TRENDnet Not available User Manual

Size:
1.13 Mb
Download

Maximum Idle Time: Time interval the machine can be idle before the PPPoE connection is disconnected. The Maximum Idle Time value is only used for the "On demand" and "Manual" reconnect modes.

L2TP

L2TP (Layer Two Tunneling Protocol) uses a virtual private network to connect to your ISP. This method of connection requires you to enter a Username and Password (provided by your Internet Service Provider) to gain access to the Internet.

L2TP Server IP Address: The ISP provides this parameter, if necessary. The value may be the same as the Gateway IP Address.

Reconnect Mode: Typically PPPoE connections are not always on. The router allows you to set the reconnection mode. The settings are:

Always on: A connection to the Internet is always maintained.On demand: A connection to the Internet is made as needed.

Manual: You have to open up theWeb-basedmanagement interface and click the Connect button manually any time that you wish to connect to the Internet.

Maximum Idle Time: Time interval the machine can be idle before the PPPoE connection is disconnected. The Maximum Idle Time value is only used for the "On demand" and "Manual" reconnect modes.

WAN Interface IP Type

Static: If your ISP has assigned a fixed IP address, select this option. The ISP provides the values for the following fields forWAN Interface IP Setting: IP Address, Subnet Mask , Default Gateway. Dynamic: If the ISP's servers assign the router's IP addressing upon establishing a connection, select this option.

PPTP

PPTP (Point to Point Tunneling Protocol) uses a virtual private network to connect to your ISP. This method of connection is primarily used in Europe. This method of connection requires you to enter a Username andPassword (provided by your Internet Service Provider) to gain access to the Internet.PPTP Server IP Address: The ISP provides this parameter, if necessary. The value may be the same as the Gateway IP Address.

Reconnect Mode: Typically PPPoE connections are not always on. The router allows you to set the reconnection mode. The settings are:

Always on: A connection to the Internet is always maintained.On demand: A connection to the Internet is made as needed.

Manual: You have to open up theWeb-basedmanagement interface and click the Connect button manually any time that you wish to connect to the Internet.

Maximum Idle Time: Time interval the machine can be idle before the PPPoE connection is disconnected. The Maximum Idle Time value is only used for the "On demand" and "Manual" reconnect modes.

WAN Interface IP Type

Static: If your ISP has assigned a fixed IP address, select this option. The ISP provides the values for the following fields forWAN Interface IP Setting: IP Address, Subnet Mask , Default Gateway, and optional forDNS Server

Dynamic: If the ISP's servers assign the router's IP addressing upon establishing a connection, select this option.

Russia PPTP

The Russia PPTP can configure IP address on the WAN interface and establish PPTP to get IP address, subnet mask, default gateway and DNS for ANOTHER logical IP interface on WAN port. So the physical WAN port will have 2 logical IP interfaces and can communicate with internal ISP’s network resources and also communicate with Internet through PPTP tunnel. It is specified by Russia Cobrina ISP, user can configure it the same as the normal PPTP and PPTP server IP Address can use the domain name string.

WAN MTU Setting

11

The Maximum Transmission Unit (MTU) is a parameter that determines the largest packet size (in bytes) that the router will send to the WAN. If LAN devices send larger packets, the router will break them into smaller packets. Ideally, you should set this to match the MTU of the connection to your ISP. Typical values are 1500 bytes for an Ethernet connection and 1492 bytes for a PPPoE connection. If the router's MTU is set too high, packets will be fragmented downstream. If the router's MTU is set too low, the router will fragment packets unnecessarily and in extreme cases may be unable to establish some connections. In either case, network performance can suffer. t modes.

MAC Address Clone

Each networking device has it's own unique MAC address defined by the hardware manufacturer. Some ISP's may check your computer's MAC address. Some ISP's record the MAC address of the network adapter in the computer or router used to initially connect to their service. The ISP will then only grant Internet access to requests from a computer or router with this particular MAC address.

This router has a different MAC address than the computer or router that initially connected to the ISP. If you need to change the MAC address of the rounter's WAN-sideEthernet interface, either type in an alternate MAC address (for example, the MAC address of the router initially connected to the ISP) or copy the MAC address of a PC. To copy the MAC address of the computer that initially connected to the ISP, connect to the router using that computer and click theClone Your PC's MAC Address button. The WAN interface will then use the MAC address of the network adapter in your computer.

12

LAN SETTING

IP Address

The IP address of the this device on the local area network. Assign any unused IP address in the range of IP addresses available for the LAN.

