TRENDnet TEW-610APB User Manual

TRENDnet TEW-610APB User Manual

108mbps 802.11g mimo wireless access point
Hide thumbs Also See for TEW-610APB:

Advertisement

Quick Links

1

Advertisement

Table of Contents
loading

Summary of Contents for TRENDnet TEW-610APB

  • Page 2: Federal Communication Commission Interference Statement

    Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
  • Page 3: Table Of Contents

    Table of Contents Getting Started with the TEW-610APB.........4 Package Contents ..........5 Minimum System Requirements ......... 5 Introduction.............6 Features.............6 Hardware Overview ..........7 Rear Panel............7 LEDs............8 Installation Considerations ........9 Getting Started ..........9 Using the Configuration Menu........10 Information..........11 Stations............12 Wireless............13 WDS............15 Security............16 Access............18...
  • Page 4: Getting Started With The Tew-610Apb

    Getting Started with the TEW-610APB Congratulations on purchasing the TEW-610APB! This manual provides information for setting up and configuring the TEW-610APB. This manual is intended for both home users and professionals. The following conventions are used in this manual: THE NOTE SYMBOL INDICATES ADDITIONAL INFORMATION ON THE TOPIC AT HAND.
  • Page 5: Package Contents

    Package Contents TEW-610APB 108Mbps 802.11g Wireless MIMO Access Point CAT-5 Ethernet Cable ( the TEW-610APB’s Ethernet ports is Auto-MDIX) Power Adapter (5V DC, 2A) CD-ROM with Manual Multi-Language Quick Installation Guide Using a power supply with a different voltage than the one included with your product will cause damage and void the warranty for this product.
  • Page 6: Introduction

    Unlike most APs, the TEW-610APB provides data transfers at up to 108 Mbps (compared to the standard 54 Mbps) when used with other Super G MIMO products. The 802.11g standard is backwards compatible with 802.11b products.
  • Page 7: Hardware Overview

    Hardware Overview Real Panel DC-IN The DC power input connector is a single jack socket to supply power to the TEW-610APB. Please use the Power Adapter provided on the TEW-610APB package. Auto-MDIX LAN Ports This port automatically senses the cable type and auto negotiating the speed when connecting to the Router.
  • Page 8: Leds

    LEDs POWER LED A solid light indicates a proper connection to the power supply. LAN LED A solid light indicates a connection to a Router on the LAN port. This LED blinks during data transmission. WLAN LED A solid light indicates that the wireless segment is ready. This LED blinks during wireless data transmission.
  • Page 9: Installation Considerations

    Installation Considerations The TEW-610APB Super G Wireless MIMO AP lets you access your network, using a wireless connection, from virtually anywhere within its operating range. Keep in mind, however, that the number, thickness and location of walls, ceilings, or other objects that the wireless signals must pass through, may limit the range.
  • Page 10: Using The Configuration Menu

    Open the Web browser. Type in the IP Address of the AP (http://192.168.0.100 If you have changed the default IP Address assigned to the TEW-610APB, make sure to enter the correct IP Address. Type admin in the User Name field.
  • Page 11: Information

    Information Access Point Name Model name of this Access Point MAC Address The Ethernet ID (MAC address) of the wireless client. Firmware version Current firmware version of this Access Point SSID When you are browsing for available wireless networks, this is the name that will appear in the list.
  • Page 12: Stations

    Stations This section shows you a list of MAC address of stations that have associated to this Access Point.
  • Page 13: Wireless

    Wireless This wireless section is used to configure the wireless settings for your Wireless AP. Please note that changes made on this section may also need to be duplicated on your Wireless Client. Wireless On/Off This option turns off and on the wireless connection feature of the AP. Wireless Network Name When you are browsing for available wireless networks, this is the name that will appear in the list (unless Visibility Status is set to invisible, see below).
  • Page 14 Visibility Status The Invisible option allows you to hide your wireless network. When this option is set to Visible, your wireless network name is broadcast to anyone within the range of your signal. If you're not using encryption then they could connect to your network. When Invisible mode is enabled, you must enter the Wireless Network Name (SSID) on the client manually to connect to the network.
  • Page 15: Wds

