Trendnet TEW-611BRP Bedienungsanleitung

Stöbern Sie online oder laden Sie Bedienungsanleitung nach WLAN-Zugangspunkte Trendnet TEW-611BRP herunter. TRENDnet TEW-611BRP User's Manual Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken

Inhaltsverzeichnis

Seite 2 - Trademark recognition

10 Installation Considerations The TEW-611BRP MIMO Wireless Router lets you access your network, using a wireless connection, from virtually anywhere

Seite 3 - Table of Contents

11 Using the Configuration Menu Whenever you want to configure your TEW-611BRP, you can access the Configuration Menu by opening the Web-browser and

Seite 4

12 Basic The Basic tab provides the following configuration options: Wizard, WAN, LAN, DHCP, and Wireless. Basic_Wizard Internet Connection Setup

Seite 5 - Minimum System Requirements

13 Wireless Security Setup Wizard This wizard guides you through the following steps for setting up security for your wireless network: • Name you

Seite 6 - Wireless LAN Networking

14 Static WAN Mode Used when your ISP provides you a set IP address that does not change. The IP information is manually entered in your IP configur

Seite 7 - Introduction

15 • Always on: A connection to the Internet is always maintained. • On demand: A connection to the Internet is made as needed. • Manual: You h

Seite 8 - Hardware Overview

16 IP address of the router not to respond to ping commands. Pinging public WAN IP addresses is a common method used by hackers to test whether your W

Seite 9

17 Basic_LAN These are the settings of the LAN (Local Area Network) interface for the router. The router's local network (LAN) settings are confi

Seite 10 - Getting Started

18 Basic_DHCP DHCP stands for Dynamic Host Configuration Protocol. The DHCP section is where you configure the built-in DHCP Server to assign IP addre

Seite 11 - Using the Configuration Menu

19 DHCP IP Address Range These two values (from and to) define a range of addresses that the DHCP Server uses when assigning addresses to computers

Seite 12 - Basic_Wizard

2 Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital de

Seite 13 - Basic_WAN

20 or nearly full, you need to recover space in the table for new entries, and you know that some of the currently allocated leases are no longer need

Seite 14

21 Basic_Wireless The wireless section is used to configure the wireless settings for your Wireless router. Please note that changes made on this sect

Seite 15

22 Wireless Network Name When you are browsing for available wireless networks, this is the name that will appear in the list (unless Visibility Sta

Seite 16

23 WEP A method of encrypting data for wireless communication intended to provide the same level of privacy as a wired network. WEP is not as secure

Seite 17 - Basic_LAN

24 to generate session keys that are unique for each wireless client. Example: Wireless Networking technology enables ubiquitous communication WPA

Seite 18 - Basic_DHCP

25 Advanced The Advanced tab provides the following configuration options: Virtual Server, Special Applications, Gaming, Traffic Shaping, Routing, Acc

Seite 19

26 5. Select the Protocol - TCP 6. Ensure the schedule is set to Always 7. Click Save to add the settings to the Virtual Servers List 8. Repea

Seite 20

27 virtual server entries, you must still click the Save Settings button at the top of the page to make the changes effective and permanent. Virtual

Seite 21 - Basic_Wireless

28 Application Level Gateway (ALG) Configurations Here you can enable or disable ALGs. Some protocols and applications require special handling of t

Seite 22

29 192.168.0.255. The computer on the LAN whose MAC address is contained in the magic packet will be awakened. AOL Use this ALG if you are experien

Seite 23

3 Table of Contents Getting Started with the TEW-611BRP …………...3 Package Contents ...

Seite 24

30 Saves the new or edited Special Applications Rule in the following list. When finished updating the special applications rules, you must still clic

Seite 25 - Advanced

31 Edit/Add Game Rule Here you can add entries to the Game Rules List below, or edit existing entries. Example: You are hosting an online game se

Seite 26

32 Advanced_Traffic Shaping The Traffic Shaping™ feature helps improve your network gaming performance by prioritizing applications. By default, the T

Seite 27

33 Traffic Shaping Setup Enable Traffic Shaping This option is disabled by default. Enable it for better performance and experience with online ga

