TRENDnet TEW-671BR manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of TRENDnet TEW-671BR, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of TRENDnet TEW-671BR one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of TRENDnet TEW-671BR. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of TRENDnet TEW-671BR should contain:
- informations concerning technical data of TRENDnet TEW-671BR
- name of the manufacturer and a year of construction of the TRENDnet TEW-671BR item
- rules of operation, control and maintenance of the TRENDnet TEW-671BR item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of TRENDnet TEW-671BR alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of TRENDnet TEW-671BR, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the TRENDnet service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of TRENDnet TEW-671BR.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the TRENDnet TEW-671BR item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    [...]

  • Page 2

    T able of Content 1.  INTRODUCTION .................................................................................................................. ............................ 1  1.1.  S UMMAR Y .............................................................................................................................. ................[...]

  • Page 3

    ii 8.1.  N ETWORK A DDRESS T RANSLA TION (NA T) ................................................................................................ 34  8.2.  - P OR T M APPING .............................................................................................................................. .......... 34  8.3.  P OR T F OR W [...]

  • Page 4

    1 1. Introduction 1.1. Summary TEW-671BR is a Dual Band Concurrent Wireless 1 1N Broadband Router with dual CPU that offers user unprece dented network performance. WMM support boosts streaming and multimedia intensive services. It support s 2.4GHz band under 802.1 1 b/g/n modes while providing 5GHz band to guarantee an interference-free network ac[...]

  • Page 5

    2 1.2. Wireless Perfor mance Considerations There are a number of factors that can impact the range of wireless devices. 1. Adjust your wireless devices so that the signal is traveling in a straight path, rather th an at an angle. The more material the signal has to pass through the more signal you will lose. 2. Keep the number of obstructions to a[...]

  • Page 6

    3 1.3. Package Content s Open the package carefully , and make sure that none of the items listed below are missing. Do not discard the packing materia ls, in case of return; the unit must be shipped back in its original package.  ‐ TEW -671BR Dual Band Wireless N Router ‐ Multi-Language Quick Inst allation Guide ‐ CD -ROM (User ’ s Guid[...]

  • Page 7

    4 2. Installation 2.1. System Requirement s T o begin using the TEW -671BR, make sure you meet the following as minim u m requireme nt s: z Operating System – Microsoft Windows 98S E/ME/XP/2000/VIST A z One Free Ethernet port on your PC or a Wireless client ada pter z External xDSL (ADSL) or Cable mode m with an Ethernet port (RJ-45). z PC/Laptop[...]

  • Page 8

    5 2.3. Login to TEW-671BR TEW -671BR provides web -interface for confi guration through we b browser , such as Internet Explorer (6.0 or above), Firefox or Sa fari. 1. Open your browser (e.g. Internet Explorer). 2. T ype in http://192.168.10.1 in the ad dress bar and click Enter . 3. Y ou will be prompt with login window , the default username and [...]

  • Page 9

    6 3. System 3.1. S t atus This page al l ows y ou t o mo ni tor t he c urr ent s tat us of y our r out er. Yo u ca n us e th e st atus page to quickly see if you have the lates t firmware available. (For most updated firmware, please visit http://www.trendnet.com/downloads ) System: You can see the unit up time, hardware information, serial number [...]

  • Page 10

    7 3.2. LAN The LAN tab reveals LAN settings whic h can be altered at will. If you are an entry lev e l user, try accessing a website from your browser. If you can access website without a glitch, just do not change any of these settings. LAN IP IP address: 192.168.10.1. It is the router’ s defau lt IP address. It can be changed bas ed on your own[...]

  • Page 11

    8 3.3. DHCP View the current LAN clients which are assi gned with an IP Address by the DHCP-server. This page shows all DHCP clients (LAN PCs) curr ently connected to your network. The table shows the assigned IP address, MAC address and expiration time for each DHCP leased client. Use the Refresh button to update the available information. Hit Ref[...]

  • Page 12

    9 3.4. Schedule This page allows user to set up schedule function for Firewall and Power Saving. Add schedule, edit schedule opti ons to allow configuration of firewall and power savings services. Fill in the sc h edule and select type of service. Cli c k Apply to implement those settings. The schedule table lists the pre-schedule service-runs. You[...]

