Page 1

BLINK Mobile Hotspot R536 User Guide
Blink R536 User Guide
http://www.blinkbroadband.tt
Version 1.0 / 12.14.2010
ⓒ 2010 BLINK . BLINK and the logo are trademarks of BLINK. Other marks are the property of their respective
owners.
Table of Contents
Intro . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Part 1: Using the R536 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Charging the R536 Device. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Opening the Browser Interface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . 2
Home . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
WiMAX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8
Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
Configurations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Network. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10
Local Network. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Network Address Server . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11
WiFi. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Status. . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Basic . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Secure Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Trusted MAC Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Advanced . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Traffic Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Firmware Upgrade. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Part 2: Warranty . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21
Part 3: FAQ. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23
Part 4: Glossary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25
Page 1 / 28 R536 _TTUG01_EN
Page 2

Thank you for choosing the Blink R536 portable router. This device doesn’t need wires, cables, or software to
configure it through your Web browser.
This guide describes the browser Interface that allows you to configure the R536. For information about setting up
your device, device maintenance and care, etc., consult the printed Quick Start Guide that came with your device.
We recommend you read this manual before using the R536.
Part 1
Using the R536
Charging the R536 Device
Note
The battery should be fully charged before using the R536 for the first time. We recommend an initial charge time
of approximately 3 hours. When fully charged, a solid green light will appear in ‘Battery’ display on the device.
or orange light indicates you need to re-charge. Included in your R536 package is an USB Power Adapter.
A
red
Opening the Browser Interface
How to Connect to the R536
1. Turn on the R536 and ensure your WiFi is enabled on your PC or laptop. You can view your available wireless
networks by going through the control panel, network connections or system tray (lower right hand corner of your
screen).
2. Select “BLINK XXXX” as your wireless network.
Page 3

Note
The last 4 digits, ‘XXXX’ of the SSID are the last four digits of your MAC address. You can find the MAC address of
your R536 on the label under the battery.
3. Click Connect.
The default security for the R536 is WEP 64-bit. The default security key is “12345”. Enter “12345” to continue
connecting to the R536. If you would like to change this security setting after you have activated your device, see
the WiFi > Security setting of this document for changing security settings.
Page 3 / 28 R536 _TTUG01_EN
Page 4

4. When connected to the R536 you will see the connection as ‘BLINK_R536 XXXX’ – as shown below.
Page 4 / 28 R536 _TTUG01_EN
Page 5

5. Before proceeding, ensure your wireless connection properties are set to ‘Obtain an IP Address Automatically’
Please right-click on your wireless network, select properties as shown below, then TCP/IP properties as shown in
the second image below.
Page 6
Page 7

6. Next, open your web browser to http://192.168.5.1 or http://WIMAX_AP.hotspot This will bring you to the web
user interface of the R536.
Page 8

Click Login button and type the User name and Password. Default is admin/admin.
Page 8 / 28 R536 _TTUG01_EN
Page 9

Your R536 uses a browser interface to configure the device.
The browser interface lets you:
View the status of aspects of your network.
Set up Security Configuration, MAC filtering, Port filtering, and DMZ etc.
Set up a hotspot to up to five connections to your device without having to share your network name and
network key.
Home
The Home screen is the first screen you see after logging in to the browser interface. It is the main point
of entry for all your work in the browser interface. The menu bar runs horizontally along the top of the browser
interface. It shows how many users or WiFi embedded devices are connected. It also displays information about
your device’s connection strength and battery level.
WiMAX
The WiMAX menu allows you to set up.
Page 9 / 28 R536 _TTUG01_EN
Page 10

Status
The R536 comes pre-configured with the information required to connect to the TSTT mobile network.
It will not normally require any additional configuration to the basic settings unless you are using the device behind
a corporate firewall, and this may require the appropriate proxy server settings to be modified.
The WiFi Status displays the following information:
Network Name (SSID)
Security Profile in use
The device’s IP address and MAC Address
Configurations
When enabled, ‘Auto Connection’ will connect to the network automatically when it’s turned on.
Network
Page 11

Local Network
Ex)
This Local Network gives you following status information:
IP address and mask of the wireless browser interface
MAC Address of the device
URL Address in use
You can change the URL Address and click Apply.
Now, you can open the web browser with
http://192.168.5.1 or http://blinkmobile.hotspot.
Network Address Server
Page 12

This menu allows you to select or modify DHCP Server and DHCP IP Range.
DHCP Server: Enabling the DHCP server allows the device to automatically assign a local IP address to a new
device joining your network (such as a wireless printer or an additional laptop). When the DHCP
server is disabled, you will have to assign static IP addresses to all devices on your network.
WiFi
The WiFi menu allows you to view status information for your WiFi network and mobile hotspot router.
Status
The WiFi Status menu gives you following status information:
Network Name (also known as SSID)
Page 13

