background image

74 

AARP. Used to map the MAC addresses of Apple computers to their AppleTalk network 
addresses, so that conversions can be made in both directions. 

Application layer 

7th Layer of the OSI model. Provides services to applications to ensure that they can 
communicate properly with other applications on a network. 

ASCII 

American Standard Code for Information Interchange. This system of characters is most 
commonly used for text files 

Attenuation 

The loss in strength of digital and analog signals. The loss is greater when the signal is being 
transmitted over long distances. 

Authentication 

To provide credentials, like a Password, in order to verify that the person or device is really who 
they are claiming to be 

Automatic Private IP Addressing 

APIPA. An IP address that that a Windows computer will assign itself when it is configured to 
obtain an IP address automatically but no DHCP server is available on the network 

Backward Compatible 

The ability for new devices to communicate and interact with older legacy devices to guarantee 
interoperability 

Bandwidth 

The maximum amount of bytes or bits per second that can be transmitted to and from a network 
device 

Basic Input/Output System 

BIOS. A program that the processor of a computer uses to startup the system once it is turned 
on 

Baud 

Data transmission speed 

Beacon 

A data frame by which one of the stations in a Wi-Fi network periodically broadcasts network 
control data to other wireless stations.   

Summary of Contents for TEW-800MB

Page 1: ...802 11ac draft 2 0 3x3 Gigabit Wireless Router TEW 812DRU TEW 800MB Rev 0 1 User Manual ...

Page 2: ...rent from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help FCC Caution Any changes or modifications not expressly approved by the party responsible for compliance could void the user s authority to operate this equipment This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device may ...

Page 3: ...armonized EN covering essential requirements under article 3 2 of the R TTE Directive EN 301 489 1 V1 8 1 2008 04 Electromagnetic compatibility and Radio Spectrum Matters ERM ElectroMagnetic Compatibility EMC standard for radio equipment and services Part 1 Common technical requirements EN 301 489 17 V2 1 1 2009 05 Electromagnetic compatibility and Radio spectrum Matters ERM ElectroMagnetic Compat...

Page 4: ...3 output power may be limited to 10 mW EIRP in the frequency range of 2454 2483 5 MHz For detailed information the end user should contact the national spectrum authority in France ...

Page 5: ... 5 EC Español Spanish Por medio de la presente nombre del fabricante declara que el clase de equipo cumple con los requisitos esenciales y cualesquiera otras disposiciones aplicables o exigibles de la Directiva 1999 5 CE Ελληνική Greek ΜΕ ΤΗΝ ΠΑΡΟΥΣΑ name of manufacturer ΗΛΩΝΕΙ ΟΤΙ type of equipment ΣΥΜΜΟΡΦΩΝΕΤΑΙ ΠΡΟΣ ΤΙΣ ΟΥΣΙΩ ΕΙΣ ΑΠΑΙΤΗΣΕΙΣ ΚΑΙ ΤΙΣ ΛΟΙΠΕΣ ΣΧΕΤΙΚΕΣ ΙΑΤΑΞΕΙΣ ΤΗΣ Ο ΗΓΙΑΣ 1999 5 ΕΚ ...

Page 6: ...rme com os requisitos essenciais e outras disposições da Directiva 1999 5 CE Slovensk o Slovenian Ime proizvajalca izjavlja da je ta tip opreme v skladu z bistvenimi zahtevami in ostalimi relevantnimi določili direktive 1999 5 ES Slovensk y Slovak Meno výrobcu týmto vyhlasuje že typ zariadenia spĺňa základné požiadavky a všetky príslušné ustanovenia Smernice 1999 5 ES Suomi Finnish Valmistaja manu...

Page 7: ...N 60950 Product Safety EN 300 328 Technical requirement for radio equipment EN 301 489 1 17 General EMC requirements for radio equipment EN 301 893 V1 5 1 2008 12 Trademark recognition All product names used in this manual are the properties of their respective owners and are acknowledged ...

