TRENDnet Not available manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of TRENDnet Not available, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of TRENDnet Not available one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of TRENDnet Not available. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of TRENDnet Not available should contain:
- informations concerning technical data of TRENDnet Not available
- name of the manufacturer and a year of construction of the TRENDnet Not available item
- rules of operation, control and maintenance of the TRENDnet Not available item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of TRENDnet Not available alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of TRENDnet Not available, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the TRENDnet service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of TRENDnet Not available.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the TRENDnet Not available item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    1[...]

  • Page 2

    Federal Communication Commission Interference S t atement This equipment has been tested and found t o comply with the limits for a Class B dig ital device, pursuant to Part 15 of the FCC Rules. These limits are d esigned to provide reasonable protection against harmful interference in a r esidential inst allation. This equ ipment generates, uses a[...]

  • Page 3

    - EN 301 489-1 V1.8.1: (2008-04) - Electromagnetic compatibility and R adio S pectrum Matters (ERM); ElectroMagnetic Compatibility (EMC) standard for radio equipment and services; Part 1: Common technical requirement s - EN 301 489-17 V1.3.2 (2008-04) - Electromagnetic compatibility and R adio spectrum Matters (ERM); ElectroMagnetic Compatibility ([...]

  • Page 4

    Table of contents Introduction .............................................................................................................................. ............... 5  Features .............................................................................................................................. ................ 5  Getting S t[...]

  • Page 5

    Introduction TRENDnet’s 450Mbp s Wireless N Gigabit Router , model TEW-691GR, redefines wireless route r performance. This router’s raw horsepower seamlessly streams HD movies to your entertainment center , transfers content from countless users, and generates record wireless coverag e. Gigabit Wide Area Network and Local Area Network ports tra[...]

  • Page 6

    Getting Started Congratulations on purchasing the TEW -691GR! Thi s manual provides information for setting up and configuring the TEW -691GR. This manual is intended for bot h home users and professionals. PACKAGE CONTENTS • TEW-691GR 450Mbps Wireless N Gigabit Router • CD-ROM (User’s Guide) • Multi-Language Quick Installation Guide • CA[...]

  • Page 7

    HARDWARE OVERVIEW LED Indications: (from left to right)  WPS  WLAN  Reserve  LAN1  LAN2  LAN3  LAN4  WAN  PWR Rear panel: (from left to right)  DC-IN  RESET  Power switch  Wi-Fi on/off switch  WAN  LAN1  LAN2  LAN3  LAN4 7[...]

  • Page 8

    WIRELESS PERFORMANCE CONSIDERATIONS There are a number of factors that can impact the range of wireless devices. 1. Adjust your wireless devices so that the signal is traveling in a straight path, rather than at an angle. The more material the signal has to pass through the more signal you will lose. 2. Keep the number of obstructions to a minimum.[...]

  • Page 9

    Using the Configuration Menu Whenever you want to configure your TEW-691GR, you can access the Configuration Menu th rough your PC by opening the Web-browser and typing in th e IP Address of the TEW-691GR. The TEW-691GR’s default IP Address is http://192.168.10.1 ¾ Open the Web browser. ¾ Type in the IP Address of the Router ( http://192.168.10[...]

  • Page 10

    Network WAN SETTING WAN Connection Type There are several connection types to choose fr om: Static IP, DHCP, PPPoE, PPTP, L2TP, and Russia PPTP. If you are unsure of your connection method, please contact your Internet Service Provider. Static Used when your ISP provides you a set IP address that does not change. The IP information is manually ente[...]

  • Page 11

    Maximum Idle Time: Time interval the machine can be idle before the PPPoE connection is disconnected. The Maximum Idle Time value is only used for the "On demand" and "Manual" reconnect modes. L2TP L2TP (Layer Two Tunneling Protocol) uses a virtual private network to connect to your ISP. This method of connection requires you to[...]

  • Page 12

    The Maximum Transmission Unit (MTU) is a parameter that determines the largest packet size (in bytes) that the router will send to the WAN. If LAN devices send larger packets, the router will br eak them into smaller packets. Ideally, you should set this to match the MTU of the connection to your ISP. Typical values are 1500 bytes for an Ethernet c[...]

  • Page 13

    LAN SETTING IP Address The IP address of the this device on the local area network. Assign any unused IP ad dress in the range of IP addresses available for the LAN. Subnet Mask The subnet mask of the local area network. DHCP Server Settings DHCP stands for Dynamic Host Configuration Protoc ol. The DHCP section is where you configure the built-in D[...]