Subnet Mask

The subnet mask of the local area network.

DHCP Server Settings

DHCP stands for Dynamic Host Configuration Protocol. The DHCP section is where you configure the built-inDHCP Server to assign IP addresses to the computers and other devices on your local area network (LAN).

Enable DHCP Server

13

Once your router is properly configured and this option is enabled, the DHCP Server will manage the IP addresses and other network configuration information for computers and other devices connected to your Local Area Network. There is no need for you to do this yourself.

The computers (and other devices) connected to your LAN also need to have their TCP/IP configuration set to "DHCP" or "Obtain an IP address automatically". When you set Enable DHCP Server, the following options are displayed.

DHCP IP Address Range

These two IP values (Start and End) define a range of IP addresses that the DHCP Server uses when assigning addresses to computers and devices on your Local Area Network. Any addresses that are outside of this range are not managed by the DHCP Server; these could, therefore, be used for manually configured devices or devices that cannot use DHCP to obtain network address details automatically.

It is possible for a computer or device that is manually configured to have an address that does reside within this range. In this case the address should be reserved, so that the DHCP Server knows that this specific address can only be used by a specific computer or device.

Your router, by default, has a static IP address of 192.168.10.1. This means that addresses 192.168.10.2 to 192.168.10.254 can be made available for allocation by the DHCP Server.

Subnet Mask

The subnet mask of the local area network.

Gateway

The IP address of the router on the local area network. For example, 192.168.10.1.

DHCP Lease Time

The amount of time that a computer may have an IP address before it is required to renew the lease. The lease functions just as a lease on an apartment would. The initial lease designates the amount of time before the lease expires. If the tenant wishes to retain the address when the lease is expired then a new lease is established. If the lease expires and the address is no longer needed than another tenant may use the address.

Add/Edit DHCP Reservation

This option lets you reserve IP addresses, and assign the same IP address to the network device with the specified MAC address any time it requests an IP address. This is almost the same as when a device has a static IP address except that the device must still request an IP address from the router. The router will provide the device the same IP address every time. DHCP Reservations are helpful for server computers on the local network that are hosting applications such as Web and FTP. Servers on your network should either use a static IP address or use this option.

Computer Name

You can assign a name for each computer that is given a reserved IP address. This may help you keep track of which computers are assigned this way. Example: Game Server.

IP Address:

The LAN address that you want to reserve.

MAC Address

To input the MAC address of your system, enter it in manually or connect to the router's Web-Managementinterface from the system and click theCopy Your PC's MAC Address button.

A MAC address is usually located on a sticker on the bottom of a network device. The MAC address is comprised of twelve digits. Each pair of hexadecimal digits are usually separated by dashes or colons such as 00-0D-88-11-22-33or 00:0D:88:11:22:33. If your network device is a computer and the network card is already located inside the computer, you can connect to the router from the computer and click theCopy Your PC's MAC Address button to enter the MAC address.

Clear

Re-initializethis area of the screen, discarding any changes you have made.

DHCP Reservations List

This shows clients that you have specified to reserve DHCP addresses. Click the Enable checkbox at the left to directly activate or de-activatethe entry. An entry can be changed by clicking the Edit icon or

14

can be deleted by clicking the Delete icon. When you click the Edit icon, the item is highlighted, and the "Edit DHCP Reservation" section is activated for editing.

QOS

DHCP CLIENT LIST

In this section you can see the connected LAN devices are currently receiving an IP addresses.

15

Wireless

BASIC

Radio On/Off

This indicates the wireless operating status. The wireless can be turned on or off by the slide switch. When the radio is on, the following parameters are in effect.

Wireless Mode

If all of the wireless devices you want to connect with this router can connect in the same transmission mode, you can improve performance slightly by choosing the appropriate wireless mode. If you have some devices that use a different transmission mode, choose the appropriate wireless mode. The TEW-691GRsupports 2.4GHz wireless networks. There are many different configuration options available to choose from. Use the drop down list to select the wireless mode.

Note: One wireless mode can be selected can select at any one time. This means that you can only select one of the operating frequency at a time.

Wireless Mode options

2.4GHz 802.11b/g mixed mode - This wireless mode works in the 2.4GHz frequency range and will allow both wireless b and wireless g client to connect and access theTEW-691GRat 11Mbps for wireless b, at 54Mbps for wireless g and share access at the same time. Although the wireless b/g

16

operates in the 2.4GHz frequency, it will allow the use of other 2.4GHz client devices (Wireless n/g @ 54Mbps) to connect and access at the same time.