Page 8: ...wing conventions are used in this manual THE NOTE SYMBOL INDICATES ADDITIONAL INFORMATION ON THE TOPIC AT HAND THE TIP SYMBOL INDICATES HELPFULL INFORMATION AND TIPS TO IMPROVE YOUR NETWORK EXPERIENCE THE CAUTION SYMBOL ALERTS YOU TO SITUATIONS THAT MAY DEGRADE YOUR NETWORKING EXPERIENCE OR COMPROMISE LIKE NOTES AND TIPS THE IMPORTANT SYMBOL INDICATES INFORMATION THAT CAN IMPROVE NETWORKING THIS I...

Page 9: ...uick Installation Guide Using a power supply with a different voltage than the one included with your product will cause damage and void the warranty for this product Minimum System Requirements Ethernet Based Cable or DSL Modem Computers with Windows Macintosh or Linux based operating systems with an installed Ethernet adapter and CD ROM Drive Internet Explorer Version 6 0 or higher Mozilla or Sa...

Page 10: ...on data rate again until it reaches the highest available transmission rate Types of Wireless Networks Wireless LAN networking works in either of the two modes ad hoc and infrastructure In infra structure mode wireless devices communicate to a wired LAN via access points Each access point and its wireless devices are known as a Basic Service Set BSS An Extended Service Set ESS is two or more BSSs ...

Page 11: ...10 ...

Page 12: ...am below communication is done through the access points which relay data packets to other wireless stations or devices connected to the wired network Wireless stations can then access resources such as a printer on the wired network In an ESS environment users are able to move from one access point to another without losing the ...

Page 13: ...12 connection In the diagram below when the user moves from BSS 1 to BSS 2 the WLAN client devices automatically switches to the channel used in BSS 2 Roaming in an ESS network diagram ...

Page 14: ...dards High speed data rates of up to 1 3Gbps with 802 11ac and 450Mbps with 802 11n on both 2 4GHz and 5GHz band IPv6 Internet Protocol v6 support FTP and Samba USB storage support Share USB peripheral devices over the network including flash drives external hard drives or printers Control Center utility supports Windows 8 32 64 bit 7 32 64 bit Vista 32 64 bit Windows XP 32 64 bit and Mac OS X 10 ...

Page 15: ...vary depending on interference network traffic building materials and other conditions Control Center utility installation required for each computer in order to access the print server For maximum performance of up to 1 3Gbps use with a 3x3 802 11ac wireless adapter Hardware Overview LED Indications from bottom to top PWR WAN LAN1 LAN2 LAN3 LAN4 Wireless WPS USB Rear panel from bottom to top DC I...

Page 16: ...45 degree angle appears to be almost 3 feet 1 meter thick At a 2 degree angle it looks over 42 feet 14 meters thick Position devices so that the signal will travel straight through a wall or ceiling instead of at an angle for better reception 3 Building Materials can impede the wireless signal a solid metal door or aluminum studs may have a negative effect on range Try to position wireless devices...

Page 17: ...Ds are light 3 To configure the router open your browser type http 192 168 10 1 into the address bar and click Go to get to the setup wizard page 4 At the Password prompt the User name is admin and password is admin Enter default username and password and press ok ...

Page 18: ... easy way to set up the TEW 812DRU step by step The Wizard will teach user to set up the TEW 812DRU just few steps 5 You could click Launch Internet ConnectionSetup Wizard and follow Wizard to complete your setting example ...

Page 19: ...18 If you choice Static IP Address Connection than press Next ...

Page 20: ...19 Then press Apply ...

Page 21: ...20 6 You also could click Launch Wireless Security Setup Wizard and follow Wizard to complete your setting example ...

Page 22: ...21 Select the 2 4G 5G security mode ...

Page 23: ...22 Enter your password ...

Page 24: ...23 Press Apply ...

Page 25: ... your connection method please contact your Internet Service Provider Static Used when your ISP provides you a set IP address that does not change The IP information is manually entered in your IP configuration settings You must enter the IP address Subnet Mask Gateway Primary DNS Server and Secondary DNS Server Your ISP provides you with all of this information DHCP ...

Page 26: ...rovided by your Internet Service Provider to gain access to the Internet Reconnect Mode Typically PPPoE connections are not always on The router allows you to set the reconnection mode The settings are Always on A connection to the Internet is always maintained On demand A connection to the Internet is made as needed Manual You have to open up the Web based management interface and click the Conne...