  • Page 14

    Once your router is properly configured and this option is enabled, the D HCP Server will manage the IP addresses and other network configuration information for computers and other d evices connected to your Local Area Network. There is no need for you to do this yourself. The computers (and other devices) connected to your LAN also need to have t[...]

  • Page 15

    can be deleted by clicking the Delete icon. When you click the Edit icon, the item is highlighted, and the "Edit DHCP Reservation" section is activated for editing. QOS DHCP CLIENT LIST In this section you can see the connected LAN devices are currently receiving an IP addresses. 15[...]

  • Page 16

    Wireless BASIC Radio On/Off This indicates the wireless operating status. The wireless can be turne d on or off by the slide switch. When the radio is on, the following parameters are in effect. Wireless Mode If all of the wireless devices you want to connect with this router can con nect in the same transmission mode, you can improve performance s[...]

  • Page 17

    operates in the 2.4GHz frequency, it will allow the use of other 2.4GHz client devices (Wireless n/ g @ 54Mbps) to connect and access at the same time. 2.4GHz 802.11 n only – This wireless mode works in the 2.4GHz frequency range and will only allow the use of wireless n client devices to connect a nd access the TEW-691GR up to 450Mbps*. Although[...]

  • Page 18

     20/40 20 Channel Width = 20 MHz 20/40 Channel Width = 20/40 MHz Guard Interval: Support Short/Long GI, the purpose of the guard inte rval is to introduce immunity to propagation delays, echoes and reflections, to which di gital data is normally very sensitive.  Long  Auto Long Guard Interval, 800 nsec Short Guard Interval, 400 nsec MCS: F[...]

  • Page 19

    When an excessive number of wireless packet collisions are occurring, wireless perfor mance can be improved by using the RTS/CTS (Request to Send/Clear to Send) handshake protocol. The wireless transmitter will begin to send RTS frames (and wait for CTS) when data frame size in bytes is greater than the RTS Threshold. This setting should remain at [...]

  • Page 20

    requires a longer key than 64-bit encryption. Keys are defined by entering in a string in HEX (hexadecimal - using characters 0-9, A-F) or ASCII (American Standard Code for Information Interchange - alphanumeric characters) format. ASCII form at is provided so you can enter a string that is easier to remember. The ASCII string is convert ed to HEX [...]

  • Page 21

    MAC Address Enter the MAC address of a computer that you want to control with MAC filtering. Computers that have obtained an IP address from the router's DHCP server will be in the DHCP Client List. Select a device from the drop down menu. The rule of thumb:In mixed mode, multicast key has to be TKIP, but unicast key can be different per stati[...]

  • Page 22

    Enable Enable the WPS feature. Lock Wireless Security Settings Locking the wireless security setting s prevents t he settings from being changed by any new external registrar using its PIN. Devices can still be added to the wireless netwo rk using WPS. PIN Settings A PIN is a unique number that can be used to add the router to an existing network o[...]

  • Page 23

    Advanced DMZ DMZ Setting DMZ means "Demilitarized Zone." If an application has trouble working from behind the router, you can expose one computer to the Internet and run the application on that computer. When a LAN host is configured as a DMZ host, it becomes the destinat ion for all incoming packets that do not match some other incoming[...]

  • Page 24

    ‧ To handle incoming connections that use a protocol other than ICMP, TCP, UDP, and IGMP (also GRE and ESP, when these protocols are enabled by the PPTP and IPSec Enable DMZ Putting a computer in the DMZ may expose that computer to a variety of security risks. Use of this option is only recommended as a last resort. DMZ IP Address Specify the LAN[...]

  • Page 25

    The port that will be used on your internal network. Public Port The port that will be accessed from the Internet. Schedule Select a schedule for when the service will be enabled. If you do not see the schedule you need in the list of schedules. Clear Re-initialize this area of the screen, discarding an y changes you have made. ROUTING Add/Edit Rou[...]

  • Page 26

    router. When trying to reach a particular destination, computers on your network will select the best route, ignoring unreachable routes. Interface Specifies the interface -- LAN or WAN -- that the IP packet must use to transit out of the router, when this route is used. Clear Re-initialize this area of the screen, discarding an y changes you have [...]

  • Page 27

    SPECIAL APPLICATIONS Add/Edit Port Trigger Rule Enable Specifies whether the entry will be active or inactive. Name Enter a name for the Special Application Rule, for example Game App , which will help you identify the rule in the future. Alternatively, you can select from the Application list of common applications. Protocol Select the protocol us[...]