Security profile in use
Users(clients) currently connected to the device
MAC Address and IP address.
Basic
This menu allows you to modify Network Name and Secure Profile.
Network Mode: The type of wireless networking you are currently using. You can choose either mode among
802.11b only, 802.11g only, 802.11b/g mixed mode. The default mode is 802.11b/g mixed mode.
Network Name (SSID) : You can change or input new Network Name (SSID). The default SSID is
BLINK_R536 XXXX.
If you check Don’t broadcast SSID box, WiFi clients who try to access this Blink R536 WiMAX
mobile hotspot can not see this SSID.
Frequency (Channel) : The radio channel is divided into Auto and Manual. This should be usually set to Auto
and left unchanged. Available channels are Auto and 1 to 11.
Secure Profile : The type of security in use. The default Secure Profile is WEP-Secure (WEP-64bit).
You can modify(add/edit/delete) clicking View button right down side of the corner.
Page 14

Click View button. The ‘WiFi Secure Profile Configuration’ window appears as below.
a. Click Add button to add new Profile Name.
Input new Profile Name you want and choose the Security Method and Encryption (Data encryption
mode).
After making the passphrase, click Apply.
Ex)
There’s new Secure profile that you made in Basic Setup menu as below.
b. Click Edit button to edit the Secure Profile. Choose the Secure Profile that you want to edit and change
the Security Method. Make new passphrase you want and click Apply button.
Page 14 / 28 R536 _TTUG01_EN
Page 15

Secure Profile
a. Click Add button to add new Profile Name.
b. Click Edit button to edit the Secure Profile.
c. Click Delete button to delete the Secure Profile that you made.
Trusted MAC Filtering
This allows you to limit access to your device to only those devices with a specified MAC address (a unique code
assigned to hardware such as network adapters).
Page 15 / 28 R536 _TTUG01_EN
Page 16

Finding the MAC Address
The MAC Address is also known as a hardware or physical address for a device, usually a network adapter.
It consists of six pairs of numbers and letters (for example, 00:21:9B:1C:64:34). You can view the MAC address for
any device connected to the R536 device in the WiFi Clients section of the WiFi Status screen.
Note
When you enable this feature for the first time, ensure you add your wireless MAC first, then click Apply.
Advanced
Firewall
Port Filtering
Port filtering allows you to conserve bandwidth by preventing non-business applications from accessing the
internet, and to prevent applications such as online games from accessing the Internet.
Page 17

a. Enter the application value in the Name, Port, and choose the Protocol. Click Add.
b. Select the rule you want to allow access to the Internet listed in the Rule List box. Click Update
VPN Passthrough
VPN Passthrough is required if you are going to connect to a VPN. (often required on corporate systems.)
Note
L2TP/IPSEC/PPTP: VPN tunneling protocols.
.
Page 17 / 28 R536 _TTUG01_EN
Page 18

Traffic Control
Port Forwarding
Port forwarding allows designated users or applications to reach specified servers, such as FTP and DNS servers,
on your computer. Also, some online games require incoming access to work properly.
a. Enter the value in the Name, Port, and Destination IP Address and choose the Protocol. Click Add.
b. Select the rule in the Rule List box. Click Update
DMZ
DMZ is a host on the internal network that has all ports exposed, except those ports otherwise forwarded. The
Mode is set to be enabled and enter the local static IP address.
.
Page 19

You can check your IP address going to Start-Run as below.
Enter “ipconfig”. Input your IP Address in the DMZ Configuration box above and click Apply.
Page 20

Management
You can create a new administrator’s name and password. Also you configure your device to apply Backup &
Restore , Power Saving, and Factory Default in this category.
Note.
When you change the default settings, keep you new information in a safe place.
Account
Create a new Administrator’s name and password. Click Apply.
Backup & Restore
The Backup Configuration allows you to backup your settings save to your PC, memory stick, CD, etc. And the
Restore Configuration allows you to restore previously saved/backed up settings.
Page 21