Seite 28

34 displayed here. Add/Edit Traffic Shaping Rule Automatic classification will be adequate for most applications, and specific Traffic Shaping Rul

Seite 29

35 Advanced_Routing Add/Edit Route Adds a new route to the IP routing table or edits an existing route. Enable: Specifies whether the entry will

Seite 30 - Advanced_Gaming

36 Advanced_Access Control The Access Control section allows you to control access in and out of devices on your network. Use this feature as Parental

Seite 31

37 Add/Edit Access Control Rule Access Control Rules specify what a LAN device is allowed to access. Here you can add entries to the Access Control

Seite 32 - Advanced_Traffic Shaping

38 Access Control Rules List This section shows the current access control rules. Rules can be changed by clicking the Edit icon, or deleted by cli

Seite 33

39 doubleclick.net. Save Saves the new or edited Allowed Web Site in the following list. When finished updating the Allowed Web Site List, you must

Seite 34

4 Getting Started with the TEW-611BRP Congratulations on purchasing the TEW-611BRP! This manual provides information for setting up and configuring th

Seite 35 - Advanced_Routing

40 Note: Misconfiguration of this feature can prevent any machine from accessing the network. In such a situation, you can regain access by activating

Seite 36 - Advanced_Access Control

41 Advanced_Firewall Enable SPI SPI ("stateful packet inspection" also known as "dynamic packet filtering") helps to prevent c

Seite 37

42 Advanced_Inbound Filter The Inbound Filter option is an advanced method of controlling data received from the Internet. With this feature you can c

Seite 38 - Advanced_WEB Filter

43 Source IP Range Define the ranges of Internet addresses this rule applies to. For a single IP address, enter the same address in both the Start a

Seite 39 - Advanced_MAC Address Filter

44 Fragmentation Threshold This setting should remain at its default value of 2346. Setting the Fragmentation value too low may result in poor perf

Seite 40

45 Advanced_Schedules Schedules can be created for use with enforcing rules. For example, if you want to restrict web access to Mon-Fri from 3pm to 8p

Seite 41 - Advanced_Firewall

46 End Time The end time is entered in the same format as the start time. The hour in the first box and the minutes in the second box. The end time

Seite 42 - Advanced_Inbound Filter

47 Tools The Tools tab provides the following configuration options: Admin, Time, Syslog, Email, System, Firmware and Dynamic DNS. Tools_Admin The Adm

Seite 43 - Advanced_Advanced Wireless

48 Admin Password Enter a password for the user "admin", who will have full access to the Web-based management interface. User Password

Seite 44

49 -> Internet Options -> Security -> Custom Level -> Medium). Click the Save to Windows Connect Now button, and the WCN technology will

Seite 45 - Advanced_Schedules

5 Package Contents z TEW-611BRP 108Mbps 11g MIMO Wireless Router z Power Adapter (5V DC, 2A) z CD-ROM with Software and Manual z Quick Installat

Seite 46

50 Time Configuration Time Zone Select your local time zone from pull down menu. Daylight Saving Enable Check this option if your location ob

Seite 47 - Tools_Admin

51 Tools_Syslog This section allows you to archive your log files to a Syslog Server. Enable Logging to Syslog Server Enable this option if you

Seite 48

52 Tools_Email The Email feature can be used to send the system log files, router alert messages, and firmware update notification to your email addre

Seite 49 - Tools_Time

53 SMTP Server Address Enter the SMTP server address for sending email. Enable Authentication If your SMTP server requires authentication, selec

Seite 50

54 Tools_System This section allows you to reboot the device, and restore the router to the factory default settings. Restoring the unit to the factor

Seite 51 - Tools_Syslog

55 Firmware Information Here are displayed the version numbers of the firmware currently installed in your router and the most recent upgrade that

Seite 52 - Tools_Email

56 Tools_Dynamic DNS The Dynamic DNS feature allows you to host a server (Web, FTP, Game Server, etc.) using a domain name that you have purchased (ww

Seite 53

57 Password or Key Enter the password or key provided by your service provider. If the Dynamic DNS provider supplies only a key, enter that key in a

Seite 54 - Tools_Firmware

58 Status The Status tab provides the following configuration options: Device Info, Wireless, Routing, Logs, Statistics and Active Sessions. Status_D