  • Page 28

    This is a list of the defined applicatio n rules. Click the Enable checkbox at the left to directly activate or de-activate the entry. An entry can be changed by clicking the Edit icon o r can be deleted by clicking the Delete icon. GAMING Add/Edit Port Range Rule Use this section to add a Port Range Rule to the following list or to edit a rule alr[...]

  • Page 29

    Clear Re-initialize this area of the screen, discarding an y changes you have made. Port Range Rule List This is a list of the defined Port Range Rules. Click t he Enable checkbox at the left to directly activate or de-activate the entry. An entry can be changed by clicking the Edit icon or can be deleted by clicking the Delete icon. When you click[...]

  • Page 30

    Deny All Prevent all WAN users from accessing the relat ed capability. (LAN users are not affected by Inbound Filter Rules.) SCHEDULE Add/Edit Schedule Rule In this section you can add entries to the Schedul e Rules List below or edit existing entries. Name Give the schedule a name that is meaningful to you, such as "Weekday rule". Day(s)[...]

  • Page 31

    ADVANCED NETWORK 31[...]

  • Page 32

    Administrator MANAGEMENT Admin Password Enter a password for the user "admin", who will have full access to the Web-based management interface. Device Name The name of the router can be changed here. Enable Dynamic DNS Enable this option only if you have purchased your own domain name and registered with a dynamic DNS service provider. Th[...]

  • Page 33

    Account Enter the account provided by your service provider. If the Dynamic DN S provider supplies only a key, enter that key in all three fields. Password Enter the password provided by your service prov ider. If the Dynamic DNS provider supplies only a key, enter that key in all three fields. UPLOAD FIRMWARE Once you have a firmware update on you[...]

  • Page 34

    Export Settings ou to export and then save the router's configuration to a file on your computer. Be estore previously saved router configuration settings. nfiguration settings back to the settings that were in effect at the time the o uter. It is useful for restarting when you are not near t he device. IME This option allows y sure to save th[...]

  • Page 35

    STATUS 35[...]

  • Page 36

    Help Help section provides web-based explanations on each configurable field . 36[...]

  • Page 37

    Network Glossary Access Point - A device that allows wi reless-eq uipped computers and other devices to com municate with a wired network. also used to expand the ran ge of a wireless net work. Ad-hoc - A group of wireless d evices communicating directly with each other (peer-to- peer) wi thout the use of an access point. AES ( A dvanced E ncryptio[...]

  • Page 38

    Firewall - A set of related programs located at a netwo rk gateway server that protects the resources of a network from users from ot her networks. Firmware - The programming code that run s a networking device. FTP ( F ile T ransfer P rotocol) - A protocol used to tra n sfer files over a TCP/IP netwo rk. Full Duplex - The ability of a networking d[...]

  • Page 39

    RADIUS ( R emote A uth entication D ial- I n U se r S ervice) - A proto col that use s an authentication server to control network access. RJ-45 ( R egistered J ack -45 ) - An Ethernet connector that holds up to eight wire s. Roaming - The ability to take a wireless device from one ac cess point' s range to another wit hout losi ng the connect[...]

  • Page 40

    VPN ( V irtual P rivate N etwork) - A secu rity measure to protect data as it leaves one network and goes to an other over the Internet. WAN ( W ide A rea N etwo rk)- The Internet. WEP ( W ired E quivalent P rivacy) - A method of en cryp ting network data transmitted on a wireless network for greater security. WLAN ( W i reless L ocal A rea N etwor[...]

  • Page 41

    Limited Warranty  TRENDnet  wa rrants  its  products  agains t  defects  in  ma terial  and  workmanship,  under  normal  use  and  service,  fo r  the  following  leng ths  of  time  from  the  dat e  of  purchase.   TEW ‐ 691GR  –  3  Ye a r [...]

  • Page 42

    REVENUE  OR  PROFITS,  LOS S  OF  BUSINESS,  LOSS  OF  INFORMA TION  OR  DA T E,  OR  OT H E R  F INANCIAL  LOS S  ARISING  OUT  OF  OR  IN  CONNECTION  WITH  THE  SALE,  INST ALL A TION,  MAI NTENANCE,  USE,  PERFORMANCE,  FA I L U R E ,  OR  INTERRUPTIO N ?[...]

  • Page 43

    43[...]