TRENDnet TEW-633GR User Manual

TRENDnet TEW-633GR User Manual

11n wireless n gigabit router
Hide thumbs Also See for TEW-633GR:

Advertisement

Quick Links

1

Advertisement

Table of Contents
loading

Summary of Contents for TRENDnet TEW-633GR

  • Page 2: Federal Communication Commission Interference Statement

    & your body. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. TRENDnet declares that TEW-633GR (FCC ID: S9ZTEW633GR) is limited in CH1~CH11 for 2.4 GHz by specified firmware controlled in U.S.A. Copyright This publication, including all photographs, illustrations and software, is protected under interna- tional copyright laws, with all rights reserved.
  • Page 3: Table Of Contents

    Table of Contents Getting Started with the TEW-633GR Package Contents Minimum System Requirements Wireless LAN Networking Introduction Features Hardware Overview Side Panel LEDs Installation Considerations Getting Started Using the Configuration Menu Basic Advanced Tools Status Glossary Note: Please run the CD and follow the steps in the Quick Installation Guide to setup your router.
  • Page 4: Getting Started With The Tew-633Gr

    Getting Started with the TEW-633GR Congratulations on purchasing the TEW-633GR! This manual provides information for setting up and configuring the TEW-633GR. This manual is intended for both home users and professionals. The following conventions are used in this manual: THE NOTE SYMBOL INDICATES ADDITIONAL INFORMATION ON THE TOPIC AT HAND.
  • Page 5: Package Contents

    Package Contents TEW-633GR 11n Wireless N Gigabit Router CAT-5 Ethernet Cable Power Adapter User’s Guide CD-ROM Multi-Language Quick Installation Guide Using a power supply with a different voltage than the one included with your product will cause damage and void the warranty for this product.
  • Page 6: Wireless Lan Networking

    BE DONE BY AN AUTHORIZED ADMINISTRATOR. Transmission Rate (Transfer Rate) The TEW-633GR provides various transmission (data) rate options for you to select. In most networking scenarios, the factory default Best (automatic) setting proves the most efficient. This setting allows your TEW-633GR to operate at the maximum transmission (data) rate. When the communication quality drops below a certain level, the TEW-633GR automatically switches to a lower transmission (data) rate.
  • Page 7 When a number of wireless stations are connected using a single access point, you have a Basic Service Set (BSS). In the ESS diagram below, communication is done through the access points, which relay data packets to other wireless stations or devices connected to the wired network. Wireless stations can then access resources, such as a printer, on the wired network.
  • Page 8 In an ESS environment, users are able to move from one access point to another without losing the connection. In the diagram below, when the user moves from BSS (1) to BSS (2) the WLAN client devices automatically switches to the channel used in BSS (2). Roaming in an ESS network diagram...
  • Page 9: Introduction

    Unlike most routers, the TEW-633GR provides data transfers at up to 300Mbps when using 11n (Draft 2.0) connection. This router is also back compatible with 802.11g or 11b devices. This means that you do not need to change your entire network to maintain connectivity.
  • Page 10: Hardware Overview

    Hardware Overview Side Panel DC-IN The DC power input connector is a single jack socket to supply power to the TEW-633GR. Please use the Power Adapter provided on the TEW-633GR package. Reset Button Pressing the reset button restores the router to its original factory default settings.
  • Page 11: Leds

    LEDs PWR/SYS LED Solid lights indicate a proper connection to the power supply, and indicate the system ready or not. LAN LEDs Solid lights indicate connections to Ethernet-enabled computers on ports 1-4. LED blinks during data transmission. WAN LED A solid light indicates connection on the WAN port. This LED blinks during data transmission. WLAN LED A solid light indicates that the wireless segment is ready.
  • Page 12: Installation Considerations

    Installation Considerations The TEW-633GR 11n (Draft 2.0) Wireless Router lets you access your network, using a wireless connection, from virtually anywhere within its operating range. Keep in mind, however, that the number, thickness and location of walls, ceilings, or other objects that the wireless signals must pass through, may limit the range.
  • Page 13: Using The Configuration Menu

    Using the Configuration Menu Whenever you want to configure your TEW-633GR, you can access the Configuration Menu through your PC by opening the Web-browser and typing in the IP Address of the TEW-633GR. The TEW-633GR’s default IP Address is Open the Web browser.
  • Page 14: Basic

    Basic The Basic tab provides the following configuration options: INTERNET, WIRELESS and NETWORK SETTINGS. Basic_Internet Setup Wizard If you are new to networking and have never configured a router before, click on Setup Wizard and the router will guide you through a few simple steps to get your network up and running. Manual Configure If you consider yourself an advanced user and have configured a router before, click Manual Configure to input all the settings manually.
  • Page 15 Basic_Wireless The wireless section is used to configure the wireless settings for your router. Note that changes made in this section may also need to be duplicated on wireless clients that you want to connect to your wireless network. To protect your privacy, use the wireless security mode to configure the wireless security features. This device supports three wireless security modes including: WEP, WPA-Personal, and WPA-Enterprise.
  • Page 16 Wireless Network Name When you are browsing for available wireless networks, this is the name that will appear in the list (unless Visibility Status is set to Invisible, see below). This name is also referred to as the SSID. For security purposes, it is highly recommended to change from the pre-configured network name.
  • Page 17 provided so you can enter a string that is easier to remember. The ASCII string is converted to HEX for use over the network. Four keys can be defined so that you can change keys easily. A default key is selected for use on the network. Example: 64-bit hexadecimal keys are exactly 10 characters in length.
  • Page 18 WPA-Enterprise This option works with a RADIUS Server to authenticate wireless clients. Wireless clients should have established the necessary credentials before attempting to authenticate to the Server through this Gateway. Furthermore, it may be necessary to configure the RADIUS Server to allow this Gateway to authenticate users. Authentication Timeout: Amount of time before a client will be required to re-authenticate.
  • Page 19 Basic_Network Settings Use this section to configure the internal network settings of your router. The IP Address that is configured here is the IP Address that you use to access the Web-based management interface. If you change the IP Address here, you may need to adjust your PC’s network settings to access the network again.
  • Page 20 must be set to the IP address of this device. The Gateway must be set to the IP address of the upstream router. Both addresses must be within the LAN subnet as specified by Subnet Mask. Router Settings These are the settings of the LAN (Local Area Network) interface for the router. The router's local network (LAN) settings are configured based on the IP Address and Subnet Mask assigned in this section.
  • Page 21 The additional cost of routing a packet through this router. The normal value for a simple network is 1. This metric is added to routes learned from other routers; it is not added to static or system routes. Act as default router Make this router the preferred destination for packets that are not otherwise destined.
  • Page 22 Suppose you configure the DHCP Server to manage addresses from 192.168.10.101 To 192.168.10.200. This means that 192.168.10.2 to 192.168.10.100 and 192.168.10.201 to 192.168.10.254 is NOT managed by the DHCP Server. Computers or devices that use addresses from these ranges are to be manually configured. Suppose you have a web server computer that has a manually configured address of 192.168.10.150.
  • Page 23 Always Broadcast If all the computers on the LAN successfully obtain their IP addresses from the router's DHCP server as expected, this option can remain disabled. However, if one of the computers on the LAN fails to obtain an IP address from the router's DHCP server, it may have an old DHCP client that incorrectly turns off the broadcast flag of DHCP packets.
  • Page 24 DHCP Reservations List This shows clients that you have specified to have reserved DHCP addresses. An entry can be changed by clicking the Edit icon, or deleted by clicking the Delete icon. When you click the Edit icon, the item is highlighted, and the "Edit DHCP Reservation" section is activated for editing.
  • Page 25: Advanced

    Advanced The Advanced tab provides the following configuration options: Virtual Server, Special Applications, Gaming, StreamEngine, Routing, Access Control, WEB Filter, MAC Address Filter, Firewall, Inbound Filter, Advanced Wireless and Advanced Network. Advanced_Virtual Server The Virtual Server option gives Internet users access to services on your LAN. This feature is useful for hosting online services such as FTP, Web, or game servers.
  • Page 26 4. Enter the Public Port as [8888] 5. Select the Protocol (for example TCP). 6. Ensure the schedule is set to Always 7. Click Save to add the settings to the Virtual Servers List 8. Repeat these steps for each Virtual Server Rule you wish to add. After the list is complete, click Save Settings at the top of the page.
  • Page 27 Add/Edit Virtual Server In this section you can add an entry to the Virtual Servers List below or edit an existing entry. Enable Entries in the list can be either active (enabled) or inactive (disabled). Save Saves the new or edited virtual server entry in the following list. When finished updating the virtual server entries, you must still click the Save Settings button at the top of the page to make the changes effective and permanent.
  • Page 28 Advanced_Special Applications An application rule is used to open single or multiple ports on your router when the router senses data sent to the Internet on a "trigger" port or port range. An application rule applies to all computers on your internal network.
  • Page 29 Trigger Protocol Select the outbound protocol used by your application (for example Both). Input Port Range Enter the port range that you want to open up to Internet traffic (for example 6000-6200). Input Protocol Select the protocol used by the Internet traffic coming back into the router through the opened port range (for example Both).
  • Page 30 Advanced_Gaming Multiple connections are required by some applications, such as internet games, video conferencing, Internet telephony, and others. These applications have difficulties working through NAT (Network Address Translation). This section is used to open multiple ports or a range of ports in your router and redirect data through those ports to a single PC on your network.
  • Page 31 Port Forwarding Fields Name Give the rule a name that is meaningful to you, for example Game Server. You can also select from a list of popular games, and many of the remaining configuration values will be filled in accordingly. However, you should check whether the port values have changed since this list was created, and you must fill in the IP address field.
  • Page 32 Advanced_StreamEngine The StreamEngine feature helps improve your network gaming performance by prioritizing the data flows of network applications. StreamEngine Setup Enable StreamEngine Enable this option for better performance and experience with online games and other interactive applications, such as VoIP.
  • Page 33 Automatic Classification This option is enabled by default so that your router will automatically determine which programs should have network priority. Dynamic Fragmentation This option should be enabled when you have a slow Internet uplink. It helps to reduce the impact that large low priority network packets can have on more urgent ones by breaking the large packets into several smaller packets.
  • Page 34 Conflicting rules are not permitted. Conflicting rules are those that share any combination of source address/port, destination address/port, and protocol. Rejecting conflicting rules ensures that every flow defined in a rule receives the expected priority and avoids indeterminate prioritization that could reduce QoS effectiveness. Name Create a name for the rule that is meaningful to you.
  • Page 35 Advanced_Routing Add/Edit Route Adds a new route to the IP routing table or edits an existing route. Enable: Specifies whether the entry will be enabled or disabled. Destination IP: The IP address of packets that will take this route. Netmask: One bits in the mask specify which bits of the IP address must match. Gateway: Specifies the next hop to be taken if this route is used.
  • Page 36 Routes List The section shows the current routing table entries. Certain required routes are predefined and cannot be changed. Routes that you add can be changed by clicking the Edit icon, or deleted by clicking the Delete icon. When you click the Edit icon, the item is highlighted, and the "Edit Route"...
  • Page 37 Web Filter Parameters Web Site Enter the address of the web site that you want to allow; for example: trendnet.com. Do not enter the http:// preceding the address. Enter the most inclusive domain; for example, enter t and access will be permitted to both www.trendnet.com and support.trendnet.com.
  • Page 38 This is where you can add Web sites to the Allowed Web Site List or change entries in the Allowed Web Site List. Enable Entries in the Allowed Web Site List can be activated or deactivated with this checkbox. New entries are activated by default. Save Saves the new or edited Allowed Web Site in the following list.
  • Page 39 Advanced_MAC Address Filter The MAC address filter section can be used to filter network access by machines based on the unique MAC addresses of their network adapter(s). It is most useful to prevent unauthorized wireless devices from connecting to your network. A MAC address is a unique ID assigned by the manufacturer of the network adapter.
  • Page 40 Filter Settings Mode When "only allow listed machines" is selected, only computers with MAC addresses listed in the MAC Address List are granted network access. When "only deny listed machines" is selected, any computer with a MAC address listed in the MAC Address List is refused access to the network.
  • Page 41 Advanced_Firewall The router provides a tight firewall by virtue of the way NAT works. Unless you configure the router to the contrary, the NAT does not respond to unsolicited incoming requests on any port, thereby making your LAN invisible to Internet cyber attackers. However, some network applications cannot run with a tight firewall.
  • Page 42 Firewall Settings Enable SPI SPI ("stateful packet inspection" also known as "dynamic packet filtering") helps to prevent cyber attacks by tracking more state per session. It validates that the traffic passing through that session conforms to the protocol. When the protocol is TCP, SPI checks that packet sequence numbers are within the valid range for the session, discarding those packets that do not have valid sequence numbers.
  • Page 43 DMZ Host DMZ means "Demilitarized Zone." If an application has trouble working from behind the router, you can expose one computer to the Internet and run the application on that computer. When a LAN host is configured as a DMZ host, it becomes the destination for all incoming packets that do not match some other incoming session or rule.
  • Page 44 DMZ IP Address Specify the LAN IP address of the LAN computer that you want to have unrestricted Internet communication. If this computer obtains its address automatically using DHCP, then you may want to make a static reservation on the that the IP address of the DMZ computer does not change.
  • Page 45 Windows/MSN Messenger Supports use on LAN computers of Microsoft Windows Messenger (the Internet messaging client that ships with Microsoft Windows) and MSN Messenger. The SIP ALG must also be enabled when the Windows Messenger ALG is enabled. Allows FTP clients and servers to transfer data across NAT. Refer to the Advanced →...
  • Page 46 Advanced_Inbound Filter When you use the Virtual Server, Gaming, or Remote Administration features to open specific ports to traffic from the Internet, you could be increasing the exposure of your LAN to cyber attacks from the Internet. In these cases, you can use Inbound Filters to limit that exposure by specifying the IP addresses of internet hosts that you trust to access your LAN through the ports that you have opened.
  • Page 47 Add/Edit Inbound Filter Rule Here you can add entries to the Inbound Filter Rules List below, or edit existing entries. Name Enter a name for the rule that is meaningful to you. Action The rule can either Allow or Deny messages. Source IP Range Define the ranges of Internet addresses this rule applies to.
  • Page 48 Beacon Period Beacons are packets sent by a wireless router to synchronize wireless devices. Specify a Beacon Period value between 20 and 1000. The default value is set to 100 milliseconds. RTS Threshold This setting should remain at its default value of 2346.
  • Page 49 Short GI Using a short (400ns) guard interval can increase throughput. However, it can also increase error rate in some installations, due to increased sensitivity to radio-frequency reflections. Select the option that works best for your installation. Extra Wireless Protection Extra protection for neighboring 11b wireless networks.
  • Page 50 Advanced_Network UPnP UPnP is short for Universal Plug and Play, which is a networking architecture that provides compatibility among networking equipment, software, and peripherals. This router has optional UPnP capability, and can work with other UPnP devices and software. Enable UPnP If you need to use the UPnP functionality, you can enable it here.
  • Page 51 Advanced_ WISH WISH is short for Wireless Intelligent Stream Handling, a technology developed to enhance your experience of using a wireless network by prioritizing the traffic of different applications. WISH Enable WISH Enable this option if you want to allow WISH to prioritize your traffic. Priority Classifiers HTTP Allows the router to recognize HTTP transfers for many common audio and video streams and...
  • Page 52 Windows Media Center Enables the router to recognize certain audio and video streams generated by a Windows Media Center PC and to prioritize these above other traffic. Such streams are used by systems known as Windows Media Extenders, such as the Xbox 360. Automatic When enabled, this option causes the router to automatically attempt to prioritize traffic streams that it doesn't otherwise recognize, based on the behaviour that the streams exhibit.
  • Page 53 Host 2 Port Range The rule applies to a flow of messages for which host 2's port number is within the range set here. Save/Update Record the changes you have made into the following list. Clear Re-initialize this area of the screen, discarding any changes you have made. WISH Rules This section lists the defined WISH Rules.
  • Page 54 Advanced_ Wi-Fi Protected Setup Wi-Fi Protected Setup Enable Enable the Wi-Fi Protected Setup feature. Lock Wireless Security Settings Locking the wireless security settings prevents the settings from being changed by any new external registrar using its PIN. Devices can still be added to the wireless network using Wi-Fi Protected Setup.
  • Page 55 Generate New PIN Create a random number that is a valid PIN. This becomes the router's PIN. You can then copy this PIN to the user interface of the registrar. Add Wireless Station This Wizard helps you add wireless devices to the wireless network. The wizard will either display the wireless network settings to guide you through manual configuration, prompt you to enter the PIN for the device, or ask you to press the configuration button on the device.
  • Page 56: Tools

    Tools The Tools tab provides the following configuration options: Admin, Time, Email Settings, System, Firmware, Dynamic DNS, Windows Connect Now, System Check & Schedules. Tools_Admin The Admin option is used to set a password for access to the Web-based management. By default there is no password configured.
  • Page 57 Admin Password Enter a password for the user "admin", who will have full access to the Web-based management interface. User Password Enter a password for the user "user", who will have read-only access to the Web-based management interface. Gateway Name The name of the router can be changed here.
  • Page 58 Tools_Time The Time Configuration option allows you to configure, update, and maintain the correct time on the router's internal system clock. From this section you can set the time zone that you are in and set the Time Server. Daylight saving can also be configured to automatically adjust the time when needed. Time Configuration Current Router Time Displays the time currently maintained by the router.
  • Page 59 Automatic Time Configuration Enable NTP Server Select this option if you want to synchronize the router's clock to a Network Time Server over the Internet. If you are using schedules or logs, this is the best way to ensure that the schedules and logs are kept accurate.
  • Page 60 Tools_Email Settings The Email feature can be used to send the system log files, router alert messages, and firmware update notification to your email address. Enable Enable Email Notification When this option is enabled, router activity logs or firmware upgrade notifications can be emailed to a designated email address, and the following parameters are displayed.
  • Page 61 Account Name Enter your account for sending email. Password Enter the password associated with the account. Verify Password Re-type the password associated with the account. Email Log When Full or on Schedule On Log Full Select this option if you want logs to be sent by email when the log is full. On Schedule Select this option if you want logs to be sent by email according to a schedule.
  • Page 62 Tools_System This section allows you to manage the router's configuration settings, reboot the router, and restore the router to the factory default settings. Restoring the unit to the factory default settings will erase all settings, including any rules that you've created. Save Settings To Local Hard Drive This option allows you to save the router's configuration to a file on your computer.
  • Page 63 Tools_Firmware The Firmware Upgrade section can be used to update to the latest firmware code to improve functionality and performance. To check for the latest firmware, click the Check Online Now button. If you would like to be notified when new firmware is released, place a checkmark in the box next to Email Notification of Newer Firmware Version.
  • Page 64 Firmware Upgrade Firmware upgrade cannot be performed from a wireless device. To perform an upgrade, ensure that you are using a PC that is connected to the router by wire. Some firmware upgrades reset the configuration options to the factory defaults. Before performing an upgrade, be sure to save the current configuration from Tools ->...
  • Page 65 Tools_Dynamic DNS The Dynamic DNS feature allows you to host a server (Web, FTP, Game Server, etc.) using a domain name that you have purchased (www.whateveryournameis.com) with your dynamically assigned IP address. Most broadband Internet Service Providers assign dynamic (changing) IP addresses. When you use a Dynamic DNS service provider, your friends can enter your host name to connect to your server, no matter what your IP address is.
  • Page 66 Verify Password or Key Re-type the password or key provided by your service provider. If the Dynamic DNS provider supplies only a key, enter that key in all three fields. Timeout The time between periodic updates to the Dynamic DNS, if your dynamic IP address has not changed.
  • Page 67 Tools_System Check Ping Test "Ping" is an Internet utility function that sends a series of short messages to a target computer and reports the results. You can use it to test whether a computer is running, and to get an idea of the quality of the connection to that computer, based on the speed of the responses.
  • Page 68 Tools_Schedules Schedules can be created for use with enforcing rules. For example, if you want to restrict web access to Mon-Fri from 3pm to 8pm, you could create a schedule selecting Mon, Tue, Wed, Thu, and Fri and enter a Start Time of 3pm and End Time of 8pm. Add/Edit Schedule Rule In this section you can add entries to the Schedule Rules List below or edit existing entries.
  • Page 69 Save Saves the new or edited Schedule Rule in the following list. When finished updating the Schedule Rules, you must still click the Save Settings button at the top of the page to make the changes effective and permanent. Schedule Rules List This section shows the currently defined Schedule Rules.
  • Page 70: Status

    Status The Status tab provides the following configuration options: Device Info, Wireless, Routing, Logs, Statistics and Active Sessions. Status_Device info All of your Internet and network connection details are displayed on the Device Info page. The firmware version is also displayed here. Some browsers have limitations that make it impossible to update the WAN status display when the status changes.
  • Page 71 PPPoE, PPTP, L2TP Connection Depending on whether the WAN connection is currently established, you can click either the Connect to attempt to establish the WAN connection or the Disconnect to break the WAN connection. BigPond Connection Depending on whether you are currently logged in to BigPond, you can click either the BigPond Login to attempt to establish the WAN connection or the BigPond Logout to break the WAN connection.
  • Page 72 Status_Wireless The wireless section allows you to view the wireless clients that are connected to your wireless router. MAC Address The Ethernet ID (MAC address) of the wireless client. IP Address The LAN-side IP address of the client. Mode The transmission standard being used by the client. Values are 11b, or 11g for 802.11b, or 802.11g respectively.
  • Page 73 Status_Routing The routing section displays all of the routing details configured for your router. A value of 0.0.0.0 for gateway means there is no next hop, and the IP address is directly connected to the router on the interface specified: LAN or WAN. A value of 0.0.0.0 in both the destination IP and netmask means that this is the default route.
  • Page 74 Status_Logs The router automatically logs (records) events of possible interest in its internal memory. If there is not enough internal memory for all events, logs of older events are deleted, but logs of the latest events are retained. The Logs option allows you to view the router logs. You can define what types of events you want to view and the level of events to view.
  • Page 75 View Levels Select the level of events that you want to view. • Critical • Warning • Informational Apply Log Settings Now Click this button after changing Log Options to make them effective and permanent. Refresh Clicking this button refreshes the display of log entries. There may be new events since the last time you accessed the log.
  • Page 76 Status_Statistics The Statistics page displays all of the LAN, WAN, and Wireless packet transmit and receive statistics. Sent The number of packets sent from the router. Received The number of packets received by the router. TX Packets Dropped The number of packets that were dropped while being sent, due to errors, collisions, or router resource limitations.
  • Page 77 Status_Active Sessions The Active Sessions page displays full details of active sessions through your router. A session is a conversation between a program or application on a LAN-side computer and a program or application on a WAN-side computer. Internal The IP address and port number of the LAN-side application. Protocol The communications protocol used for the conversation.
  • Page 78 State State for sessions that use the TCP protocol. • NO: None -- This entry is used as a placeholder for a future connection that may occur. • SS: SYN Sent -- One of the systems is attempting to start a connection. •...
  • Page 79 Status_WISH Sessions The WISH Sessions page displays full details of active local wireless sessions through your router when WISH has been enabled. A WISH session is a conversation between a program or application on a wirelessly connected LAN-side computer and another computer, however connected. Originator The IP address and, where appropriate, port number of the computer that originated a network connection.
  • Page 80 • LA: Last ACK -- Waiting for a short time while a connection that was in Close Wait is fully closed. • CL: Closed -- The connection is no longer active but the session is being tracked in case there are any retransmitted packets still pending. Priority The priority given to packets sent wirelessly over this conversation by the WISH logic.
  • Page 81: Glossary