Power Management
Your device can switch to a power saving mode when it is idle. The Power Management Configuration screen
allows you to set the maximum time before the device switches to low-power mode. And also you can set how
long the device is idle before it switches to power off.
- Radio Off: You can use the Radio Off mode to customize your device to switch to a low power mode when not in
use. There are 10 minute increments from 10-60 minutes. Select Never to disable this power saving
feature. If you want to switch the WiFi Radio on earlier than the time you set in this menu, you can
easily push the power button one time lightly. A blue WiFi LED of indicates that WiMAX Mobile device
is ready to connect.
- Power Off : The Power Off mode allows you to choose when your device will automatically power off, to save
battery life, due to inactivity. There are 10 minute increments from 10-60 minutes you can select.
Select Never to disable this power saving feature.
Factory Default
Click Update to reset your R536 to the defualt factory settings.
Firmware Update
You can upgrade your device's configuration file to your computer.
Page 21 / 28 R536 _TTUG01_EN
Page 22

Help
Help menu gives you the Quick Start Guide, full User Guide.
Quick Start Guide
User Guide
Part 2
Warranty
Manufacturer’s Limited One-Year Warranty:
Blink (the company) warrants to the original retail purchaser of this device, that should the product or any part
thereof, during normal consumer usage conditions, be defective in material or workmanship that results in
product failure within the first twelve (12) month period from the date of purchase, such defects will be
repaired or replaced, with a new or refurbished product at the Company’s discretion, without charge for parts
and labor directly related to the defect(s). This warranty extends to consumers who purchase the product in the
United States, Mexico, or Canada and it’s not transferable or assignable. This warranty does not apply to:
(a) Product subject to abnormal use or conditions, accident, mishandling, neglect, unauthorized alteration,
misuse, improper installation or repair or improper storage;
(b) Products whose mechanical serial number or electronic serial number has been removed, altered, or
defaced;
(c) Damage from exposure to moisture, humidity, excessive temperature or extreme environment conditions;
(d) Damage resulting from connection to, or use of any accessory or other product not approved or authorized
by the company;
(e) Defects in appearance, cosmetic, decorative or structural items such as framing and non-operative parts;
(f) Product damaged from external causes such as fire, flooding, dirt, sand, weather conditions, battery leakage,
Page 23

blown fuse, theft or improper usage of any electrical source.
The Company disclaims liability for removal or reinstallation of the product, for geographic coverage, for
inadequate signal reception by the antenna or for communications range or operation of the cellular system as
a whole.
When sending your wireless device to Blink authorized distributions for repair or service, please note that any
personal data or software stored on the device may be inadvertently erased or altered. Therefore, we strongly
recommend you make a back up copy of all data and software contained on your device before submitting it for
repair or service. This includes all contact lists, downloads (i.e. third-party software applications, games and
graphics) and any other data added to your device. Blink is not responsible for and does not guarantee
restoration of any third-party software, personal information or memory data contained in, stored on, or
integrated with any wireless device, whether under warranty or not, returned to Blink’ authorized distributors
for repair or service. To obtain repairs or replacement within the terms of this Warranty, the product should be
delivered with proof of Warranty coverage (e.g. dated bill of sale), the consumer’s return address, daytime
phone number and/or fax number and complete description of the problem, transportation prepaid, to the
Company at the address shown below or to the place of purchase for repair or replacement processing. In
addition, for reference to an authorized Warranty station in your area, please call (800)959-3558 in the United
States.
The extent of the company’s liability under this warranty is limited to the repair or replacement provided above
and, in no event, shall the company’s liability exceed the purchase price paid by purchaser for the product.
Any implied warranties, including any implied warranty of merchant ability or fitness for a particular purpose,
shall be limited to the duration of this written warranty. Any action for breach of any warranty must be brought
within a period of 18 months from date of original purchase, but in no case shall the company be liable for a
special consequential or incidental damages for breach of this or any other warranty, express or implied,
whatsoever. The company shall not be liable for the delay in pending service under this warranty or loss of use
during the time the produce is being repaired or replaced.
No person or representative is authorized to assume for the Company any liability other than expressed herein
in connection with the sale of this product.
Some states or provinces do not allow limitations on how long an implied warranty lasts on the exclusion or
limitation of incidental or consequential damage so the above limitation or exclusions may not apply to you.
This Warranty gives you specific legal rights, and you may also have other rights, which vary from state to state
or province to province.
Blink’s Authorized Service Center Address:
5440 Morehouse Dr.STE 1000
San Diego, CA 92121
Page 23 / 28 R536 _TTUG01_EN
Page 24