    Wireless Distribution System (WDS). When WDS is enabled, this access point functions as a wireless bridge and is able to wirelessly communication with other APs. Enable WDS When WDS is enabled, this access point functions as a wireless repeater and is able to wirelessly communicate with other APs via WDS links.
  • Page 16: Security

    Security On this section you can set the 802.11g security and encryption options. Any new settings will not take effect until the device is rebooted.
  • Page 17 WPA Enable Select to enable WPA function WPA Mode WPA is the older standard; select this option if the clients that will be used with the AP only support the older standard. WPA2 is the newer implementation of the stronger IEEE 802.11i security standard.
  • Page 18: Access

    Access On this section you can enable Access Control. If enabled, only the MAC addresses entered into the “MAC address” boxes are allowed to associate to this AP. Note that you can cut and paste the addresses from the “Station List” page into MAC address boxes. Any new settings will not take effect until the device is rebooted.
  • Page 19: Admin

    Admin On this section you can configure the IP address used by the Web server running on this device. For “static” mode, the IP address settings are given here. For “DHCP” mode, these settings are supplied by a DHCP server on your network. You can also change the password, reboot the device, or reset all settings to their factory defaults.
  • Page 20 Firmware Upgrade Note: Firmware upgrade cannot be performed from a wireless device. To perform an upgrade, ensure that you are using a PC that is connected to the AP by wire. Note: Some firmware upgrades reset the AP's configuration options to the factory defaults. Upload Once you have a firmware update on your computer, use this option to browse for the file and then upload the information into the AP.
  • Page 21: Advanced

    Advanced On this section you can configure the advanced 802.11g wireless settings. If you have changed any settings it is necessary to reboot the device for the new settings to take effect. Fragmentation Threshold This setting should remain at its default value of 2346. Setting the Fragmentation value too low may result in poor performance.
  • Page 22 Beacon Period Beacons are packets sent by a wireless AP to synchronize wireless devices. Specify a Beacon Period value between 20 and 1000. The default value is set to 100 milliseconds. DTIM Interval A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast messages.
  • Page 23: Glossary