Page 27: ...vides the values for the following fields for WAN Interface IP Setting IP Address Subnet Mask Default Gateway Dynamic If the ISP s servers assign the router s IP addressing upon establishing a connection select this option PPTP PPTP Point to Point Tunneling Protocol uses a virtual private network to connect to your ISP This method of connection is primarily used in Europe This method of connection...

Page 28: ...mputer or router used to initially connect to their service The ISP will then only grant Internet access to requests from a computer or router with this particular MAC address This router has a different MAC address than the computer or router that initially connected to the ISP If you need to change the MAC address of the rounter s WAN side Ethernet interface either type in an alternate MAC addre...

Page 29: ...able for the LAN Subnet Mask The subnet mask of the local area network Enable DHCP Server Once your router is properly configured and this option is enabled the DHCP Server will manage the IP addresses and other network configuration information for computers and other devices connected to your Local Area Network There is no need for you to do this yourself ...

Page 30: ... available for allocation by the DHCP Server Subnet Mask The subnet mask of the local area network Gateway The IP address of the router on the local area network For example 192 168 10 1 DHCP Lease Time The amount of time that a computer may have an IP address before it is required to renew the lease The lease functions just as a lease on an apartment would The initial lease designates the amount ...

Page 31: ...30 router from the computer and click the Copy Your PC s MAC Address button to enter the MAC address ...

Page 32: ... 6to4 6to4 is provided as a transition for migrating from IPv4 to IPv6 It allows IPv6 packets to be transmitted over an IPv4 network through the automatic tunneling technology and routes traffic between 6to4 and IPv6 networks ...

Page 33: ...32 Network QoS QoS Setup ...

Page 34: ...re are several Maximum upload bandwidth to choose or user defined QoS Group There are several group of QoS rate and ceil upload bandwidth to setup QoS List You can setup QoS per different protocol Application ...

Page 35: ...34 Network DHCP Client List In this section you can see the connected LAN devices are currently receiving an IP addresses ...

Page 36: ...35 Wireless Wireless Basic ...

Page 37: ...eless networks from one wireless Router Access Point device Add Additional Wireless Network Name SSID To add additional wireless Network Names simply add the name to the Multiple SSID field and click on apply at the bottom of the page When finished go to the Security section in this Users Guide for wireless security configuration Frequency Channel A wireless network uses specific channels in the w...

Page 38: ... apply your setting changes Enable the security seeing in security page each WDS APs need to use same security setting Note WDS supports wireless g n modes The use multiple Access Point will reduces the overall network throughput to the TEW 812DRU ...

Page 39: ... messages The default value is 1 Valid settings are between 1 and 255 Fragmentation Threshold Wireless frames can be divided into smaller units fragments to improve performance in the presence of RF interference and at the limits of RF coverage Fragmentation will occur when frame size in bytes is greater than the Fragmentation Threshold This setting should remain at its default value of 2346 bytes...

Page 40: ...ault value of 2346 bytes Short Preamble and Slot Using a short 400ns guard interval can increase throughput However it can also increase error rate in some installations due to increased sensitivity to radio frequency reflections Select the option that works best for your installation ...

Page 41: ...e variant of Wi Fi Protected Access WPA security standards published by the Wi Fi Alliance The WPA Mode further refines the variant that the router should employ WPA Mode WPA is the older standard select this option if the clients that will be used with the router only support the older standard WPA2 is the newer implementation of the stronger IEEE 802 11i security standard With the WPA2 option th...

Page 42: ...nection It cannot be shorter than eight characters although for proper security it needs to be of ample length and should not be a commonly known phrase This phrase is used to generate session keys that are unique for each wireless client Wireless MAC Filtering Choose the type of MAC filtering needed Turn MAC Filtering Disable When Disable is selected MAC addresses are not used to control network ...

Page 43: ...manner without needing to expose private Wi Fi access codes or other personal data A guest network is a small section of an organization s computer network designed for use by temporary visitors Besides helping to keep an organization s internal information private guest networks also help avoid spreading any computer worms that visitors may have on their systems ...

Page 44: ...43 Wireless WPS ...