2.4GHz 802.11 n only – This wireless mode works in the 2.4GHz frequency range and will only allow the use of wireless n client devices to connect and access theTEW-691GRup to 450Mbps*. Although the wireless n operates in the 2.4GHz frequency, this mode will only permit wireless n client devices to work and will exclude any other wireless mode and devices that are not wireless n only.

2.4 GHz 802.11b/g/n mixed mode - This wireless mode works in the 2.4GHz frequency range and will only allow the use of wireless g client devices to connect and access theTEW-691GRat 11Mbps for wireless b, 54Mbps for wireless g and up to 450Mbps* for wireless n and share access at the same time. Although the wireless b/g/n operates in the same 2.4GHz frequency, it will allow the use of other 2.4GHz client devices (Wireless b/g/n) to connect and access at the same time.

*Maximum wireless signal rates are referenced from IEEE 802.11 theoretical specifications. Actual data throughput and coverage will vary depending on interference, network traffic, building materials and other conditions.

Wireless Network Name (SSID)

When you are browsing for available wireless networks, this is the name that will appear in the list (unless Visibility Status is set to Invisible, see below). This name is also referred to as the SSID. For security purposes, it is highly recommended to change from the pre-configurednetwork name. Add up to three additional SSIDs to create virtual wireless networks from one wireless Router Access Point device.

Add Additional Wireless Network Name (SSID)

To add additional wireless Network Names simply add the name to the Multiple SSID field and click on apply at the bottom of the page. When finished, go to the Security section in this Users Guide for wireless security configuration.

Frequency (Channel)

A wireless network uses specific channels in the wireless spectrum to handle communication between clients. Some channels in your area may have interference from other electronic devices. Choose the clearest channel to help optimize the performance and coverage of your wireless network.

Wireless Distribution System (WDS)

When WDS is enabled, this access point functions as a wireless repeater and is able to wirelessly communicate with other APs via WDS links. A WDS link is bidirectional; so this AP must know the MAC Address (creates the WDS link) of the other AP, and the other AP must have a WDS link back to this AP. Make sure the APs are configured with same channel.

(Note that WDS security is incompatible with mixed mode, like WPAPSK+WPA2PSK mixed, WEP AUTO and 802.1x, both feature cannot be used at the same time).

Configuring WDS with TEW-691GR

Enable the option for WDS and input the MAC Address of the wireless device that also supports WDS in to the blank fields. You can add up to four additional devices in the spaces provided. Click on apply at the bottom of the page, to apply your setting changes.

Enable the security seeing in security page, each WDS APs need to use same security setting. (Note: WDS supports wireless g/n modes. The use multiple Access Point will reduces the overall network throughput to ½ the TEW-691GR.

HT Physical Mode

In HT (High Throughput) Physical mode setting allow for control of the 802.11n wireless environment.

Operating Mode

Mixed Mode

Green Field

Mixed Mode: In this mode packets are transmitted with a preamble compatible with the legacy 802.11a/g, the rest of the packet has a new format. In this mode the receiver shall be able to decode both the Mixed Mode packets and legacy packets.

Green Field: In this mode high throughput packets are transmitted without a legacy compatible part.

Channel BandWidth:

Set channel width of wireless radio. 20

17

20/40

20 Channel Width = 20 MHz 20/40 Channel Width = 20/40 MHz

Guard Interval:

Support Short/Long GI, the purpose of the guard interval is to introduce immunity to propagation delays, echoes and reflections, to which digital data is normally very sensitive.

Long

Auto

Long Guard Interval, 800 nsec Short Guard Interval, 400 nsec

MCS:

Fix MCS rate for HT rate. 0-15

The Modulation and Coding Scheme (MCS) is a value that determines the modulation, coding and number of spatial channels.

ADVANCED

Beacon Interval

Beacons are packets sent by a wireless router to synchronize wireless devices. Specify a Beacon Period value between 20 and 1000. The default value is set to 100 milliseconds.

DTIM

A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast messages. When the wireless router has buffered broadcast or multicast messages for associated clients, it sends the next DTIM with a DTIM Interval value. Wireless clients detect the beacons and awaken to receive the broadcast and multicast messages. The default value is 1. Valid settings are between 1 and 255.

Fragmentation Threshold

Wireless frames can be divided into smaller units (fragments) to improve performance in the presence of RF interference and at the limits of RF coverage. Fragmentation will occur when frame size in bytes is greater than the Fragmentation Threshold. This setting should remain at its default value of 2346 bytes. Setting the Fragmentation value too low may result in poor performance.

RTS Threshold

18

When an excessive number of wireless packet collisions are occurring, wireless performance can be improved by using the RTS/CTS (Request to Send/Clear to Send) handshake protocol. The wireless transmitter will begin to send RTS frames (and wait for CTS) when data frame size in bytes is greater than the RTS Threshold. This setting should remain at its default value of 2346 bytes.

Short Preamble and Slot

Using a short (400ns) guard interval can increase throughput. However, it can also increase error rate in some installations, due to increased sensitivity to radio-frequencyreflections. Select the option that works best for your installation.

TX Burst

Allows the wireless Router to deliver better throughput in the same period and environment in order to increase speed.

Pkt_Aggregate

Increase efficiency by aggregating multiple packets of application data into a single transmission frame. In this way, 802.11n networks can send multiple data packets with the fixed overhead cost of just a single frame.

SECURITY

Security Mode

Unless one of these encryption modes is selected, wireless transmissions to and from your wireless network can be easily intercepted and interpreted by unauthorized users.

WEP

A method of encrypting data for wireless communication intended to provide the same level of privacy as a wired network. WEP is not as secure as WPA encryption. To gain access to a WEP network, you must know the key. The key is a string of characters that you create. When using WEP, you must determine the level of encryption. The type of encryption determines the key length. 128-bitencryption

19

requires a longer key than 64-bitencryption. Keys are defined by entering in a string in HEX (hexadecimal - using characters0-9,A-F)or ASCII (American Standard Code for Information Interchange - alphanumeric characters) format. ASCII format is provided so you can enter a string that is easier to remember. The ASCII string is converted to HEX for use over the network. Four keys can be defined so that you can change keys easily. A default key is selected for use on the network.

Key Length

Hex

ASCII

64-bit

10 characters

5 characters

128-bit

26 characters

13 characters

WPA-PersonalandWPA-Enterprise

Both of these options select some variant of Wi-FiProtected Access (WPA)--security standards published by theWi-FiAlliance. The WPA Mode further refines the variant that the router should employ.

WPA Mode: WPA is the older standard; select this option if the clients that will be used with the router only support the older standard. WPA2 is the newer implementation of the stronger IEEE 802.11i security standard. With the "WPA2" option, the router tries WPA2 first, but falls back to WPA if the client only supports WPA. With the "WPA2 Only" option, the router associates only with clients that also support WPA2 security.

Cipher Type: The encryption algorithm used to secure the data communication. TKIP (Temporal Key Integrity Protocol) provides per-packetkey generation and is based on WEP. AES (Advanced Encryption Standard) is a very secure block based encryption. With the "TKIP and AES" option, the router negotiates the cipher type with the client, and uses AES when available.

Group Key Update Interval: The amount of time before the group key used for broadcast and multicast data is changed.

WPA-Personal

This option uses Wi-FiProtected Access with aPre-SharedKey (PSK).

Pre-SharedKey: The key is entered as apass-phraseof up to 63 alphanumeric characters in ASCII (American Standard Code for Information Interchange) format at both ends of the wireless connection. It cannot be shorter than eight characters, although for proper security it needs to be of ample length and should not be a commonly known phrase. This phrase is used to generate session keys that are unique for each wireless client.

WPA-Enterprise

This option works with a RADIUS Server to authenticate wireless clients. Wireless clients should have established the necessary credentials before attempting to authenticate to the Server through this Gateway. Furthermore, it may be necessary to configure the RADIUS Server to allow this Gateway to authenticate users.

Authentication Timeout: Amount of time before a client will be required to re-authenticate.RADIUS Server IP Address: The IP address of the authentication server.

RADIUS Server Port: The port number used to connect to the authentication server.

RADIUS Server Shared Secret: A pass-phrasethat must match with the authentication server.

WPA/WPA2 mixed environment

For those WPA2 stations, they will use AES for unicast. For those WPA stations, they will use TKIP for unicast. But for multicast all WPA and WPA2 stations have to use the same key, and that will be TKIP, because WPA station only knows about TKIP, WPA2 is new standard, so it is defined to backward support TKIP on multicast.

Wireless MAC Filtering

Choose the type of MAC filtering needed.

Turn MAC Filtering Disable: When "Disable" is selected, MAC addresses are not used to control network access.

Add MAC Filtering Rule

Use this section to add MAC addresses to the list below.

20