    Glossary 802.11 A family of specifications for wireless local area networks (WLANs) developed by a working group of the Institute of Electrical and Electronics Engineers (IEEE). Access Control List ACL. This is a database of network devices that are allowed to access resources on the network.
  • Page 82 ASCII American Standard Code for Information Interchange. This system of characters is most commonly used for text files Attenuation The loss in strength of digital and analog signals. The loss is greater when the signal is being transmitted over long distances. Authentication To provide credentials, like a Password, in order to verify that the person or device is really who they are claiming to be...
  • Page 83 A wide band of frequencies available for transmitting data Broadcast Transmitting data in all directions at once Browser A program that allows you to access resources on the web and provides them to you graphically Cable modem A device that allows you to connect a computer up to a coaxial cable and receive Internet access from your Cable provider CardBus A newer version of the PC Card or PCMCIA interface.
  • Page 84 DB-25 A 25 ping male connector for attaching External modems or RS-232 serial devices DB-9 A 9 pin connector for RS-232 connections Decibels related to dipole antenna Decibels relative to isotropic radiator Decibels relative to one milliwatt Decrypt To unscramble an encrypted message back into plain text Default A predetermined value or setting that is used by a program when no user input has been entered for this value or setting...
  • Page 85 To send a request from one computer to another and have the file transmitted back to the requesting computer Digital Subscriber Line. High bandwidth Internet connection over telephone lines Duplex Sending and Receiving data transmissions at the sane time Dynamic DNS service Dynamic DNS is provided by companies to allow users with Dynamic IP addresses to obtain a Domain Name that will always by linked to their changing IP address.
  • Page 86 Programming that is inserted into a hardware device that tells it how to function Fragmentation Breaking up data into smaller pieces to make it easier to store File Transfer Protocol. Easiest way to transfer files between computers on the Internet Full-duplex Sending and Receiving data at the same time Gain...
  • Page 87 Hypertext Transfer Protocol is used to transfer files from HTTP servers (web servers) to HTTP clients (web browsers) HTTPS HTTP over SSL is used to encrypt and decrypt HTTP transmissions A networking device that connects multiple devices together ICMP Internet Control Message Protocol IEEE Institute of Electrical and Electronics Engineers IGMP...
  • Page 88 A type of security that scans a network to detect attacks coming from inside and outside of the network Internet Protocol IP address A 32-bit number, when talking about Internet Protocol Version 4, that identifies each computer that transmits data on the Internet or on an Intranet IPsec Internet Protocol Security Internetwork Packet Exchange is a networking protocol developed by Novel to enable their...
  • Page 89 Local Area Network A group of computers in a building that usually access files from a server LPR/LPD "Line Printer Requestor"/"Line Printer Daemon". A TCP/IP protocol for transmitting streams of printer data. MAC Address A unique hardware ID assigned to every Ethernet adapter by the manufacturer. Mbps Megabits per second Medium Dependent Interface is an Ethernet port for a connection to a straight-through cable...
  • Page 90 NetBIOS Network Basic Input/Output System Netmask Determines what portion of an IP address designates the Network and which part designates the Host Network Interface Card A card installed in a computer or built onto the motherboard that allows the computer to connect to a network Network Layer The third layer of the OSI model which handles the routing of traffic on a network...
  • Page 91 Ping A utility program that verifies that a given Internet address exists and can receive messages. The utility sends a control packet to the given address and waits for a response. Power over Ethernet is the means of transmitting electricity over the unused pairs in a category 5 Ethernet cable POP3 Post Office Protocol 3 is used for receiving email...
  • Page 92 Routing Information Protocol is used to synchronize the routing table of all the routers on a network RJ-11 The most commonly used connection method for telephones RJ-45 The most commonly used connection method for Ethernet RS-232C The interface for serial communication between computers and other related devices Algorithm used for encryption and authentication Server A computer on a network that provides services and resources to other computers on the...
  • Page 93 Stateful Packet Inspection Secure Shell is a command line interface that allows for secure connections to remote computers SSID Service Set Identifier is a name for a wireless network Stateful inspection A feature of a firewall that monitors outgoing and incoming traffic to make sure that only valid responses to outgoing requests are allowed to pass though the firewall Subnet mask Determines what portion of an IP address designates the Network and which part designates...
  • Page 94 Universal Plug and Play A standard that allows network devices to discover each other and configure themselves to be a part of the network Upgrade To install a more recent version of a software or firmware product Upload To send a request from one computer to another and have a file transmitted from the requesting computer to the other UPnP Universal Plug and Play...
  • Page 95 Wireless Distribution System. A system that enables the interconnection of access points wirelessly. Web browser A utility that allows you to view content and interact with all of the information on the World Wide Web Wired Equivalent Privacy is security for wireless networks that is supposed to be comparable to that of a wired network Wide Area Network The larger network that your LAN is connected to, which may be the Internet itself, or a...
  • Page 96: Limited Warranty

    TEW-633GR 3 years If a product does not operate as warranted above during the applicable warranty period, TRENDnet shall, at its option and expense, repair the defective product or deliver to customer an equivalent product to replace the defective item. All products that are replaced will become the property of TRENDnet. Replacement products may be new or reconditioned.

Table of Contents