Page 45: ...extra security a new PIN can be generated You can restore the default PIN at any time Only the Administrator admin account can change or reset the PIN Current PIN Shows the current value of the router s PIN Reset To WPS Default Restore the default PIN of the router Generate New PIN Create a random number that is a valid PIN This becomes the router s PIN You can then copy this PIN to the user inter...

Page 46: ...45 Wireless Station List All the wireless clients connecting to the router will be shown here you could monitor your network and prevent any unauthorized wireless connection easily ...

Page 47: ...place that will be used instead of sending packets to the DMZ host so an active session virtual server active port trigger or port forwarding rule will take priority over sending a packet to the DMZ host The DMZ policy resembles a default port forwarding rule that forwards every port that is not specifically sent anywhere else The router provides only limited firewall protection for the DMZ host T...

Page 48: ... incoming sessions bound for a specific application and also allow port redirection and the use of ALGs Port forwarding is rather like a selective DMZ where incoming traffic targeted at one or more ports is forwarded to a specific LAN host thereby not exposing as many ports as a DMZ host Port triggering is a special form of port forwarding which is activated by outgoing traffic and for which ports...

Page 49: ...l network that will provide the virtual service for example 192 168 10 50 You can select a computer from the list of DHCP clients in the Computer Name drop down menu or you can manually enter the IP address of the server computer Protocol Select the protocol used by the service The common choices UDP TCP can be selected from the drop down menu ...

Page 50: ...t will be used on your internal network Public Port The port that will be accessed from the Internet Schedule Select a schedule for when the service will be enabled If you do not see the schedule you need in the list of schedules ...

Page 51: ...g route Destination IP The IP address of packets that will take this route Gateway Specifies the next hop to be taken if this route is used A gateway of 0 0 0 0 implies there is no next hop and the IP address matched is directly connected to the router on the interface specified LAN or WAN Metric ...

Page 52: ...r WAN that the IP packet must use to transit out of the router when this route is used Clear Re initialize this area of the screen discarding any changes you have made Routes List The section shows the current routing table entries Certain required routes are predefined and cannot be changed Routes that you add can be changed by clicking the Edit icon or can be deleted by clicking the Delete icon ...

Page 53: ...52 Advanced Access Control Enable By default the Access Control feature is disabled If you need Access Control check this option ...

Page 54: ...ce on the LAN has unrestricted access to the Internet However if you enable Access Control Internet access is restricted for those devices that have an Access Control Policy configured for them All other devices have unrestricted access to the Internet ...

Page 55: ...54 ALG Application Level Gatwway ALG By default the ALG feature is enabled ALG configuration allows users to disable some application service ...

Page 56: ...e Specifies whether the entry will be active or inactive Name Enter a name for the Special Application Rule for example Game App which will help you identify the rule in the future Alternatively you can select from the Application list of common applications Protocol ...

Page 57: ...ample 6500 6700 Schedule Select a schedule for when this rule is in effect Clear Re initialize this area of the screen discarding any changes you have made Port Trigger Rule List This is a list of the defined application rules Click the Enable checkbox at the left to directly activate or de activate the entry An entry can be changed by clicking the Edit icon or can be deleted by clicking the Delet...

Page 58: ... Rule Enable Specifies whether the entry will be active or inactive IP Address Enter the local network IP address of the system hosting the server for example 192 168 10 50 You can select a computer from the list of DHCP clients in the Computer Name drop down menu or you can manually enter the IP address of the server computer TCP Ports to Open ...

Page 59: ...ample 6159 6180 99 UDP Ports to Open Enter the UDP ports to open for example 6159 6180 99 Schedule Select a schedule for the times when this rule is in effect Clear Re initialize this area of the screen discarding any changes you have made ...

Page 60: ...es List The section lists the current Inbound Filter Rules An entry can be changed by clicking the Edit icon or can be deleted by clicking the Delete icon When you click the Edit icon the item is highlighted and the Edit Filter Rule section is activated for editing In addition to the filters listed here two predefined filters are available wherever filters can be applied Allow All ...

Page 61: ...60 Permit any WAN user to access the related capability Deny All Prevent all WAN users from accessing the related capability LAN users are not affected by Filter Rules ...