Part 3
FAQ
Q: What is the R536’s main purpose?
A: The R536 is a portable WiFi router that fits in the palm of your hand. It will allow you to connect up to 5 devices
to access the internet, such as laptops, digital cameras, portable game consoles or mobile phones.
Q: What networks does the R536 operate on?
A: The R536 operates on WiMAX wireless networks.
Q: What are the air holes on the both side of the R536?
A: The air holes are designed to reduce the heat generated by the device itself while it used. Keep the device away
from open flames, dusty conditions, and keep it dry for optimal performance.
Q: What kind of security is available with the R536?
A: The R536 supports advanced WiFi security protocol through standard methods such as WiFi Protected Access
(WPA & WPA2) and the previous method of Wired Equivalent Privacy (WEP).
More advanced settings are available in the Web based user interface.
Q: What if the user forgets their R536 password?
A: The R536 can be reset by powering on the device, remove the battery cover, and depress the small button near
the bottom of the battery using a paper clip or pen and hold for 5 seconds. The Power LED will turn off-and-on
several times to indicate reset is successful. The unit will power up with the factory default configuration.
Q: What might the owner of the R536 need to be aware of before sharing with multiple devices?
A: With multiple devices or used as a temporary hotspot:
If there are several heavy data users on at the same time, you may notice a degradation in performance
Users are not allowed to access more than 5 devices to the R536 in order to keep the devices’ data speed
stable enough to be communicated without a problem.
Be aware these users are contributing to your data usage. You may want to check your account online to see
how much of a difference it is making and how close you are to any usage caps that may apply under your
Blink network connection plan.
If all are accessing a R536 that is using the battery, the battery will drain faster than the average of 2.5 hours
usage time for one user.
Q: Can a user connect the R536 to their computer with a USB cable?
A: When the R536 is tethered via a USB cable to a computer, the device will also function as a hotspot. And in this
mode, the R536 can be charged, or re-charged at the same time.
Page 25

Q: What is the average battery usage time?
A: The battery will have on average 2.5 hours of active use time when connected to a single device and will
discharge more rapidly as additional devices are connected (up to 5 WiFi devices are acceptable). There is 10 hours
of standby time.
Q: Why the R536 turns off while in used and it wouldn’t turn on again?
A: The red solid power LED indicates the battery is below 20% and if it’s blinking, it indicates the R536 will turn off
very soon. After the battery has run down, it turns off automatically. So you need to charge the battery using the
USB Power Adapter.
Q: How close does the user’s WiFi enabled device need to be from the R536?
A: The device will need to be within 16 feet or 5 meters of the WiFi device to work. So a user can keep the R536 in
their pocket, laptop bag, or sitting on a desk or window ledge across a room (for better coverage).
Q: Does the R536 support voice calls, fax and/or text messaging?
A: Voice calls, text messaging and fax are not supported.
Q: Can the R536 be used for memory storage?
A: The R536 does not support onboard or removable memory storage.
Q: How long does a user need to charge the battery before they begin using?
A: The battery must be fully charged before using the R536 for the first time. We recommend a minimum of 3
hours charging time before first use. After the initial use and set-up, you may use with the battery alone or with
the battery and the USB Power Adapter.
Q: Does the R536 require software installation?
A: No, the R536 comes with a browser URL that allows the user to configure the device.
You can establish security and set more advanced settings without installing any software.
Q: What if the R536 can not access the internet even though the unit has been activated?
A: Verify your network & signal strength for optimal performance.
Q: When will a user of the R536 need to access the browser interface?
A: The R536 browser interface will only need to be accessed or used when configuring your device for the first time
or changing the security settings or establishing more advanced settings.
Q: Why does the R536 gets warm?
A: The R536 has two radios inside: WIMAX radio and the WiFi radio. In fringe areas of low WiMAX coverage, the
transmit power will be at the max and therefore generate more heat. The device has been environmentally tested
and approved by the FCC.
Page 25 / 28 R536 _TTUG01_EN
Page 26

Part 4
Glossary
●
802.11 (b, g, n)
●
Access Point (AP)
a standard such as WLAN.
●
DHCP
— Dynamic Host Configuration Protocol. A network application protocol used to obtain configuration
information for an Internet Protocol network.
●
DHCP Server
network.
●
DNS
— Domain Name System. A system for converting host names and domain names into IP addresses on the
Internet or on local networks that use the TCP/IP protocol.
●
DMZ
— Demilitarized Zone. A physical or logical subnetwork that contains and exposes an organization's external
services to a larger untrusted network, usually the Internet.
●
ESN
— Electronic Serial Number. A unique 32-bit number embedded in a wireless device that identifies the
device.
●
MEID
— Mobile Equipment Identifier. The unique second-generation serial number assigned to the R536 for
cellular network use.
●
Firmware
●
FTP
— File Transfer Protocol. A network protocol for exchanging files over a TCP network.
●
Gateway
●
Host Name
●
Hotspot
●
HTTP
— Hypertext Transfer Protocol. An application-level protocol for accessing the World Wide Web over the
Internet.
●
IP address
●
LAN
— Local Area Network. A type of network that lets a group of computers, all in close proximity (such as
inside an office building), communicate with one another.
●
MAC Address
digit hexadecimal numbers.
●
MIN
— Mobile Identification Number. It refers to the 10-digit unique number that a wireless operator uses to
identify the mobile phone. A MIN is a number that uniquely identifies a mobile working under TIA standards for
Cellular and PCS technologies
●
MSID
— Mobile Station ID. A number provisioned by a service provider to a mobile phone that identifies that
phone to the network.
●
MSL
— Master Subsidy Lock. A numeric code for accessing certain phone settings.
●
NAI
— Network Access Identifier. A standard way of identifying users who request access to a network.
●
Network Mask
— A set of WLAN communication standards in the 2.4, 3.6 and 5 GHz frequency bands.
— A device that allows wireless communication devices to connect to a wireless network using
— A server that uses DHCP to obtain configuration information for operation in an Internet Protocol
— A program that internally controls an electronic device.
— A network point that acts as an entrance to another network that uses a different protocol.
— The unique name by which a network-attached device is known on a network.
— A WLAN access point or area for connecting to the Internet.
— Internet Protocol address. The address of a device attached to an IP network (TCP/IP network).
— A number that uniquely identifies a given network adapter on a LAN. MAC addresses are 12-
— A number that allows IP networks to be subdivided for security and performance.
Page 27

● NNTP
— Network News Transfer Protocol. An Internet application protocol for reading and posting Usenet
(newsgroup) articles.
● POP
— Post Office Protocol. An Internet protocol for retrieving email from a remote server over a TCP/IP
connection.
● Port
— A virtual data connection used by programs to exchange data.
● Port Forwarding
● Port Number
● Protocol
— A process that allows remote devices to connect to a specific computer within a private LAN.
— A number assigned to a user session and server application in an IP network.
— A standard that enables connection, communication, and data transfer between computing
endpoints.
● PPTP
— Point-to-point Tunneling Protocol. A method for implementing virtual private networks that does not
provide confidentiality or encryption.
● PRL
— Preferred Roaming List. A list that your wireless phone or device uses to determine which networks to
connect with when you are roaming.
● RFB
— Remote Frame Buffer. A protocol for remote access to graphical user interfaces.
● Router
● RTP
● SMTP
● SSID
● TCP
— A device that connects two networks.
— Real-time Transport Protocol. A packet format for streaming multimedia over the Internet.
— Simple Mail Transfer Protocol. An Internet standard for email transmission across IP networks.
— Service Set Identifier. The name assigned to a WLAN network.
— Transmission Control Protocol. A core protocol for transmitting and receiving information over the
Internet.
● TCP/IP
— Transmission Control Protocol/Internet Protocol. A communications protocol developed under contract
from the U.S. Department of Defense to internetwork dissimilar systems.
● Telnet
● TFTP
● UDP
● VNC
— Telecommunication Network. A network protocol used on the Internet or on local area networks.
— Trivial File Transfer Protocol. A file transfer protocol with a subset of FTP functionality.
— User Datagram Protocol. A simple transport protocol used to transfer information on the Internet.
— Virtual Network Computing. A graphical desktop sharing system that uses the RFB protocol to remotely
control another computer.
● VPN
— Virtual Private Network. A secure private network that runs over the public Internet.
● VPN Passthrough
● WAN
— Wide Area Network. A public network that extends beyond architectural, geographical, or political
— A feature that allows a client to establish a tunnel only with a specific VPN server.
boundaries (unlike a LAN, which is usually a private network located within a room, building, or other limited area).
● WEP
— Wired Equivalent Privacy. An IEEE standard security protocol for 802.11 networks. Superseded by WPA
and WPA2.
● WLAN
— Wireless Fidelity. Any system that uses the 802.11 standard developed and released in 1997 by the IEEE
(Institute of Electrical and Electronics Engineers).
● WLAN Client
● WLAN
— A wireless device that connects to the Internet via WLAN.
— WLAN LAN. A typically low-power network that transmits a wireless signal over a span of a few hundred
feet and usually only to stationary devices.
● WPA/WPA2
● WWAN
— WLAN Protected Access. A security protocol for wireless 802.11 networks from the WLAN Alliance.
— Wireless Wide Area Network. Wireless connectivity to the Internet achieved using cellular tower
Page 27 / 28 R536 _TTUG01_EN
Page 28

technology. This service is provided through cellular providers. WWAN connectivity allows a user with a laptop and
a WWAN device to surf the Internet, check email, or connect to a virtual private network (VPN) from anywhere
within the regional boundaries of the cellular service.
Page 28 / 28 R536 _TTUG01_EN