Vai alla pagina of
Manuali d’uso simili
-
Network Router
TRENDnet TW100-BRV204
2 pagine 0.13 mb -
Network Router
TRENDnet TEW-812DRU
63 pagine 1.82 mb -
Network Router
TRENDnet 54Mpbs 802.11g Wireless Access Point + Bridge
16 pagine 1.1 mb -
Network Router
TRENDnet TEW-632BRP
12 pagine 1.16 mb -
Network Router
TRENDnet TEW-812DRU
66 pagine 1.93 mb -
Network Router
TRENDnet TEW-654TR
18 pagine 2.77 mb -
Network Router
TRENDnet TW100-BRV204
123 pagine 2.6 mb -
Network Router
TRENDnet TEW-611BRP
83 pagine 3.86 mb
Un buon manuale d’uso
Le regole impongono al rivenditore l'obbligo di fornire all'acquirente, insieme alle merci, il manuale d’uso TRENDnet TEW-633GR. La mancanza del manuale d’uso o le informazioni errate fornite al consumatore sono la base di una denuncia in caso di inosservanza del dispositivo con il contratto. Secondo la legge, l’inclusione del manuale d’uso in una forma diversa da quella cartacea è permessa, che viene spesso utilizzato recentemente, includendo una forma grafica o elettronica TRENDnet TEW-633GR o video didattici per gli utenti. La condizione è il suo carattere leggibile e comprensibile.
Che cosa è il manuale d’uso?
La parola deriva dal latino "instructio", cioè organizzare. Così, il manuale d’uso TRENDnet TEW-633GR descrive le fasi del procedimento. Lo scopo del manuale d’uso è istruire, facilitare lo avviamento, l'uso di attrezzature o l’esecuzione di determinate azioni. Il manuale è una raccolta di informazioni sull'oggetto/servizio, un suggerimento.
Purtroppo, pochi utenti prendono il tempo di leggere il manuale d’uso, e un buono manuale non solo permette di conoscere una serie di funzionalità aggiuntive del dispositivo acquistato, ma anche evitare la maggioranza dei guasti.
Quindi cosa dovrebbe contenere il manuale perfetto?
Innanzitutto, il manuale d’uso TRENDnet TEW-633GR dovrebbe contenere:
- informazioni sui dati tecnici del dispositivo TRENDnet TEW-633GR
- nome del fabbricante e anno di fabbricazione TRENDnet TEW-633GR
- istruzioni per l'uso, la regolazione e la manutenzione delle attrezzature TRENDnet TEW-633GR
- segnaletica di sicurezza e certificati che confermano la conformità con le norme pertinenti
Perché non leggiamo i manuali d’uso?
Generalmente questo è dovuto alla mancanza di tempo e certezza per quanto riguarda la funzionalità specifica delle attrezzature acquistate. Purtroppo, la connessione e l’avvio TRENDnet TEW-633GR non sono sufficienti. Questo manuale contiene una serie di linee guida per funzionalità specifiche, la sicurezza, metodi di manutenzione (anche i mezzi che dovrebbero essere usati), eventuali difetti TRENDnet TEW-633GR e modi per risolvere i problemi più comuni durante l'uso. Infine, il manuale contiene le coordinate del servizio TRENDnet in assenza dell'efficacia delle soluzioni proposte. Attualmente, i manuali d’uso sotto forma di animazioni interessanti e video didattici che sono migliori che la brochure suscitano un interesse considerevole. Questo tipo di manuale permette all'utente di visualizzare tutto il video didattico senza saltare le specifiche e complicate descrizioni tecniche TRENDnet TEW-633GR, come nel caso della versione cartacea.
Perché leggere il manuale d’uso?
Prima di tutto, contiene la risposta sulla struttura, le possibilità del dispositivo TRENDnet TEW-633GR, l'uso di vari accessori ed una serie di informazioni per sfruttare totalmente tutte le caratteristiche e servizi.
Dopo l'acquisto di successo di attrezzature/dispositivo, prendere un momento per familiarizzare con tutte le parti del manuale d'uso TRENDnet TEW-633GR. Attualmente, sono preparati con cura e tradotti per essere comprensibili non solo per gli utenti, ma per svolgere la loro funzione di base di informazioni e di aiuto.
Sommario del manuale d’uso
-
Pagina 1
1[...]
-
Pagina 2
2 Federal Communication Commission Interference St atement This equipment has been tested and found to comply with the limit s for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential inst allation. This equipme nt generates, uses and[...]
-
Pagina 3
3 Table of Contents Getting Started with the TEW-633GR 4 P a c k a g e C o n t e n t s 5 Minimum System Requirements 5 Wireless LAN Networking 6 I n t r o d u c t i o n 9 F e a t u r e s 9 Hardware Overview 10 Side Panel 10 L E D s 1 1 Installation Considerations 12 Getting Started 1 2 Using the Configuration Menu 13 B a s i c 1 4 A d v a n c e d 2[...]
-
Pagina 4
4 Getting S tarted with the TEW -633GR Congratulations on purchasing the TEW -633GR! Thi s manual provides in formation for setting up and configuring the TEW -633GR. This manual is intended for both home users and professionals. The following conventions are used in this manual: THE NOTE SYMBOL INDICA TES ADDITIONAL INFORMA TION ON THE TOPIC A T H[...]