  • Page 13

    10 3.6. Monitor Show histogram for network connection on WAN, LAN & WLAN. Auto refresh keeps information updated frequently.[...]

  • Page 14

    11 4. Wizard The wizard will take y ou step by step to setup your internet connection with the router . Please make sure you have a valid internet c onnection from your ADSL/Cable modem to the W AN port of TEW - 671BR with active LED. After the router finished scani ng the W AN port, you will see either of the followi ng 2 scr eens (section 4.1 &am[...]

  • Page 15

    12 4.3. WLAN Setup s We recommend you setting up the wireless en cryp tions immediately to protect your network. T o change security levels, please point to the bars, you can extend the security by clicking next to the existing bar . Security options from Low est se curity with no encryption, WEP (Open) then Medium securi ty WEP (Shared Key ), and [...]

  • Page 16

    13 5. Internet 5.1. S t atus This page shows the current Internet connection ty pe and status Note: The Renew button works only when you have a Dynamic IP connection. When you want to remotely manage the router, you can use the IP address shown here to access.[...]

  • Page 17

    14 5.2. Dynamic IP Use the MAC address when registering for Internet serv ice, and do not change it unless required by your Internet Serv ices Provider (ISP). If your ISP used the MAC address of the Ethernet card as an identifier , connect only the PC with the registered MAC address to the broadband router and click the Clone MAC Address button. Th[...]

  • Page 18

    15 5.4. PPPoE For PPPoE connection, you should have a l ogin name and password assigned from your provider . Login / Passw ord: Enter the PPPoE username and p assword (Case sensitive) Service Name: This is normally optional. Maximum T ransmission Unit (MTU): This is the maximum size of the packet s. Ty p e : Enable the Auto-reconnect option to auto[...]

  • Page 19

    16 5.5. PPTP PPTP allows the secure connection over the In ternet by simply dialing in a local point provided by your ISP provider . The following sc reen allows client PCs to establish a normal PPTP sessi on and provides hassle-free configu rat ion of the PPTP client on each client PC. Host Name: This is optional. MAC address: The default value is[...]

  • Page 20

    17 6. Wireless 2.4GHz & 5GHz TEW-671BR is a dual band concurrent product, ther efore two wireless radio configurations are provided. Both radios share the same features except for open band and available channels under “Basic” section. 6.1. Basic[...]

  • Page 21

    18 Radio: You can turn on/off wireless radio. If wi reless Radio is off, you cannot associate with AP through wireless. Mode: In this device, we support two operation modes which are AP router and WDS. Band: You can select the wireless standards running on your network env ironment. z 2.4G Band 2.4 GHz (802.11b/g): All 802.11b/g/n devices can conne[...]

  • Page 22

    19 6.2. Mode: WDS Wireless Distribution System, a system that enables the wireless interconnectio n of access point, allows a wireless net work to be expended using multiple access points without a wired backbon e to like them. Each WDS Router needs to set the same channel and encryption type. MAC address 1~4: Please enter the MAC address of the ne[...]

  • Page 23

    20 6.3. Advanced This section allows you to s et the advanced wireless options . The options included are Authentication Type, Fragment Threshold, RTS Threshold, Beacon Inte rv al, and Preamble Type. You should not change these parameters unless you know what effect the changes will have on the router. Note: if you are not sure how to configure the[...]

  • Page 24

    21 Channel Bandwidth: This is the range of frequenc ies that will be used. 20/40MHz provides the dual channel bandwidth support and gives you the connection speed of up to 300Mbps. 20MHz provides single channel bandwidth and it provides you the speed of up to 150Mbps. Preamble Type: The “Long Preamble” can provide better wireless LAN compa tibi[...]

  • Page 25

    22 Enable 802.1x Au then tication IEEE 802.1x is an authentication protocol. Every us er must use a valid account to login to this Access Point before accessing the wireless LAN. The authentication is processed by a RADIUS server. This mode only authentic ate s us ers by IEEE 802.1x, but it does not encrypt the data during communication. WEP Encryp[...]

  • Page 26

    23 Authentication Type: There are two authentication types: "Ope n Syst em" and "Shared Key" . When you select "Open System" , wireless stations can associate with this wireless router without WEP encryption. When you select "Shar ed K ey " , you sh ould also setup a WEP key in the "Encryptio n" pag[...]

