule a name that is meaningful to you, such as "Weekday rule". Day(s)[...]

  • Seite 31

    ADVANCED NETWORK 31[...]

  • Seite 32

    Administrator MANAGEMENT Admin Password Enter a password for the user "admin", who will have full access to the Web-based management interface. Device Name The name of the router can be changed here. Enable Dynamic DNS Enable this option only if you have purchased your own domain name and registered with a dynamic DNS service provider. Th[...]

  • Seite 33

    Account Enter the account provided by your service provider. If the Dynamic DN S provider supplies only a key, enter that key in all three fields. Password Enter the password provided by your service prov ider. If the Dynamic DNS provider supplies only a key, enter that key in all three fields. UPLOAD FIRMWARE Once you have a firmware update on you[...]

  • Seite 34

    Export Settings ou to export and then save the router's configuration to a file on your computer. Be estore previously saved router configuration settings. nfiguration settings back to the settings that were in effect at the time the o uter. It is useful for restarting when you are not near t he device. IME This option allows y sure to save th[...]

  • Seite 35

    STATUS 35[...]

  • Seite 36

    Help Help section provides web-based explanations on each configurable field . 36[...]

  • Seite 37

    Network Glossary Access Point - A device that allows wi reless-eq uipped computers and other devices to com municate with a wired network. also used to expand the ran ge of a wireless net work. Ad-hoc - A group of wireless d evices communicating directly with each other (peer-to- peer) wi thout the use of an access point. AES ( A dvanced E ncryptio[...]

  • Seite 38

    Firewall - A set of related programs located at a netwo rk gateway server that protects the resources of a network from users from ot her networks. Firmware - The programming code that run s a networking device. FTP ( F ile T ransfer P rotocol) - A protocol used to tra n sfer files over a TCP/IP netwo rk. Full Duplex - The ability of a networking d[...]

  • Seite 39

    RADIUS ( R emote A uth entication D ial- I n U se r S ervice) - A proto col that use s an authentication server to control network access. RJ-45 ( R egistered J ack -45 ) - An Ethernet connector that holds up to eight wire s. Roaming - The ability to take a wireless device from one ac cess point' s range to another wit hout losi ng the connect[...]

  • Seite 40

    VPN ( V irtual P rivate N etwork) - A secu rity measure to protect data as it leaves one network and goes to an other over the Internet. WAN ( W ide A rea N etwo rk)- The Internet. WEP ( W ired E quivalent P rivacy) - A method of en cryp ting network data transmitted on a wireless network for greater security. WLAN ( W i reless L ocal A rea N etwor[...]

  • Seite 41

    Limited Warranty  TRENDnet  wa rrants  its  products  agains t  defects  in  ma terial  and  workmanship,  under  normal  use  and  service,  fo r  the  following  leng ths  of  time  from  the  dat e  of  purchase.   TEW ‐ 691GR  –  3  Ye a r [...]

  • Seite 42

    REVENUE  OR  PROFITS,  LOS S  OF  BUSINESS,  LOSS  OF  INFORMA TION  OR  DA T E,  OR  OT H E R  F INANCIAL  LOS S  ARISING  OUT  OF  OR  IN  CONNECTION  WITH  THE  SALE,  INST ALL A TION,  MAI NTENANCE,  USE,  PERFORMANCE,  FA I L U R E ,  OR  INTERRUPTIO N ?[...]

  • Seite 43

    43[...]