TRENDnet TEW-637AP User Manual

TRENDnet TEW-637AP User Manual

802.11n (draft 2.0) high-performance wireless ap
Hide thumbs Also See for TEW-637AP:

Advertisement

1

Advertisement

Table of Contents
loading

Summary of Contents for TRENDnet TEW-637AP

  • Page 2: Federal Communication Commission Interference Statement

    Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. reasonable protection against harmful interference in a residential installation. This equipment generates uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
  • Page 3: European Union Notice

    Radio products with the CE marking comply with the R&TTE Directive (1999/5/EC), the EMC Directive (89/336/EEC) and the Low Voltage Directive (73/23/EEC) issued by the Commission of the European Community. Compliance with these directives implies conformity to the following European Norms: EN 60950 Product Safety EN 300 328 Technical requirement for radio equipment EN 301 489-1/-17 General EMC requirements for radio equipment...
  • Page 4: Table Of Contents

    Table of Contents Getting Started with the TEW-637AP...5 Package Contents ...….6 Minimum System Requirements ...…6 Introduction...7 Features...…7 Hardware Overview ...8 Rear Panel...…8 Front Panel...…9 Installation Considerations ...…9 Getting Started ...…10 Using the Configuration Menu...17 Network...…18 Wireless...…20 Administrator...…31 Glossary...35...
  • Page 5: Package Contents

    Package Contents TEW-637AP 11n (Draft) AP CAT-5 Ethernet Cable (the TEW-637AP’s Ethernet ports is Auto-MDIX) Power Adapter (12.0V, 1.0A) CD-ROM with Manual & Wizard Quick Installation Guide Using a power supply with a different voltage than the one included with your product will cause damage and void the warranty for this product.
  • Page 6: Introduction

    Unlike most Access Points, the TEW-637AP provides data transfers at up to 300 Mbps when used with other 11n products. This AP is backwards compatible with 802.11b/g products. This means that you do not need to change your entire network to maintain connectivity.
  • Page 7: Hardware Overview

    Pressing the reset button restores the AP to its original factory default settings. DC-IN The DC power input connector is a single jack socket to supply power to the TEW-637AP. Please use the Power Adapter provided on the TEW-637AP package. Rear Panel...
  • Page 8: Front Panel

    The key to maximizing wireless range is to follow these basic guidelines: Keep the number of walls and ceilings between the TEW-637AP and other network devices to a minimum - each wall or ceiling can reduce your wireless product’s range from 3-90 feet (1-30 meters.) Position your devices so that the number of walls or ceilings is minimized.
  • Page 9: Getting Started

    The Welcome screen appears on your monitor. Click Start button. Read the License Agreement and click Next to continue the installation. Your computer will detect TEW-637AP and the Device List screen appears on your monitor. Click Configure button to continue (default TEW-637AP IP Address is 192.168.10.100).
  • Page 10 10. The default IP address is 192.168.10.100, you can choose to obtain network setting automatically, or set the IP address manually. After setting, click Next to complete it. 11. To setup TEW-637AP or add/connect your wireless client to this AP, please select “Wireless wizard” and click Next to continue.
  • Page 11 12. Select WPS to connect your wireless client device to this AP, and click Next button. 13. Select one of the Wi-Fi Protected Setup methods to connect your wireless client device to this AP. Use Push Button, click Next button to continue. You also need to enable WPS function of the wireless client device to make connection.
  • Page 12 To set TEW-637AP security, select Manual setup and click Next button 17. Enter SSID of TEW-637AP, click Next button. 18. To disable Security Mode, select None and click Next button. Page 12...
  • Page 13 19. To use WEP security, select WEP and click Next button. Select 64-bit or 128-bit WEP key length, and enter your WEP key. For 64-bit encryption, enter 10 hexadecimal characters, For 128-bit encryption, enter 26 hexadecimal characters. Click Next to continue the setting.
  • Page 14 21. Save you setting to a text file in a desired location. Page 14...
  • Page 15 22.Congratulations you have configured you TEW-637AP. Page 15...
  • Page 16: Using The Configuration Menu

    Open the Web browser. Type in the current IP Address of the AP (i.e. http://192.168.10.100). If you have changed the default IP Address assigned to the TEW-637AP, make sure to enter the correct IP Address. Type admin in the User Name field.
  • Page 17: Network

