TRENDnet TEW-637AP manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of TRENDnet TEW-637AP, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of TRENDnet TEW-637AP one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of TRENDnet TEW-637AP. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of TRENDnet TEW-637AP should contain:
- informations concerning technical data of TRENDnet TEW-637AP
- name of the manufacturer and a year of construction of the TRENDnet TEW-637AP item
- rules of operation, control and maintenance of the TRENDnet TEW-637AP item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of TRENDnet TEW-637AP alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of TRENDnet TEW-637AP, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the TRENDnet service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of TRENDnet TEW-637AP.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the TRENDnet TEW-637AP item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    1[...]

  • Page 2

    Federal Communication Commission Interference S t atement This equipment has been tested and found to comply with the limits for a Class B digita l device, pursuant to Part 15 of the FCC Rules. These lim its are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates uses and ca[...]

  • Page 3

    European Union Notice: Radio products with the CE marking comply with the R&TTE Directive (1999/5/EC), the EMC Directive (89/336/EEC) and the Low Voltage Directive (73/23/ EEC) issued by the Commission of the European Community. Compliance with these directives implies co nformity to the fo llowing European Norms: z EN 60950 Product Safety z EN[...]

  • Page 4

    Table of Contents Getting Started with the TEW-637AP .................... .............5 Package Contents ........... .................................... ........….6 Minimum System Requirements . .......................... .......…6 Introduction ................. ............... ................ ............. .............7 Features...........[...]

  • Page 5

    Package Content s z TEW-637AP 11n (Draft) AP z CAT-5 Ethernet Cable (the TEW-637AP’s Ethernet ports is Auto-MDIX) z Power Adapter (12.0V, 1.0A) z CD-ROM with Manual & Wizard z Quick Installation Guide Using a power supply with a different voltage than the one included with your product will cause damage and void the warranty for this product.[...]

  • Page 6

    Introduction The TEW-637AP is an 802.11n (draft 2.0) high-performance, wireless AP that supports high-speed wireless networking at home, at work or in public places. Unlike most Access Points, the TEW-637AP provides data transfers at up to 300 Mbps when used with other 11n products. This AP is backwards compatible with 802.11b/g products. This mea [...]

  • Page 7

    Hardware Overview Auto MDI/MDIX 10/100Mbps LAN Ports This port automatically senses the cable type when connecting to Router. Reset Button Pressing the reset button restores the AP to its original factory default settings. DC-IN The DC power input connector is a single jack socket to supply power to the TEW-637AP. Please use the Power Adapter provi[...]

  • Page 8

    WLAN LED A solid light indicates that the wireless segment is read y. This LED blinks during wireless data transmission. WPS LED This LED blinks during WPS function is enabled. LAN LED A solid light indicates a connection to a Router on the LAN port. This LED blinks during data transmission. POWER LED A solid light indicates a proper connection to [...]

  • Page 9

    Getting Started For a typical wireless setup at home, please do the following: 1 Connect one end of the provided network cable into your computer’s network port, and connect the other end of the provided network cable into the TEW-637AP’s Ethernet port. 2 Plug the power adapter to outlay, and connect the power jack to the TEW-637AP. 3 Verify th[...]

  • Page 10

    9 To change IP address, you can sele ct “IP address setting” and click Next button to continue. 10. The default IP address is 192.168.10.100, you can choose to obtain network setting automatically, or set the IP address manually. After setting, click Next to complete it. 11. To setup TEW-637AP or add/connect your wireless client to this AP, ple[...]

  • Page 11

    12. Select WPS to connect your wireless client device to this AP, and click Next button. 13. Select one of the Wi-Fi Protected Set up methods to connect your wireless client device to this AP. Use Push Button, click Next button to continue. You also need to enable WPS function of the wireless client device to make connection. 14. Use PIN and enter [...]

  • Page 12

    15. To set TEW-637AP security, select Manual setup and click Next button 17. Enter SSID of TEW-637AP, click Next button. 18. To disable Security Mode, select None and click Next button. Page 12[...]

  • Page 13

    19. To use WEP security, select WEP and click Next button. Select 64-b it or 128-bit WEP key length, and enter your WEP key. For 64-bit encryption, enter 10 hexadecimal characters, For 128-bit encryption, ent er 26 hexadecimal characters. Click Next to continue the setting. To use WPA-PSK security, select WPA-PSK and click Next button. Select WPA M[...]

  • Page 14

    21. Save you setting to a text file in a desired location. Page 14[...]

  • Page 15

    22. Congratulations you have c onfigured you TEW-637AP. Page 15[...]

  • Page 16

    Using the Configuration Menu Whenever you want to configure your TEW-637AP, you can access the Configuration Menu by opening the Web-browser and typing in the IP Address of the TEW-637AP. ¾ Open the Web browser. ¾ Type in the current IP Address of the AP (i.e. http://192.168.10.1 00 ). If you have changed the default IP Address assigned to the TE[...]

  • Page 17

    Network The Network tab provides the following configuration options: LAN Setting. Network LAN Setting These are the settings o f the LAN (Local Area Network) interface for the Access Point. The Access Point's local network (LAN) settings are conf igured based on the IP Address a nd Subnet Mask assign ed in this section. The IP address is also[...]

  • Page 18

    The subnet mask of the local area network. Default Gateway The IP address of the router on the loc al area network. Choose “DHCP (Auto Config)” if your router supports DH CP and you want the router to assign an IP address to the AP . Page 18[...]

  • Page 19

    Wireless The wireless section is used to confi gure the wirele ss settings for your A ccess Po int. Note that changes made in this section ma y also need to be duplic ated on wireless clients that you want to connect to your wireless network. To protect your privacy, use the wir eless security mode to configure the wireless security feat ures. The [...]

  • Page 20

    Radio On/Off Press this button to toggle radio On/off . Page 20[...]

  • Page 21

    Network Mode If all of the wireless d evices you want t o connec t with this Access P oint can connect in the same transmission mode, you can improve performa nce slig htly by choosing th e appropriate "Only" mode. If you have some devices t hat use a different tr ansmission mode, choose the appropriat e "Mixed" mode. Network Na[...]

  • Page 22

    This parameter represents transmissi on rate. By default (A ut o) the fastest possible transmission rate will be selected. Y ou have the opti on of selecting the spee d if necessary. Reserve Direction Grant (RDG) Disable or enable reser ve direction g rant. Default is enabled. Extension Channel When 20/40 channel ba ndwidth has been chosen, you sho[...]

  • Page 23

    Wireless Advanced Beacon Interval Beacons are packets sen t by a wirel ess Access Point to synchronize wir eless devices. Specify a Beacon Period value between 20 and 1000. The de fault value is set to 100 milliseconds. Data Beacon Rate (DTIM) Page 23[...]

  • Page 24

    A DTIM is a countdown informing clients of the ne xt window for listening to broadcast and multicast messages. When the wireless Access Po int has buffered broadcast or m ulticast messages for associated clients, it sends the next DTIM with a DTIM Interval value. Wirele ss clients detect the beacons and awaken to receive the broad cast and multicas[...]

  • Page 25

    Wireless MAC Filter The MAC address filter s ection can be used t o filter network access by machines based on the unique MAC addresses of their network adapter(s) . It is mo st useful to prevent unauthorized wireless devices from connecting to your netw ork. A MAC address is a uniqu e ID assigned by the manufacturer of the netwo rk adap t er. Poli[...]

  • Page 26

    Wireless Security Page 26[...]

  • Page 27

    SSID choice Choose the SSID which need to implement security. Security Mode You can disable s ecurity mode, or y ou can choo se following modes to enable security – Open, Shared , WEPauto, WPA, WPA-PSK, WPA2 , WPA2-PSK, WPA-PSK/WPA2-PSK Page 27[...]

  • Page 28

    Wireless WPS You can setup securit y easily by choosing PI N or PBC method to do Wi -Fi Protected Setup. Page 28[...]

  • Page 29

    WPS mode Two WPS modes ca n be selected – PIN & PBC. If PIN is selected, you s hould enter PIN cod e of your wireless client device to get wir eless connection with this AP. Page 29[...]

  • Page 30

    Wireless Station List You can monitor stations wh ich associated to this AP. Page 30[...]

  • Page 31

    Administrator This Administrator section is used to set password for acce ss to the Web-based management, also provide function of firmware upgrade. The Administrator tab provides the following configuration options: Management, Upload Firmware, Settings Management & Status. System Management At this page, you can configure adm inistrator accou[...]

  • Page 32

    Administrator Upload Firmware By assigning firmware location, you can upload firmware at this page. Page 32[...]

  • Page 33

    Administrator Settings Management You can save system settings by exporting them to a configuration file, restore them by importing the file, or reset them to factory default. Page 33[...]

  • Page 34

    Administrator Status You can check system information and network configurations on this page. Page 34[...]

  • Page 35

    Glossary A Access Control List ACL. This is a database of network devices that are allowed to access re sources on the network. Access Point AP. Device that allows wireless clients to connect to it and access the network Ad-hoc network Peer-to-Peer network between wireless clients Address Resolution Protocol ARP. Used to map MAC addresses to IP add[...]

  • Page 36

    Bandwidth The maximum amount of bytes or bits per second that can be transmitted to and from a network device Beacon A data frame by which one of the stations in a Wi-Fi network periodica lly broadcasts network control data to other wireless stations. Bit rate The amount of bits that pass in given amount of time Bit/sec Bits per second BOOTP Bootst[...]

  • Page 37

    dBd Decibels related to dipole antenna dBi Decibels relative to isotropic radiator dBm Decibels relative to one milliwatt Decrypt To unscramble an encrypted message back into plain text Default A predetermined value or setting that is used by a program when no user input has been entered for this value or setting DHCP Dynamic Host Configuration Pro[...]

  • Page 38

    Extensible Authentication Protocol Encryption Converting data into cyphertext so that it cannot be easily read Ethernet The most widely used technology for Local Area Networks. F File server A computer on a network that stores data so that the other computers on the network can all access it File sharing Allowing data from computers on a network to[...]

  • Page 39

    GUI Graphical user interface H Half-duplex Data cannot be transmitted and received at the same time Hashing Transforming a string of characters into a shorter string with a predefined length Hexadecimal Characters 0-9 and A-F Hop The action of data packets being transmitted from one AP to another Host Computer on a network HTTP Hypertext Transfer P[...]

  • Page 40

    In terms of a wireless network, this is when wireless clients use an Access Point to gain access to the network Internet A system of worldwide networks which use TCP/IP to allow for resources to be accessed from computers around the world Internet Explorer A World Wide Web browser created and provided by Microsoft Internet Protocol The method of tr[...]

  • Page 41

    K Kbps Kilobits per second Kbyte Kilobyte L LAN Local Area Network Latency The amount of time that it takes a packet to get from the one point to another on a net work. Also referred to as delay LED Light Emitting Diode Legacy Older devices or technology Local Area Network A group of computers in a building that usually access files from a server L[...]

  • Page 42

    Management Information Base is a set of objects that can be managed by using SNMP Modem A device that Modulates digital signals from a co mputer to an analog signal in order to transmit the signal over phone lines. It also Demodulates the analog signals coming from the phone lines to digital signals for your computer MPPE Microsoft Point-to-Point E[...]

  • Page 43

    Network Time Protocol O OFDM Orthogonal Frequency-Division Multiplexing is the modulation technique for both 802.11a and 802.11g OSI Open Systems Interconnection is the reference model for how data should travel between two devices on a network OSPF Open Shortest Path First is a routing protocol that is used m ore than RIP in larger scale networks [...]

  • Page 44

    PPTP Point-to-Point Tunneling Protocol is used for creating VPN tunnels over the Internet between two networks Preamble Used to synchronize communication timing between devices on a network Q QoS Quality of Service R RADIUS Remote Authentication Dial-In User Service allows for remote users to dial into a central server and be authenticated in order[...]

  • Page 45

    Session key An encryption and decryption key that is generated for every communication session between two computers Session layer The fifth layer of the OSI model which coordinates the connection and communication between applications on both ends Simple Mail Transfer Protocol Used for sending and receiving email Simple Network Management Protocol[...]

  • Page 46

    System Logger -- a distributed logging interface for collecting in one place the logs from different sources. Originally written for UNIX, it is now available for other operating systems, including Windows. T TCP Transmission Control Protocol TCP/IP Transmission Control Protocol/Internet Protocol TCP Raw A TCP/IP protocol for transmitting streams o[...]

  • Page 47

    Uniform Resource Locator is a unique address for files accessible on the Internet USB Universal Serial Bus UTP Unshielded Twisted Pair V Virtual Private Network VPN: A secure tunnel over the Internet to connect remote offices or user s to their company's network VLAN Virtual LAN Voice over IP Sending voice information over the Internet as oppo[...]

  • Page 48

    Wireless Fidelity Wi-Fi Protected Access An updated version of security for wireless networks that provides authentication as well as encryption Wide Area Network The larger network that your LAN is connected to, which may be the Internet itself, or a regional or corporate network Wireless ISP A company that provides a broadband Internet connection[...]

  • Page 49

    Page 49[...]