Page 62: ...g entries Name Give the schedule a name that is meaningful to you such as Weekday rule Day s Place a checkmark in the boxes for the desired days or select the All Week radio button to select all seven days of the week All Day 24 hrs Select this option if you want this schedule in effect all day for the selected day s Start Time ...

Page 63: ...d in the same format as the start time The hour in the first box and the minutes in the second box The end time is used for most other rules but is not normally used for email events Schedule Rules List This section shows the currently defined Schedule Rules An entry can be changed by clicking the Edit icon or can be deleted by clicking the Delete icon When you click the Edit icon the item is high...

Page 64: ... permits networked devices such as personal computers printers Internet gateways Wi Fi access points and mobile devices to seamlessly discover each other s presence on the network and establish functional network services for data sharing communications and entertainment WAN Ping By default the WAN Ping Respond feature is disabled Enable WAN Ping Respond will reply information of router to outside...

Page 65: ...64 Administrator Administrator Management Admin Password ...

Page 66: ...wing parameters are displayed when the option is enabled Dynamic DNS Provider Select a dynamic DNS service provider from the pull down list Host Name Enter your host name fully qualified for example myhost mydomain net Account Enter the account provided by your service provider If the Dynamic DNS provider supplies only a key enter that key in all three fields Password Enter the password provided b...

Page 67: ...66 Administrator Upload Firmware Once you have a firmware update on your computer use this option to browse for the file and then upload the information into the router ...

Page 68: ...restore previously saved router configuration settings Load Factory Defaults This option restores all configuration settings back to the settings that were in effect at the time the router was shipped from the factory Any settings that have not been saved will be lost If you want to save your router configuration settings use the Export Settings option above System Reboot This restarts the router ...

Page 69: ...68 Administrator file sharing User Account List Enter username password and setting permission to limit user account could read file only or could read write file ...

Page 70: ...onize the router s clock to a Network Time Server over the Internet If you are using schedules or logs this is the best way to ensure that the schedules and logs are kept accurate Note that even when NTP Server is enabled you must still choose a time zone and set the daylight saving parameters NTP Server Used Select a Network Time Server for synchronization You can type in the address of a time se...

Page 71: ...70 Set the Date and Time Manually If you do not have the NTP Server option in effect you can either manually set the time for your router here ...

Page 72: ...71 Administrator System log This page can be used to set remote log server and show the system log ...

Page 73: ...72 Administrator Status The device status ...

Page 74: ...rk ActiveX A Microsoft specification for the interaction of software components Address Resolution Protocol ARP Used to map MAC addresses to IP addresses so that conversions can be made in both directions Ad hoc network Peer to Peer network between wireless clients ADSL Asymmetric Digital Subscriber Line Advanced Encryption Standard AES Government encryption standard Alphanumeric Characters A Z an...

Page 75: ...n order to verify that the person or device is really who they are claiming to be Automatic Private IP Addressing APIPA An IP address that that a Windows computer will assign itself when it is configured to obtain an IP address automatically but no DHCP server is available on the network B Backward Compatible The ability for new devices to communicate and interact with older legacy devices to guar...

Page 76: ...rections at once Browser A program that allows you to access resources on the web and provides them to you graphically C Cable modem A device that allows you to connect a computer up to a coaxial cable and receive Internet access from your Cable provider CardBus A newer version of the PC Card or PCMCIA interface It supports a 32 bit data path DMA and consumes less voltage CAT 5 Category 5 Used for...

Page 77: ...managed updated as well as easily accessed by users or applications Data Link layer The second layer of the OSI model Controls the movement of data on the physical link of a network DB 25 A 25 ping male connector for attaching External modems or RS 232 serial devices DB 9 A 9 pin connector for RS 232 connections dBd Decibels related to dipole antenna dBi Decibels relative to isotropic radiator dBm...

Page 78: ...he DMZ computer trades some of the protection of the router s security mechanisms for the convenience of being directly addressable from the Internet DNS Domain Name System Translates Domain Names to IP addresses Domain name A name that is associated with an IP address Download To send a request from one computer to another and have the file transmitted back to the requesting computer DSL Digital ...