Seite 55

59 DHCP Connection Click the DHCP Release button to release the router's IP address. The router will not respond to IP messages from the WAN si

Seite 56 - Tools_Dynamic DNS

6 Wireless LAN Networking This section provides background information on wireless LAN networking technology. Consult the “Glossary” for definitions o

Seite 57

60 Signal This is a relative measure of signal quality. The value is expressed as a percentage of theoretical best quality. Signal quality can be red

Seite 58 - Status_Device info

61 Status_Logs The router automatically logs (records) events of possible interest in its internal memory. If there is not enough internal memory for

Seite 59 - Status_Wireless

62 Apply Log Settings Now Click this button after changing Log Options to make them effective and permanent. Refresh Clicking this button refresh

Seite 60 - Status_Routing

63 Sent The number of packets sent from the router. Received The number of packets received by the router. TX Packets Dropped The number of pa

Seite 61 - Status_Logs

64 Protocol The communications protocol used for the conversation. External The IP address and port number of the WAN-side application. NAT The

Seite 62 - Status_Statistics

65 Glossary A Access Control List ACL. This is a database of network devices that are allowed to access resources on the network. Access Point AP

Seite 63 - Status_Active Sessions

66 American Standard Code for Information Interchange. This system of characters is most commonly used for text files Attenuation The loss in stren

Seite 64

67 A time during processes when something causes the process to slowdown or stop all together Broadband A wide band of frequencies available for tr

Seite 65 - Glossary

68 The second layer of the OSI model. Controls the movement of data on the physical link of a network Database Organizes information so that it can

Seite 66

69 "Demilitarized Zone". A computer that logically sits in a "no-mans land" between the LAN and the WAN. The DMZ computer trades s

Seite 67

7 Introduction The TEW-611BRP MIMO Wireless Router is an 802.11g high-performance, wireless router that supports high-speed wireless networking at hom

Seite 68

70 A way of sending data through light impulses over glass or plastic wire or fiber File server A computer on a network that stores data so that t

Seite 69

71 A standard that provides consistency of voice and video transmissions and compatibility for videoconferencing devices Half-duplex Data cannot be

Seite 70

72 Infrastructure In terms of a wireless network, this is when wireless clients use an Access Point to gain access to the network Internet A syste

Seite 71

73 Java A programming language used to create programs and applets for web pages K Kbps Kilobits per second Kbyte Kilobyte L LAN Local Area N

Seite 72

74 MDIX Medium Dependent Interface Crossover, is an Ethernet port for a connection to a crossover cable MIB Management Information Base is a set of

Seite 73

75 Network Time Protocol Used to synchronize the time of all the computers in a network NIC Network Interface Card NTP Network Time Protocol

Seite 74

76 Port A logical channel endpoint in a network. A computer might have only one physical channel (its Ethernet channel) but can have multiple ports (

Seite 75

77 RJ-45 The most commonly used connection method for Ethernet RS-232C The interface for serial communication between computers and other related

Seite 76

78 Secure Shell is a command line interface that allows for secure connections to remote computers SSID Service Set Identifier is a name for a wirel

Seite 77

79 Universal Plug and Play A standard that allows network devices to discover each other and configure themselves to be a part of the network Upgr

Seite 78

8 Hardware Overview Real Panel DC-IN The DC power input connector is a single jack socket to supply power to the TEW-611BRP. Please use the Po

Seite 79

80 Windows Connect Now. A Microsoft method for configuring and bootstrapping wireless networking hardware (access points) and wireless clients, includ

Seite 80

Limited Warranty TRENDware warrants its products against defects in material and workmanship, under normal use and service, for the following lengt

Seite 81 - Limited Warranty

LIMITATION OF LIABILITY: TO THE FULL EXTENT ALLOWED BY LAW TRENDWARE ALSO EXCLUDES FOR ITSELF AND ITS SUPPLIERS ANY LIABILITY, WHETHER BASED IN CON

Seite 83

9 LEDs POWER LED A solid light indicates a proper connection to the power supply. LAN1~LAN4 LED A solid light indicates a connection to an Ethe

Kommentare zu diesen Handbüchern

Keine Kommentare