    Glossary Access Control List ACL. This is a database of network devices that are allowed to access resources on the network. Access Point AP. Device that allows wireless clients to connect to it and access the network Ad-hoc network Peer-to-Peer network between wireless clients Address Resolution Protocol ARP.
  • Page 24 The ability for new devices to communicate and interact with older legacy devices to guarantee interoperability Bandwidth The maximum amount of bytes or bits per second that can be transmitted to and from a network device Beacon A data frame by which one of the stations in a Wi-Fi network periodically broadcasts network control data to other wireless stations.
  • Page 25 Information that has been translated into binary so that it can be processed or moved to another device Data-Link layer The second layer of the OSI model. Controls the movement of data on the physical link of a network Decibels related to dipole antenna Decibels relative to isotropic radiator Decibels relative to one milliwatt Decrypt...
  • Page 26 Dynamic IP address IP address that is assigned by a DHCP server and that may change. Cable Internet providers usually use this method to assign IP addresses to their customers. Extensible Authentication Protocol Encryption Converting data into cyphertext so that it cannot be easily read Ethernet The most widely used technology for Local Area Networks.
  • Page 27 A device that connects your network to another, like the internet Gbps Gigabits per second Gigabit Ethernet Transmission technology that provides a data rate of 1 billion bits per second Graphical user interface Half-duplex Data cannot be transmitted and received at the same time Hashing Transforming a string of characters into a shorter string with a predefined length Hexadecimal...
  • Page 28 Internet Group Management Protocol is used to make sure that computers can report their multicast group membership to adjacent APs Internet Information Server is a WEB server and FTP server provided by Microsoft Infrastructure In terms of a wireless network, this is when wireless clients use an Access Point to gain access to the network Internet A system of worldwide networks which use TCP/IP to allow for resources to be accessed from...
  • Page 29 Internet Service Provider Java A programming language used to create programs and applets for web pages Kbps Kilobits per second Kbyte Kilobyte Local Area Network Latency The amount of time that it takes a packet to get from the one point to another on a network. Also referred to as delay Light Emitting Diode Legacy...
  • Page 30 Medium Dependent Interface is an Ethernet port for a connection to a straight-through cable MDIX Medium Dependent Interface Crossover, is an Ethernet port for a connection to a crossover cable Management Information Base is a set of objects that can be managed by using SNMP Modem A device that Modulates digital signals from a computer to an analog signal in order to transmit the signal over phone lines.
  • Page 31 Network Layer The third layer of the OSI model which handles the routing of traffic on a network Network Time Protocol Used to synchronize the time of all the computers in a network Network Interface Card Network Time Protocol OFDM Orthogonal Frequency-Division Multiplexing is the modulation technique for both 802.11a and 802.11g Open Systems Interconnection is the reference model for how data should travel between two...
  • Page 32 Port A logical channel endpoint in a network. A computer might have only one physical channel (its Ethernet channel) but can have multiple ports (logical channels) each identified by a number. Point-to-Point Protocol is used for two computers to communicate with each over a serial interface, like a phone line PPPoE Point-to-Point Protocol over Ethernet is used to connect multiple computers to a remote server...
  • Page 33 RJ-45 The most commonly used connection method for Ethernet RS-232C The interface for serial communication between computers and other related devices Algorithm used for encryption and authentication Server A computer on a network that provides services and resources to other computers on the network Session key An encryption and decryption key that is generated for every communication session between...
  • Page 34 Secure Shell is a command line interface that allows for secure connections to remote computers SSID Service Set Identifier is a name for a wireless network Stateful inspection A feature of a firewall that monitors outgoing and incoming traffic to make sure that only valid responses to outgoing requests are allowed to pass though the firewall Subnet mask Determines what portion of an IP address designates the Network and which part designates...
  • Page 35 Universal Plug and Play A standard that allows network devices to discover each other and configure themselves to be a part of the network Upgrade To install a more recent version of a software or firmware product Upload To send a request from one computer to another and have a file transmitted from the requesting computer to the other UPnP Universal Plug and Play...
  • Page 36 Windows Connect Now. A Microsoft method for configuring and bootstrapping wireless networking hardware (access points) and wireless clients, including PCs and other devices. Wireless Distribution System. A system that enables the interconnection of access points wirelessly. Web browser A utility that allows you to view content and interact with all of the information on the World Wide Web Wired Equivalent Privacy is security for wireless networks that is supposed to be comparable to that of a wired network...
  • Page 37 Yagi antenna A directional antenna used to concentrate wireless signals on a specific location 802.11 A family of specifications for wireless local area networks (WLANs) developed by a working group of the Institute of Electrical and Electronics Engineers (IEEE).
  • Page 38: Limited Warranty

    Limited Warranty TRENDware warrants its products against defects in material and workmanship, under normal use and service, for the following lengths of time from the date of purchase. Wireless Products – 3 Years Warranty If a product does not operate as warranted above during the applicable warranty period, TRENDware shall, at its option and expense, repair the defective product or part, deliver to customer an equivalent product or part to replace the defective item, or refund to customer the purchase price paid for the defective product.
  • Page 39 CONTRACT TORT (INCLUDING NEGLIGENCE), INCIDENTAL, CONSEQUENTIAL, INDIRECT, SPECIAL, OR PUNITIVE DAMAGES OF ANY KIND, OR FOR LOSS OF REVENUE OR PROFITS, LOSS OF BUSINESS, LOSS OF INFORMATION OR DATE, OR OTHER FINANCIAL LOSS ARISING OUT OF OR IN CONNECTION WITH THE SALE, INSTALLATION, MAINTENANCE, USE, PERFORMANCE, FAILURE, OR INTERRUPTION OF THE POSSIBILITY OF SUCH DAMAGES, AND LIMITS ITS LIABILITY TO REPAIR, REPLACEMENT, OR REFUND OF THE PURCHASE PRICE PAID, AT...

Table of Contents