TRENDnet TEW-691GR User Manual

TRENDnet TEW-691GR User Manual

Trendnet tew-691gr: user guide
Hide thumbs Also See for TEW-691GR:

Advertisement

1

Advertisement

Table of Contents
loading

Summary of Contents for TRENDnet TEW-691GR

  • Page 2: Federal Communication Commission Interference Statement

    Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
  • Page 3 - EN 301 489-1 V1.8.1: (2008-04) - Electromagnetic compatibility and Radio Spectrum Matters (ERM); ElectroMagnetic Compatibility (EMC) standard for radio equipment and services; Part 1: Common technical requirements - EN 301 489-17 V1.3.2 (2008-04) - Electromagnetic compatibility and Radio spectrum Matters (ERM); ElectroMagnetic Compatibility (EMC) standard for radio equipment;...
  • Page 4: Table Of Contents

    Introduction ... 5  Features ... 5  Getting Started ... 6  Package Contents ... 6  Minimum System Requirements ... 6  Hardware Overview... 7  Wireless Performance Considerations ... 8  Using the Configuration Menu ... 9  Network ... 10  WAN Setting ... 10  LAN Setting ...
  • Page 5: Introduction

    Introduction TRENDnet’s 450Mbps Wireless N Gigabit Router, model TEW-691GR, redefines wireless router performance. This router’s raw horsepower seamlessly streams HD movies to your entertainment center, transfers content from countless users, and generates record wireless coverage. Gigabit Wide Area Network and Local Area Network ports transfer wired data fast. An Energy Star certified power adapter and embedded GREENnet technology reduce power consumption.
  • Page 6: Getting Started

    Getting Started Congratulations on purchasing the TEW-691GR! This manual provides information for setting up and configuring the TEW-691GR. This manual is intended for both home users and professionals. PACKAGE CONTENTS • TEW-691GR 450Mbps Wireless N Gigabit Router • CD-ROM (User’s Guide) •...
  • Page 7: Hardware Overview

    HARDWARE OVERVIEW LED Indications: (from left to right) WLAN Reserve LAN1 LAN2 LAN3 LAN4 Rear panel: (from left to right) DC-IN RESET Power switch Wi-Fi on/off switch LAN1 LAN2 LAN3 LAN4...
  • Page 8: Wireless Performance Considerations

    WIRELESS PERFORMANCE CONSIDERATIONS There are a number of factors that can impact the range of wireless devices. 1. Adjust your wireless devices so that the signal is traveling in a straight path, rather than at an angle. The more material the signal has to pass through the more signal you will lose. 2.
  • Page 9: Using The Configuration Menu

    Using the Configuration Menu Whenever you want to configure your TEW-691GR, you can access the Configuration Menu through your PC by opening the Web-browser and typing in the IP Address of the TEW-691GR. The TEW-691GR’s default IP Address is http://192.168.10.1 Open the Web browser.
  • Page 10: Network

    Network WAN SETTING WAN Connection Type There are several connection types to choose from: Static IP, DHCP, PPPoE, PPTP, L2TP, and Russia PPTP. If you are unsure of your connection method, please contact your Internet Service Provider. Static Used when your ISP provides you a set IP address that does not change. The IP information is manually entered in your IP configuration settings.
  • Page 11 Maximum Idle Time: Time interval the machine can be idle before the PPPoE connection is disconnected. The Maximum Idle Time value is only used for the "On demand" and "Manual" reconnect modes. L2TP L2TP (Layer Two Tunneling Protocol) uses a virtual private network to connect to your ISP. This method of connection requires you to enter a Username and Password (provided by your Internet Service Provider) to gain access to the Internet.
  • Page 12 The Maximum Transmission Unit (MTU) is a parameter that determines the largest packet size (in bytes) that the router will send to the WAN. If LAN devices send larger packets, the router will break them into smaller packets. Ideally, you should set this to match the MTU of the connection to your ISP. Typical values are 1500 bytes for an Ethernet connection and 1492 bytes for a PPPoE connection.
  • Page 13: Lan Setting

    LAN SETTING IP Address The IP address of the this device on the local area network. Assign any unused IP address in the range of IP addresses available for the LAN. Subnet Mask The subnet mask of the local area network. DHCP Server Settings DHCP stands for Dynamic Host Configuration Protocol.
  • Page 14 Once your router is properly configured and this option is enabled, the DHCP Server will manage the IP addresses and other network configuration information for computers and other devices connected to your Local Area Network. There is no need for you to do this yourself. The computers (and other devices) connected to your LAN also need to have their TCP/IP configuration set to "DHCP"...
  • Page 15: Qos

    can be deleted by clicking the Delete icon. When you click the Edit icon, the item is highlighted, and the "Edit DHCP Reservation" section is activated for editing. DHCP CLIENT LIST In this section you can see the connected LAN devices are currently receiving an IP addresses.
  • Page 16: Wireless

    2.4GHz 802.11b/g mixed mode - This wireless mode works in the 2.4GHz frequency range and will allow both wireless b and wireless g client to connect and access the TEW-691GR at 11Mbps for wireless b, at 54Mbps for wireless g and share access at the same time. Although the wireless b/g...
  • Page 17 2.4 GHz 802.11b/g/n mixed mode - This wireless mode works in the 2.4GHz frequency range and will only allow the use of wireless g client devices to connect and access the TEW-691GR at 11Mbps for wireless b, 54Mbps for wireless g and up to 450Mbps* for wireless n and share access at the same time.
  • Page 18: Advanced

    ADVANCED Beacon Interval Beacons are packets sent by a wireless router to synchronize wireless devices. Specify a Beacon Period value between 20 and 1000. The default value is set to 100 milliseconds. DTIM A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast messages.
  • Page 19: Security

    Select the option that works best for your installation. TX Burst Allows the wireless Router to deliver better throughput in the same period and environment in order to increase speed. Pkt_Aggregate Increase efficiency by aggregating multiple packets of application data into a single transmission frame.
  • Page 20 requires a longer key than 64-bit encryption. Keys are defined by entering in a string in HEX (hexadecimal - using characters 0-9, A-F) or ASCII (American Standard Code for Information Interchange - alphanumeric characters) format. ASCII format is provided so you can enter a string that is easier to remember.
  • Page 21: Wps

    MAC Address Enter the MAC address of a computer that you want to control with MAC filtering. Computers that have obtained an IP address from the router's DHCP server will be in the DHCP Client List. Select a device from the drop down menu. The rule of thumb:In mixed mode, multicast key has to be TKIP, but unicast key can be different per stations.In WPA or WPA2 only mode, unicast and multicast key can be only AES for WPA2, and TKIP for WPA.
  • Page 22: Station List

    Enable Enable the WPS feature. Lock Wireless Security Settings Locking the wireless security settings prevents the settings from being changed by any new external registrar using its PIN. Devices can still be added to the wireless network using WPS. PIN Settings A PIN is a unique number that can be used to add the router to an existing network or to create a new network.
  • Page 23: Advanced

    Advanced DMZ Setting DMZ means "Demilitarized Zone." If an application has trouble working from behind the router, you can expose one computer to the Internet and run the application on that computer. When a LAN host is configured as a DMZ host, it becomes the destination for all incoming packets that do not match some other incoming session or rule.
  • Page 24: Virtual Server

    ‧ To handle incoming connections that use a protocol other than ICMP, TCP, UDP, and IGMP (also GRE and ESP, when these protocols are enabled by the PPTP and IPSec Enable DMZ Putting a computer in the DMZ may expose that computer to a variety of security risks. Use of this option is only recommended as a last resort.
  • Page 25: Routing

    The port that will be used on your internal network. Public Port The port that will be accessed from the Internet. Schedule Select a schedule for when the service will be enabled. If you do not see the schedule you need in the list of schedules.
  • Page 26: Access Control

    router. When trying to reach a particular destination, computers on your network will select the best route, ignoring unreachable routes. Interface Specifies the interface -- LAN or WAN -- that the IP packet must use to transit out of the router, when this route is used.
  • Page 27: Special Applications

    SPECIAL APPLICATIONS Add/Edit Port Trigger Rule Enable Specifies whether the entry will be active or inactive. Name Enter a name for the Special Application Rule, for example Game App, which will help you identify the rule in the future. Alternatively, you can select from the Application list of common applications. Protocol Select the protocol used by the service.
  • Page 28: Gaming

    This is a list of the defined application rules. Click the Enable checkbox at the left to directly activate or de-activate the entry. An entry can be changed by clicking the Edit icon or can be deleted by clicking the Delete icon. GAMING Add/Edit Port Range Rule Use this section to add a Port Range Rule to the following list or to edit a rule already in the list.
  • Page 29: Inbound Filter

    Clear Re-initialize this area of the screen, discarding any changes you have made. Port Range Rule List This is a list of the defined Port Range Rules. Click the Enable checkbox at the left to directly activate or de-activate the entry. An entry can be changed by clicking the Edit icon or can be deleted by clicking the Delete icon.
  • Page 30: Schedule

    Deny All Prevent all WAN users from accessing the related capability. (LAN users are not affected by Inbound Filter Rules.) SCHEDULE Add/Edit Schedule Rule In this section you can add entries to the Schedule Rules List below or edit existing entries. Name Give the schedule a name that is meaningful to you, such as "Weekday rule".
  • Page 31: Advanced Network

    ADVANCED NETWORK...
  • Page 32: Administrator

    Administrator MANAGEMENT Admin Password Enter a password for the user "admin", who will have full access to the Web-based management interface. Device Name The name of the router can be changed here. Enable Dynamic DNS Enable this option only if you have purchased your own domain name and registered with a dynamic DNS service provider.
  • Page 33: Upload Firmware

    Account Enter the account provided by your service provider. If the Dynamic DNS provider supplies only a key, enter that key in all three fields. Password Enter the password provided by your service provider. If the Dynamic DNS provider supplies only a key, enter that key in all three fields.
  • Page 34: Time

    Export Settings This option allows y ou to export and then save the router's configuration to a file on your computer. Be sure to save the configuration before performing a firmware upgrade. Import Settings Use this option to r estore previously saved router configuration settings. Load Factory Defaults This option restores all co nfiguration settings back to the settings that were in effect at the time the...
  • Page 35: Status

    STATUS...
  • Page 36: Help

    Help Help section provides web-based explanations on each configurable field.
  • Page 37: Network Glossary

    Network Glossary Access Point - A device that allows wireless-equipped computers and other devices to communicate with a wired network. also used to expand the range of a wireless network. Ad-hoc - A group of wireless devices communicating directly with each other (peer-to-peer) without the use of an access point.
  • Page 38 Firewall - A set of related programs located at a network gateway server that protects the resources of a network from users from other networks. Firmware - The programming code that runs a networking device. FTP (File Transfer Protocol) - A protocol used to transfer files over a TCP/IP network. Full Duplex - The ability of a networking device to receive and transmit data simultaneously.
  • Page 39 RADIUS (Remote Authentication Dial-In User Service) - A protocol that uses an authentication server to control network access. RJ-45 (Registered Jack-45) - An Ethernet connector that holds up to eight wires. Roaming - The ability to take a wireless device from one access point's range to another without losing the connection.
  • Page 40 VPN (Virtual Private Network) - A security measure to protect data as it leaves one network and goes to another over the Internet. WAN (Wide Area Network)- The Internet. WEP (Wired Equivalent Privacy) - A method of encrypting network data transmitted on a wireless network for greater security.
  • Page 41: Limited Warranty

    Limited Warranty   TRENDnet warrants its products against defects in material and workmanship, under normal use and service,  for the following lengths of time from the date of purchase.          AC/DC Power Adapter, Cooling Fan, and Power Supply carry 1 year warranty.    If a product does not operate as warranted during the applicable warranty period, TRENDnet shall reserve the  right, at its expense, to repair or replace the defective product or part and deliver an equivalent product or part  to the customer. The repair/replacement unit’s warranty continues from the original date of purchase. All  products that are replaced become the property of TRENDnet. Replacement products may be new or  reconditioned. TRENDnet does not issue refunds or credit. Please contact the point‐of‐purchase for their return  policies.    TRENDnet shall not be responsible for any software, firmware, information, or memory data of customer  contained in, stored on, or integrated with any products returned to TRENDnet pursuant to any warranty.    There are no user serviceable parts inside the product.    Do not remove or attempt to service the product by  any unauthorized service center.    This warranty is voided if (i) the product has been modified or repaired by  any unauthorized service center, (ii) the product was subject to accident, abuse, or improper use (iii) the  product was subject to conditions more severe than those specified in the manual.    Warranty service may be obtained by contacting TRENDnet within the applicable warranty period and providing  a copy of the dated proof of the purchase. Upon proper submission of required documentation a Return  Material Authorization (RMA) number will be issued. An RMA number is required in order to initiate warranty  service support for all TRENDnet products. Products that are sent to TRENDnet for RMA service must have the  RMA number marked on the outside of return packages and sent to TRENDnet prepaid, insured and packaged  appropriately for safe shipment. Customers shipping from outside of the USA and Canada are responsible for  return shipping fees. Customers shipping from outside of the USA are responsible for custom charges, including  but not limited to, duty, tax, and other fees.    WARRANTIES EXCLUSIVE: IF THE TRENDNET PRODUCT DOES NOT OPERATE AS WARRANTED ABOVE, THE ...
  • Page 42 REVENUE OR PROFITS, LOSS OF BUSINESS, LOSS OF INFORMATION OR DATE, OR OTHER FINANCIAL LOSS  ARISING OUT OF OR IN CONNECTION WITH THE SALE, INSTALLATION, MAINTENANCE, USE, PERFORMANCE,  FAILURE, OR INTERRUPTION OF THE POSSIBILITY OF SUCH DAMAGES, AND LIMITS ITS LIABILITY TO REPAIR,  REPLACEMENT, OR REFUND OF THE PURCHASE PRICE PAID, AT TRENDNET’S OPTION. THIS DISCLAIMER OF  LIABILITY FOR DAMAGES WILL NOT BE AFFECTED IF ANY REMEDY PROVIDED HEREIN SHALL FAIL OF ITS  ESSENTIAL PURPOSE.    Governing Law: This Limited Warranty shall be governed by the laws of the state of California.    Some TRENDnet products include software code written by third party developers. These codes are subject to  the GNU General Public License ("GPL") or GNU Lesser General Public License ("LGPL").      Go to http://www.trendnet.com/gpl or http://www.trendnet.com Download section and look for the desired  TRENDnet product to access to the GPL Code or LGPL Code. These codes are distributed WITHOUT WARRANTY  and are subject to the copyrights of the developers. TRENDnet does not provide technical support for these  codes. Please go to http://www.gnu.org/licenses/gpl.txt or http://www.gnu.org/licenses/lgpl.txt for specific  terms of each license.  PWP05202009v2   ...

This manual is also suitable for:

Tew-691gr 1.01

Table of Contents