    Network The Network tab provides the following configuration options: LAN Setting. Network LAN Setting These are the settings of the LAN (Local Area Network) interface for the Access Point. The Access Point's local network (LAN) settings are configured based on the IP Address and Subnet Mask assigned in this section.
  • Page 18 The subnet mask of the local area network. Default Gateway The IP address of the router on the local area network. Choose “DHCP (Auto Config)” if your router supports DHCP and you want the router to assign an IP address to the AP. Page 18...
  • Page 19: Wireless

    Wireless The wireless section is used to configure the wireless settings for your Access Point. Note that changes made in this section may also need to be duplicated on wireless clients that you want to connect to your wireless network. To protect your privacy, use the wireless security mode to configure the wireless security features.
  • Page 20 Radio On/Off Press this button to toggle radio On/off. Page 20...
  • Page 21 Network Mode If all of the wireless devices you want to connect with this Access Point can connect in the same transmission mode, you can improve performance slightly by choosing the appropriate "Only" mode. If you have some devices that use a different transmission mode, choose the appropriate "Mixed" mode. Network Name (SSID) When you are browsing for available wireless networks, this is the name that will appear in the list (unless Broadcast Network Name is set to Disable, see below).
  • Page 22 This parameter represents transmission rate. By default (Auto) the fastest possible transmission rate will be selected. You have the option of selecting the speed if necessary. Reserve Direction Grant (RDG) Disable or enable reserve direction grant. Default is enabled. Extension Channel When 20/40 channel bandwidth has been chosen, you should select extension channel to get higher throughput.
  • Page 23 Wireless Advanced Beacon Interval Beacons are packets sent by a wireless Access Point to synchronize wireless devices. Specify a Beacon Period value between 20 and 1000. The default value is set to 100 milliseconds. Data Beacon Rate (DTIM) Page 23...
  • Page 24 A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast messages. When the wireless Access Point has buffered broadcast or multicast messages for associated clients, it sends the next DTIM with a DTIM Interval value. Wireless clients detect the beacons and awaken to receive the broadcast and multicast messages.
  • Page 25: Wireless Mac Filter

    Wireless MAC Filter The MAC address filter section can be used to filter network access by machines based on the unique MAC addresses of their network adapter(s). It is most useful to prevent unauthorized wireless devices from connecting to your network. A MAC address is a unique ID assigned by the manufacturer of the network adapter.
  • Page 26: Wireless Security

    Wireless Security Page 26...
  • Page 27 SSID choice Choose the SSID which need to implement security. Security Mode You can disable security mode, or you can choose following modes to enable security – Open, Shared, WEPauto, WPA, WPA-PSK, WPA2, WPA2-PSK, WPA-PSK/WPA2-PSK Page 27...
  • Page 28 Wireless WPS You can setup security easily by choosing PIN or PBC method to do Wi-Fi Protected Setup. Page 28...
  • Page 29 WPS mode Two WPS modes can be selected – PIN & PBC. If PIN is selected, you should enter PIN code of your wireless client device to get wireless connection with this AP. Page 29...
  • Page 30 Wireless Station List You can monitor stations which associated to this AP. Page 30...
  • Page 31: Administrator

    Administrator This Administrator section is used to set password for access to the Web-based management, also provide function of firmware upgrade. The Administrator tab provides the following configuration options: Management, Upload Firmware, Settings Management & Status. System Management At this page, you can configure administrator account and password. Page 31...
  • Page 32 Administrator Upload Firmware By assigning firmware location, you can upload firmware at this page. Page 32...
  • Page 33 Administrator Settings Management You can save system settings by exporting them to a configuration file, restore them by importing the file, or reset them to factory default. Page 33...
  • Page 34 Administrator Status You can check system information and network configurations on this page. Page 34...
  • Page 35: Glossary