Page 79: ...es over glass or plastic wire or fiber File server A computer on a network that stores data so that the other computers on the network can all access it File sharing Allowing data from computers on a network to be accessed by other computers on the network with different levels of access rights Firewall A device that protects resources of the Local Area Network from unauthorized users outside of t...

Page 80: ... standard that provides consistency of voice and video transmissions and compatibility for videoconferencing devices Half duplex Data cannot be transmitted and received at the same time Hashing Transforming a string of characters into a shorter string with a predefined length Hexadecimal Characters 0 9 and A F Hop The action of data packets being transmitted from one router to another Host Compute...

Page 81: ...o ensure security for VPN connections Infrastructure In terms of a wireless network this is when wireless clients use an Access Point to gain access to the network Internet A system of worldwide networks which use TCP IP to allow for resources to be accessed from computers around the world Internet Explorer A World Wide Web browser created and provided by Microsoft Internet Protocol The method of ...

Page 82: ...mputer that transmits data on the Internet or on an Intranet IPsec Internet Protocol Security IPX Internetwork Packet Exchange is a networking protocol developed by Novel to enable their Netware clients and servers to communicate ISP Internet Service Provider J Java A programming language used to create programs and applets for web pages K Kbps Kilobits per second Kbyte Kilobyte L L2TP Layer 2 Tun...

Page 83: ...he manufacturer Mbps Megabits per second MDI Medium Dependent Interface is an Ethernet port for a connection to a straight through cable MDIX Medium Dependent Interface Crossover is an Ethernet port for a connection to a crossover cable MIB Management Information Base is a set of objects that can be managed by using SNMP Modem A device that Modulates digital signals from a computer to an analog si...

Page 84: ...k communication protocol This is an updated version of NetBIOS NetBIOS Network Basic Input Output System Netmask Determines what portion of an IP address designates the Network and which part designates the Host Network Interface Card A card installed in a computer or built onto the motherboard that allows the computer to connect to a network Network Layer The third layer of the OSI model which ha...

Page 85: ...ection of networking devices within a range of 10 meters Physical layer The first layer of the OSI model Provides the hardware means of transmitting electrical signals on a data carrier Ping A utility program that verifies that a given Internet address exists and can receive messages The utility sends a control packet to the given address and waits for a response PoE Power over Ethernet is the mea...

Page 86: ... and be authenticated in order to access resources on a network Reboot To restart a computer and reload it s operating software or firmware from nonvolatile storage Rendezvous Apple s version of UPnP which allows for devices on a network to discover each other and be connected without the need to configure any settings Repeater Retransmits the signal of an Access Point in order to extend it s cove...

Page 87: ...h coordinates the connection and communication between applications on both ends Simple Mail Transfer Protocol Used for sending and receiving email Simple Network Management Protocol Governs the management and monitoring of network devices SIP Session Initiation Protocol A standard protocol for initiating a user session that involves multimedia content such as voice or chat SMTP Simple Mail Transf...

Page 88: ...g in one place the logs from different sources Originally written for UNIX it is now available for other operating systems including Windows T TCP Transmission Control Protocol TCP Raw A TCP IP protocol for transmitting streams of printer data TCP IP Transmission Control Protocol Internet Protocol TFTP Trivial File Transfer Protocol is a utility used for transferring files that is simpler to use t...

Page 89: ...smitted from the requesting computer to the other UPnP Universal Plug and Play URL Uniform Resource Locator is a unique address for files accessible on the Internet USB Universal Serial Bus UTP Unshielded Twisted Pair V Virtual Private Network VPN A secure tunnel over the Internet to connect remote offices or users to their company s network VLAN Virtual LAN Voice over IP Sending voice information...

Page 90: ...cy is security for wireless networks that is supposed to be comparable to that of a wired network Wide Area Network The larger network that your LAN is connected to which may be the Internet itself or a regional or corporate network Wi Fi Wireless Fidelity Wi Fi Protected Access An updated version of security for wireless networks that provides authentication as well as encryption Wireless ISP A c...

Page 91: ... provides improved data encryption relative to WEP X xDSL A generic term for the family of digital subscriber line DSL technologies such as ADSL HDSL RADSL and SDSL Y Yagi antenna A directional antenna used to concentrate wireless signals on a specific location ...

Reviews: