TRENDnet TEW-691GR Manual
Hide thumbs Also See for TEW-691GR:

Advertisement

Quick Links

Federal Communication Commission Interference Statement
This equipment has been tested and found to comply with the limits for a Class B digital device,
pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection
against harmful interference in a residential installation. This equipment generates, uses and can
radiate radio frequency energy and, if not installed and used in accordance with the instructions,
may cause harmful interference to radio communications. However, there is no guarantee that
interference will not occur in a particular installation.
interference to radio or television reception, which can be determined by turning the equipment off
and on, the user is encouraged to try to correct the interference by one of the following measures:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and receiver.
Connect the equipment into an outlet on a circuit different from that to which the receiver is
connected.
Consult the dealer or an experienced radio/TV technician for help.
FCC Caution: Any changes or modifications not expressly approved by the party responsible for
compliance could void the user's authority to operate this equipment.
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two
conditions: (1) This device may not cause harmful interference, and (2) this device must accept any
interference received, including interference that may cause undesired operation.
IMPORTANT NOTE:
FCC Radiation Exposure Statement:
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled
environment. This equipment should be installed and operated with minimum distance 20cm
between the radiator & your body.
This transmitter must not be co-located or operating in conjunction with any other antenna or
transmitter.
The availability of some specific channels and/or operational frequency bands are country
dependent and are firmware programmed at the factory to match the intended destination. The
firmware setting is not accessible by the end user.
Europe – EU Declaration of Conformity
This device complies with the essential requirements of the R&TTE Directive 1999/5/EC. The following test
methods have been applied in order to prove presumption of conformity with the essential requirements of
the R&TTE Directive 1999/5/EC:
-
EN60950-1:2006
Safety of Information Technology Equipment
-
EN50385 : (2002-08)
-
Product standard to demonstrate the compliance of radio base stations and fixed terminal stations for
wireless telecommunication systems with the basic restrictions or the reference levels related to human
exposure to radio frequency electromagnetic fields (110MHz - 40 GHz) - General public
-
EN 300 328 V1.7.1: (2006-10)
-
Electromagnetic compatibility and Radio spectrum Matters (ERM); Wideband Transmission systems;
Data transmission equipment operating in the 2,4 GHz ISM band and using spread spectrum modulation
techniques; Harmonized EN covering essential requirements under article 3.2 of the R&TTE Directive
If this equipment does cause harmful
1

Advertisement

Table of Contents
loading

Summary of Contents for TRENDnet TEW-691GR

  • Page 1 Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
  • Page 2 EN 301 489-1 V1.8.1: (2008-04) Electromagnetic compatibility and Radio Spectrum Matters (ERM); ElectroMagnetic Compatibility (EMC) standard for radio equipment and services; Part 1: Common technical requirements EN 301 489-17 V1.3.2 (2008-04) Electromagnetic compatibility and Radio spectrum Matters (ERM); ElectroMagnetic Compatibility (EMC) standard for radio equipment;...
  • Page 3 Latviski Ar šo [name of manufacturer / izgatavotāja nosaukums] deklarē, ka [type of [Latvian] equipment / iekārtas tips] atbilst Direktīvas 1999/5/EK būtiskajām prasībām un citiem ar to saistītajiem noteikumiem. Lietuvių Šiuo [manufacturer name] deklaruoja, kad šis [equipment type] atitinka esminius [Lithuanian] reikalavimus ir kitas 1999/5/EB Direktyvos nuostatas.
  • Page 4: Table Of Contents

    Table of Contents    1. Getting Started with the TEW‐691GR ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ 6               1.1. Package Contents ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ ‐‐‐‐‐‐‐ 6                         1.2. Minimum System Requirements ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ 6                       2. Wireless LAN Networking ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ 7          2.1.
  • Page 5 4.3.3 Advanced: Routing ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ 35  4.3.4 Advanced: Access Control ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ 37  4.3.5 Advanced: Special Applications ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ 38  4.3.6 Advanced: Gaming ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ 40  4.3.7 Advanced: Inbound Filter ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ 42  4.3.8 Advanced: Schedule ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ 43  4.3.9 Advanced: Advanced Network‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ 44      4.4. Administrator ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ 45 4.4.1 Administrator: Management ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ 45  4.4.2 Administrator: Upload Firmware ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ 47  4.4.3 Administrator: Setting Management ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ 48  4.4.4 Administrator: Time ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ 49  4.4.5 Administrator: Status ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ 50                    Help ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐51  ...
  • Page 6: Getting Started With The Tew-691Gr

    1. Getting Started with the TEW-691GR Congratulations on purchasing the TEW-691GR! This manual provides information for setting up and configuring the TEW-691GR. This manual is intended for both home users and professionals. 1.1 Package Contents TEW-691GR 2.4GHz 450Mbps Wireless N Gigabit Router CD-ROM (User’s Guide)
  • Page 7: Wireless Lan Networking

    Unlike most routers, the TEW-691GR provides data transfers at up to 450Mbps when using 11n connection. This router is also back compatible with 802.11g or 11b devices. This means that you do not need to change your entire network to maintain connectivity.
  • Page 8 Firewall features Network Address Translation (NAT) UPnP support and ALGs Support for RTP/RTSP, SIP, FTP, TFTP NTP, SMTP, HTTPS, POP3, NetMeeting, Telnet, H.323, STUN Provides Additional Security of Enable/Disable SSID, WLAN MAC address filtering Internet Access Control (IP/Port range blocking) Supports IPSec, L2TP and PPTP VPN Pass-Through Sessions Easy wireless setup via PBC or PIN of Wi-Fi Protected Setup Support 4 x 10/100/1000Mbps Auto-MDIX LAN Port and 1 x 10/100/1000Mbps Auto-MDIX WAN...
  • Page 9: Hardware Overview

    3. Hardware Overview 3.1 LED Indications: (from left to right) WLAN Reserve LAN1 LAN2 LAN3 LAN4 3.2 Rear panel: (from left to right) DC-IN RESET Power switch Wi-Fi on/off switch LAN1 LAN2 LAN3 LAN4...
  • Page 10: Installation Considerations

    The key to maximizing wireless range is to follow these basic guidelines: Keep the number of walls and ceilings between the TEW-691GR and other network devices to a minimum - each wall or ceiling can reduce your wireless product’s range from 3-90 feet (1-30 meters.) Position your devices so that the number of walls or ceilings is minimized.
  • Page 11: Using The Configuration Menu

    4. Using the Configuration Menu Whenever you want to configure your TEW-691GR, you can access the Configuration Menu through your PC by opening the Web-browser and typing in the IP Address of the TEW-691GR. The TEW-691GR’s default IP Address is http://192.168.10.1 Open the Web browser.
  • Page 12: Network

    4.1 Network 4.1.1. Network: WAN Setting WAN Connection Type There are several connection types to choose from: Static IP, DHCP, PPPoE, PPTP, L2TP, and Russia PPTP. If you are unsure of your connection method, please contact your Internet Service Provider. Static Used when your ISP provides you a set IP address that does not change.
  • Page 13 On demand: A connection to the Internet is made as needed. Manual: You have to open up the Web-based management interface and click the Connect button manually any time that you wish to connect to the Internet. Maximum Idle Time: Time interval the machine can be idle before the PPPoE connection is disconnected.
  • Page 14 internal ISP’s network resources and also communicate with Internet through PPTP tunnel. It is specified by Russia Cobrina ISP, user can configure it the same as the normal PPTP and PPTP server IP Address can use the domain name string. WAN MTU Setting The Maximum Transmission Unit (MTU) is a parameter that determines the largest packet size (in bytes) that the router will send to the WAN.
  • Page 15: Network: Lan Setting

    4.1.2. Network: LAN Setting IP Address The IP address of the this device on the local area network. Assign any unused IP address in the range of IP addresses available for the LAN. Subnet Mask The subnet mask of the local area network. DHCP Server Settings...
  • Page 16 DHCP stands for Dynamic Host Configuration Protocol. The DHCP section is where you configure the built-in DHCP Server to assign IP addresses to the computers and other devices on your local area network (LAN). Enable DHCP Server Once your router is properly configured and this option is enabled, the DHCP Server will manage the IP addresses and other network configuration information for computers and other devices connected to your Local Area Network.
  • Page 17 computer and the network card is already located inside the computer, you can connect to the router from the computer and click the Copy Your PC's MAC Address button to enter the MAC address. Clear Re-initialize this area of the screen, discarding any changes you have made. DHCP Reservations List This shows clients that you have specified to reserve DHCP addresses.
  • Page 18: Network: Qos

    4.1.3. Network: QoS...
  • Page 19: Network: Dhcp Client List

    4.1.4. Network: DHCP Client List In this section you can see the connected LAN devices are currently receiving an IP addresses.
  • Page 20: Wireless

    If you have some devices that use a different transmission mode, choose the appropriate wireless mode. The TEW-691GR supports 2.4GHz wireless networks. There are many different configuration options available to choose from. Use the drop down list to select the wireless mode.
  • Page 21 2.4GHz 802.11b/g mixed mode - This wireless mode works in the 2.4GHz frequency range and will allow both wireless b and wireless g client to connect and access the TEW-691GR at 11Mbps for wireless b, at 54Mbps for wireless g and share access at the same time. Although the wireless b/g operates in the 2.4GHz frequency, it will allow the use of other 2.4GHz client...
  • Page 22 Operating Mode Mixed Mode Green Field Mixed Mode: In this mode packets are transmitted with a preamble compatible with the legacy 802.11a/g, the rest of the packet has a new format. In this mode the receiver shall be able to 802.11 decode both the Mixed Mode packets and legacy packets.
  • Page 23: Wireless: Advanced

    4.2.2 Wireless: Advanced Beacon Interval Beacons are packets sent by a wireless router to synchronize wireless devices. Specify a Beacon Period value between 20 and 1000. The default value is set to 100 milliseconds. DTIM A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast messages.
  • Page 24 Increase efficiency by aggregating multiple packets of application data into a single transmission frame. In this way, 802.11n networks can send multiple data packets with the fixed overhead cost of just a single frame.
  • Page 25: Wireless: Security

    4.2.3 Wireless: Security Security Mode Unless one of these encryption modes is selected, wireless transmissions to and from your wireless network can be easily intercepted and interpreted by unauthorized users. A method of encrypting data for wireless communication intended to provide the same level of privacy as a wired network.
  • Page 26 WPA Mode: WPA is the older standard; select this option if the clients that will be used with the router only support the older standard. WPA2 is the newer implementation of the stronger IEEE 802.11i security standard. With the "WPA2" option, the router tries WPA2 first, but falls back to WPA if the client only supports WPA.
  • Page 27 for WPA. (AES means the unicast and multicast key are all AES. TKIP/AES means multicast is TKIP. But unicast can be AES or TKIP, which depends on the peer.)
  • Page 28: Wireless: Wps

    4.2.4 Wireless: WPS...
  • Page 29 Enable Enable the WPS feature. Lock Wireless Security Settings Locking the wireless security settings prevents the settings from being changed by any new external registrar using its PIN. Devices can still be added to the wireless network using WPS. PIN Settings A PIN is a unique number that can be used to add the router to an existing network or to create a new network.
  • Page 30: Wireless: Station List

    4.2.5 Wireless: Station List All the wireless clients connecting to the router will be shown here, you could monitor your network and prevent any unauthorized wireless connection easily.
  • Page 31: Advanced

    4.3 Advanced 4.3.1 Advanced: DMZ DMZ Setting DMZ means "Demilitarized Zone." If an application has trouble working from behind the router, you can expose one computer to the Internet and run the application on that computer. When a LAN host is configured as a DMZ host, it becomes the destination for all incoming packets that do not match some other incoming session or rule.
  • Page 32 Port triggering is a special form of port forwarding, which is activated by outgoing traffic, and for which ports are only forwarded while the trigger is active. Few applications truly require the use of the DMZ host. Following are examples of when a DMZ host might be required: ‧...
  • Page 33: Advanced: Virtual Server

    4.3.2 Advanced: Virtual Server Enable Specifies whether the entry will be active or inactive. Name Assign a meaningful name to the virtual server, for example Web Server. Several well-known types of virtual server are available from the "Application Name" drop-down list. Selecting one of these entries fills some of the remaining parameters with standard values for that type of server.
  • Page 34 Select a schedule for when the service will be enabled. If you do not see the schedule you need in the list of schedules. Clear Re-initialize this area of the screen, discarding any changes you have made.
  • Page 35: Advanced: Routing

    4.3.3 Advanced: Routing Add/Edit Route Adds a new route to the IP routing table or edits an existing route. Destination IP The IP address of packets that will take this route. Gateway Specifies the next hop to be taken if this route is used. A gateway of 0.0.0.0 implies there is no next hop, and the IP address matched is directly connected to the router on the interface specified: LAN or WAN.
  • Page 36 Clear Re-initialize this area of the screen, discarding any changes you have made. Routes List The section shows the current routing table entries. Certain required routes are predefined and cannot be changed. Routes that you add can be changed by clicking the Edit icon or can be deleted by clicking the Delete icon.
  • Page 37: Advanced: Access Control

    4.3.4 Advanced: Access Control Enable By default, the Access Control feature is disabled. If you need Access Control, check this option. Note: When Access Control is disabled, every device on the LAN has unrestricted access to the Internet. However, if you enable Access Control, Internet access is restricted for those devices that have an Access Control Policy configured for them.
  • Page 38: Advanced: Special Applications

    4.3.5 Advanced: Special Applications Add/Edit Port Trigger Rule Enable Specifies whether the entry will be active or inactive. Name Enter a name for the Special Application Rule, for example Game App, which will help you identify the rule in the future. Alternatively, you can select from the Application list of common applications.
  • Page 39 Schedule Select a schedule for when this rule is in effect. Clear Re-initialize this area of the screen, discarding any changes you have made. Port Trigger Rule List This is a list of the defined application rules. Click the Enable checkbox at the left to directly activate or de-activate the entry.
  • Page 40: Advanced: Gaming

    4.3.6 Advanced: Gaming Add/Edit Port Range Rule Use this section to add a Port Range Rule to the following list or to edit a rule already in the list. Rule Enable Specifies whether the entry will be active or inactive. Rule Name Give the rule a name that is meaningful to you, for example Game Server.
  • Page 41 Schedule Select a schedule for the times when this rule is in effect. Clear Re-initialize this area of the screen, discarding any changes you have made. Port Range Rule List This is a list of the defined Port Range Rules. Click the Enable checkbox at the left to directly activate or de-activate the entry.
  • Page 42: Advanced: Inbound Filter

    4.3.7 Advanced: Inbound Filter Add/Edit Inbound Filter Rule Here you can add entries to the Inbound Filter Rules List below, or edit existing entries. Name Enter a name for the rule that is meaningful to you. Action The rule can either Allow or Deny messages. Remote IP Range Define the ranges of Internet addresses this rule applies to.
  • Page 43: Advanced: Schedule

    4.3.8 Advanced: Schedule Add/Edit Schedule Rule In this section you can add entries to the Schedule Rules List below or edit existing entries. Name Give the schedule a name that is meaningful to you, such as "Weekday rule". Day(s) Place a checkmark in the boxes for the desired days or select the All Week radio button to select all seven days of the week.
  • Page 44: Advanced: Advanced Network

    4.3.9 Advanced: Advanced Network...
  • Page 45: Administrator

    Administrator 4.4.1 Administrator: Management Admin Password Enter a password for the user "admin", who will have full access to the Web-based management interface. Device Name The name of the router can be changed here. Enable Dynamic DNS...
  • Page 46 Enable this option only if you have purchased your own domain name and registered with a dynamic DNS service provider. The following parameters are displayed when the option is enabled. Dynamic DNS Provider Select a dynamic DNS service provider from the pull-down list. Host Name Enter your host name, fully qualified;...
  • Page 47: Administrator: Upload Firmware

    4.4.2 Administrator: Upload Firmware Once you have a firmware update on your computer, use this option to browse for the file and then upload the information into the router.
  • Page 48: Administrator: Setting Management

    4.4.3 Administrator: Setting Management Export Settings This option allows you to export and then save the router's configuration to a file on your computer. Be sure to save the configuration before performing a firmware upgrade. Import Settings Use this option to restore previously saved router configuration settings. Load Factory Defaults This option restores all configuration settings back to the settings that were in effect at the time the router was shipped from the factory.
  • Page 49: Administrator: Time

    4.4.4 Administrator: Time Time Configuration Current Router Time Displays the time currently maintained by the router. If this is not correct, use the following options to configure the time correctly. Time Zone Select your local time zone from pull down menu. Automatic Time Configuration Enable NTP Server Select this option if you want to synchronize the router's clock to a Network Time Server over...
  • Page 50: Administrator: Status

    4.4.5 Administrator: Status The device status.
  • Page 51: Help

    4.4 Help Help section provides web-based explanations on each configurable field.
  • Page 52 Network Glossary Access Point - A device that allows wireless-equipped computers and other devices to communicate with a wired network. also used to expand the range of a wireless network. AES (Advanced Encryption Standard) - A security method that uses symmetric 128-bit block data encryption. Bandwidth - The transmission capacity of a given device or network.
  • Page 53 Full Duplex - The ability of a networking device to receive and transmit data simultaneously. Gateway - A device that interconnects networks with different, incompatible communications protocols. Half Duplex - Data transmission that can occur in two directions over a single line, but only one direction at a time. HTTP (HyperText Transport Protocol) - The communications protocol used to connect to servers on the World Wide Web.
  • Page 54 SMTP (Simple Mail Transfer Protocol) - The standard e-mail protocol on the Internet. SNMP (Simple Network Management Protocol) - A widely used network monitoring and control protocol. SPI (Stateful Packet Inspection) Firewall - A technology that inspects incoming packets of information before allowing them to enter the network.
  • Page 55 3 years If a product does not operate as warranted above during the applicable warranty period, TRENDnet shall, at its option and expense, repair the defective product or deliver to customer an equivalent product to replace the defective item. All products that are replaced will become the property of TRENDnet.
  • Page 56 Download section and look for the desired TRENDnet product to access to the GPL Code or LGPL Code. These codes are distributed WITHOUT WARRANTY and are subject to the copyrights of the developers. TRENDnet does not provide technical support for these codes. Please go to for specific terms of each http://www.gnu.org/licenses/gpl.txt...

Table of Contents