    Glossary Access Control List ACL. This is a database of network devices that are allowed to access resources on the network. Access Point AP. Device that allows wireless clients to connect to it and access the network Ad-hoc network Peer-to-Peer network between wireless clients Address Resolution Protocol ARP.
  • Page 36 Bandwidth The maximum amount of bytes or bits per second that can be transmitted to and from a network device Beacon A data frame by which one of the stations in a Wi-Fi network periodically broadcasts network control data to other wireless stations. Bit rate The amount of bits that pass in given amount of time Bit/sec...
  • Page 37 Decibels related to dipole antenna Decibels relative to isotropic radiator Decibels relative to one milliwatt Decrypt To unscramble an encrypted message back into plain text Default A predetermined value or setting that is used by a program when no user input has been entered for this value or setting DHCP Dynamic Host Configuration Protocol: Used to automatically assign IP addresses from a...
  • Page 38 Extensible Authentication Protocol Encryption Converting data into cyphertext so that it cannot be easily read Ethernet The most widely used technology for Local Area Networks. File server A computer on a network that stores data so that the other computers on the network can all access it File sharing Allowing data from computers on a network to be accessed by other computers on the network...
  • Page 39 Graphical user interface Half-duplex Data cannot be transmitted and received at the same time Hashing Transforming a string of characters into a shorter string with a predefined length Hexadecimal Characters 0-9 and A-F The action of data packets being transmitted from one AP to another Host Computer on a network HTTP...
  • Page 40 In terms of a wireless network, this is when wireless clients use an Access Point to gain access to the network Internet A system of worldwide networks which use TCP/IP to allow for resources to be accessed from computers around the world Internet Explorer A World Wide Web browser created and provided by Microsoft Internet Protocol...
  • Page 41 Kbps Kilobits per second Kbyte Kilobyte Local Area Network Latency The amount of time that it takes a packet to get from the one point to another on a network. Also referred to as delay Light Emitting Diode Legacy Older devices or technology Local Area Network A group of computers in a building that usually access files from a server LPR/LPD...
  • Page 42 Management Information Base is a set of objects that can be managed by using SNMP Modem A device that Modulates digital signals from a computer to an analog signal in order to transmit the signal over phone lines. It also Demodulates the analog signals coming from the phone lines to digital signals for your computer MPPE Microsoft Point-to-Point Encryption is used to secure data transmissions over PPTP connections...
  • Page 43 Network Time Protocol OFDM Orthogonal Frequency-Division Multiplexing is the modulation technique for both 802.11a and 802.11g Open Systems Interconnection is the reference model for how data should travel between two devices on a network OSPF Open Shortest Path First is a routing protocol that is used more than RIP in larger scale networks because only changes to the routing table are sent to all the other APs in the network as opposed to sending the entire routing table at a regular interval, which is how RIP functions Password...
  • Page 44 PPTP Point-to-Point Tunneling Protocol is used for creating VPN tunnels over the Internet between two networks Preamble Used to synchronize communication timing between devices on a network Quality of Service RADIUS Remote Authentication Dial-In User Service allows for remote users to dial into a central server and be authenticated in order to access resources on a network Reboot To restart a computer and reload it's operating software or firmware from nonvolatile storage.
  • Page 45 Session key An encryption and decryption key that is generated for every communication session between two computers Session layer The fifth layer of the OSI model which coordinates the connection and communication between applications on both ends Simple Mail Transfer Protocol Used for sending and receiving email Simple Network Management Protocol Governs the management and monitoring of network devices...
  • Page 46 System Logger -- a distributed logging interface for collecting in one place the logs from different sources. Originally written for UNIX, it is now available for other operating systems, including Windows. Transmission Control Protocol TCP/IP Transmission Control Protocol/Internet Protocol TCP Raw A TCP/IP protocol for transmitting streams of printer data.
  • Page 47 Uniform Resource Locator is a unique address for files accessible on the Internet Universal Serial Bus Unshielded Twisted Pair Virtual Private Network VPN: A secure tunnel over the Internet to connect remote offices or users to their company's network VLAN Virtual LAN Voice over IP Sending voice information over the Internet as opposed to the PSTN...
  • Page 48 Wireless Fidelity Wi-Fi Protected Access An updated version of security for wireless networks that provides authentication as well as encryption Wide Area Network The larger network that your LAN is connected to, which may be the Internet itself, or a regional or corporate network Wireless ISP A company that provides a broadband Internet connection over a wireless connection...
  • Page 49 Page 49...

Table of Contents