  • Page 27

    24 WP A-R adius Encr y p tion Wi-Fi Protected Access ( WPA ) is an advanced security standard. You can use an external RADIUS server to authenticate wireless stations and provide the session key to encrypt data during communication. It supports TKIP ( WPA) or AES (WPA2) encryptions. Press Apply button when you are done.[...]

  • Page 28

    25 6.5. Filter This wireless router supports MAC Address Control, which prevents unauthoriz ed clients from accessing your wireless network. Enable wireless access control: Enable the wireless access control funct ion Addi n g an ad d re ss into th e l ist Enter the "MAC Address" and "Comment" of the wireless station to be added[...]

  • Page 29

    26 6.6. WPS (Wi-Fi Protected Setup) WPS is the simplest way to establish a connection between the wi reless clients and the wireless router. You don’t hav e to select the encryption mode and fill in a long encryption passphrase every time when you try to setup a wireless connection. You onl y nee d to press a button on both wireless client and wi[...]

  • Page 30

    27 Interface: If device is set to repeater mode, y ou can choose “Client” interface to conn ect with other AP by using WPS, otherwise you may choose “AP” interface to do WPS with other clients. WPS via Push Button: Press the button to star t the WPS process. The router will wait fo r the WPS request from the wireless devices within 2 minute[...]

  • Page 31

    28 6.8. Isolation Policy provides a list of control polici es. These settings defin e whether wireless or wired clients are able to “see” each in the LAN. z If you are offering Internet access to y our clients, ple ase enable W AN connection. z If you allow communication between Wireless clients please enable the second item. z If you allow com[...]

  • Page 32

    29 7. Firewall 7.1. Enable The Broadband router provides extensive firewall protection by restricting connection parameters, thus limiting the risk of hacker attacks, and defending against a wide array of common Internet attacks. However, for applications that require unrestric ted access to the Internet, you can configure a specific cli ent /serve[...]

  • Page 33

    30 Enable DMZ: Enable/disable DMZ LAN IP Address: Fill-in the IP address of a particular host in your LAN Network that will receive all the packets originally going to the WAN port/Public IP address above. Click Apply at the bottom of the screen to save the above configurations. Note: When enabling DMZ, you are allowing your PC to be accessed by pu[...]

  • Page 34

    31 7.5. MAC Filter If you want to restrict users from accessing certain Internet applications / services (e.g. Internet websites, email, FTP etc.), and then this is the place to set that configuration. Access Control allows users to define the traffic type permitted in your LAN. You can control which PC client can have access to these services. Ena[...]

  • Page 35

    32 7.6. IP Filter Enable IP Filtering: Check to enable or disable IP Filtering. Deny: If you selec t “ Deny ” then all clients will be all o wed to acc ess Internet accept for the clients in the list below. Allow: If you se lect “ Allow ” then all client s wi ll be denied to acc ess Interne t accept for the PCs in the list below. Add PC IP [...]

  • Page 36

    33 7.7. URL Filter You can block access to some Web sites from particular PCs by entering a full URL address or just keywords of the Web site. Enable URL Blocking: Enable or disable URL Blocking Add U RL Keyword Fill in “URL/Keyword” and then click Add . You can enter the full URL address or the keyword of the web si te you want to block. If yo[...]

  • Page 37

    34 8. Advanced 8.1. Network Address T ranslation (NA T) Network Address Translation (NAT) all ows multiple users at your local site to access the Internet through a single Public IP Address or mul tipl e Public IP Addresses. NAT provi des Firewall protection from hacker attacks and has the flexibility to allow you to map Private IP Addresses to Pub[...]

  • Page 38

    35 Description: description of this setting. Local IP: This is the local IP of the server behind the NAT firewall. Typ e: This is the protocol type to be forwarded. You can choose to forward “ TCP ” or “ UDP ” packets only, or select “ BOTH ” to forward both “ TCP ” and “ UDP ” packets. Port Range: The range of ports to be forwa[...]

  • Page 39

    36 Enable Port Forwarding: Enable or disable Port Forwarding. Description: The description of this setting. Local IP / L ocal Port: This is the LAN Client/Host IP address and Port number that the Public Port number packet will be sent to. Typ e: Select the port number protocol type (T CP, UDP or both). If you are unsure, then leave it to the defaul[...]

  • Page 40

    37 8.4. Port T riggering (Special Applications) Some applications require multiple connections, such as Internet games, video Conferencing, Internet telephony and others. In this section you can configure the router to support multiple connections for these types of applications. Enable Trigger Port: Enable or disable the Port Trigger func tion. Tr[...]

  • Page 41

    38 Remove Port Triggering If you want to remove Speci al Application settings from the " Current Trigger-Port Table ", select the Port Triggering settings y ou want to remove in the table and then click Delete Selected . If you want remove all Port Triggering settings from the table, just click the Delete All button. Click Reset will clea[...]

  • Page 42

    39 8.6. UPNP With UPnP, all PCs in you Intranet will discover this router automatically. So, you don’t have to configure your PC and it can easily acc ess the Internet through this router. Enable/Disable UPnP: You can enable or Dis ab le the UPnP feature here. After you enable the UPnP feature, all client systems that support UPnP, like Windows X[...]

  • Page 43

    40 8.7. Quality of Service (QoS) QoS can let you classify Internet application traffic by source/destination IP address and port number. You can assign priority for each type of application and reserve bandwidth for it. The packets of applications with higher pr iority will always go first. Lower priority applications will get bandwidth after highe[...]

  • Page 44

    41 Bandwidth Allocation: This can reserve / limit the throughput of specific protocols and port range. Y ou can set the upper bound and Lower bound. Ty p e : S pecify the direction of p ackets. Upload or download. IP range: S pecify the IP address range. Y ou could also fill one IP address Protocol: S pecify the packet type. The default ALL w ill p[...]

  • Page 45

    42 8.8. Routing Y ou can set enable S tatic Routing to let the rout er forward p ackets by y our routing policy . S tatic Route is used whe n network administra tors need to ro ute the packet s to a different subnet with certain p ath. This type of setup s is not for home users, you can skip this section if this does not apply to you. Destination L[...]

  • Page 46

    43 9. Tools Setup 9.1. Password You can change the password required to log into the broadband router's system web-based management. By default, the password is: admin. Passwords can contain 0 to 12 alphanumeric characters, and are case sensitive. Current Password: Fill in the current password to allow changing to a new password. New Password:[...]

  • Page 47

    44 9.2. Time The Time Zone allows your router to reference or base it s time on the settings configured here, which will affect functions such as Log entries and Firewall settings. Time Zone: Select the time zone of the country you are currently in. The router will set its time based on your selection. NTP Time Server: The router can set up externa[...]

  • Page 48

    45 Enable/Disable DDNS: Enable or disable the DDNS function of this router Server Address: Select a DDNS service provider Host Name: Fill in your static domain name that uses DDNS. Username: The account that your DDNS service provider assigned to you. Password: The password you set for the DDNS service account above Click Apply at the bottom of the[...]

  • Page 49

    46 9.6. Firmware This page allows you to upgrade the router’s firmware. To upgrade the firmware of your Broadband router, you need to downl oad the firmware file to your local hard disk, and enter that file name and path in the appropriate field on this page. You can also use the Browse button to find the firmware file on your PC. Once yo u’ve [...]

  • Page 50

    47 9.8. Rest art You can reset the router when system stops responding correctly or stop functions.[...]

  • Page 51

    48 Appendix A – FCC Interference Statement Federal Communication Commission Interference S t atement This equipme nt has been tested and found t o comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasona ble protection agains t harmful interfer ence in a re sidentia l [...]

  • Page 52

    49 Limite d  Wa r r a n t y   TRENDnet  war rants  its  pr oducts  against  def e cts  in  mat eria l  and  workmanshi p,  under  normal  use  and  service,  for  the  f ollowing  lengths  of  ti me  from  the  da te  of  purchase.    T[...]

  • Page 53

    50 DISCLO SE  THA T  THE  ALLEGED  DEFECT  IN  THE  PRODUCT  DOE S  NO T  EXIST  OR  WA S  CAU SED  BY  CUST OMER’S  OR  ANY  THIR D  PERSON’S  MISU SE,  NEGLECT ,  IMPROPER  INST ALL A TION  OR  TESTING ,  UNAUTHORIZED  A T TEMPTS  TO  REP AIR  OR  MOD[...]

  • Page 54

    51[...]