-
Pagina 5
5 Package Content s z TEW-633GR 11n Wireless N Gigabit Router z CAT-5 Ethernet Cable z Power Adapter z User’s Guide CD-ROM z Multi-Language Quick Installation Guide Using a power supply with a different voltage than the one included with your product will cause damage and void the warranty for this product. Minimum System Requirements z Ethernet-[...]
-
Pagina 6
6 Wireless LAN Networking This section provides background information on wireless LAN networking technolog y . Consult the Glossary for definitions of the terminology used in this section. T HE INFORMA T ION IN THIS SECT ION IS FOR YOUR REFERENCE. C HANGING NETWORK SETT INGS AND P ARTICULARL Y SECURITY SETTTINGS SHOULD ONL Y BE DO NE B Y AN AUTHOR[...]
-
Pagina 7
7 When a number of wireless stations are connecte d using a single access point, you have a Basic Service Set (BSS). In the ESS diagram below , communication is done through the access points, which relay dat a packet s to other wireless st ations or devices connected to the wired network. Wireless st ations can then access resources, such as a pri[...]
-
Pagina 8
8 In an ESS environ ment, users are able to mo ve from one access point to another without losing th e connection. In the diagram below , wh en the user moves from BSS (1) to BSS (2) the WLAN client devices automatically switches to the channel used in BSS (2). Roaming in an ESS network diagram[...]
-
Pagina 9
9 Introduction The TEW-633GR 11n Wireless Gigabit Router is a high-performance, wireless router that supports high-speed wireless networking at home, at work or in public places. Unlike most routers, the TEW-633GR provides data transfers at up to 300Mbps when using 11n (Draft 2.0) connection. This router is also back compatib le with 802.11g or 11b[...]
-
Pagina 10
10 ¾ Hardwar e Overview Side Panel DC-IN The DC power input connector is a single jack socket to sup ply power to the TEW-633GR. Please use the Power Adapter provided on the TEW-633GR package. Reset Button Pressing the reset button restores the router to its original fa ctory default settings. Auto MDI/MDIX Gigabit WAN Port This is the connection [...]
-
Pagina 11
11 LEDs PWR/SYS LED Solid lights indicate a proper connection to the powe r supply, and indicat e the system ready or not. LAN LEDs Solid lights indicate connections to Ethernet-enabled computers on ports 1-4. LED blinks during data transmission. WAN LED A solid light indicates connection on the WAN port. This LED blinks during data transmission. W[...]
-
Pagina 12
12 Installation Considerations The TEW-633GR 11n (Draft 2.0) Wireless Router lets you access your network, using a wireless connection, from virtually anywhere within its operating range. Keep in mind, however, that the number, thickness and location of walls, ceilings, or other objects that the wireless signals must pass through, may limit the ran[...]
-
Pagina 13
13 Using the Configuration Menu Whenever you want to configure your TEW-633GR, you can access the Configurat ion Menu through your PC by opening the Web-browser and typing in th e IP Address of the TEW-633GR. The TEW-633GR’s default IP Address is http://192.168.10.1 ¾ Open the Web browser. ¾ Type in the IP Address of the Router ( http://192.168[...]
-
Pagina 14
14 Basic The Basic tab provides the following configuration options: INTERNET, WIRELESS and NETWORK SETTINGS. Basic_Internet Setup Wizard If you are new to networking and have never configured a router before, click on Setup W izard and the router will guide you through a few simple step s to get your network up and running. Manual Configure If you[...]
-
Pagina 15
15 Basic_Wireless The wireless section is used to configure the wireless settings for your router. Note that changes made in this section may also need to be duplicated on wireless clients that you want to connect to your wireless network. To protect your privacy, use the wireless security mode to configure the wireless security features. This devi[...]
-
Pagina 16
16 Wireless Network Name When you are browsing for available wireless networks, this i s the name that will appear in the list (unless Visibility Status is set to Invisible, see below). This name is also referred t o as the SSID. For security purposes, it is highly recommended to change from the pre-configured network name. Enable Auto Channel Scan[...]
-
Pagina 17
17 provided so you can enter a string that is easier to remember. The ASCII string is converted to HEX for use over the network. Four keys can be defined so that you can change keys easily. A default key is selected for use on the network. Example: 64-bit hexadecimal keys are exactly 10 characters in length. (12345678FA is a valid string of 10 char[...]
-
Pagina 18
18 WPA-Enterprise This option works with a RADIUS Server to authenticate wireless clients. Wireless clients should have established the necessary credentials before attempting to authenticate to the Server through this Gateway. Furthermore, it may be necessary to configure the RADIUS Server to allow this Gateway to authenticate users. Authenticatio[...]
-
Pagina 19
19 Basic_ Network Settings Use this section to configure the internal network settings of your router. The IP Address that is configured here is the IP Address that you use to access the Web-base d management interface. If you change the IP Address here, you may need to adjust your PC’s network settings to access the network again. W AN Port Mode[...]
-
Pagina 20
20 must be set to the IP ad dress of this device. The Gateway must be set to the IP address of the upstream router . Both addresses must be within the LAN subnet as specified by Subnet Mask. Router Settings These are the settings of the LAN (Local Area Network) interface for the router . The router's local network (LAN) settings are configured[...]
-
Pagina 21
21 The additional cost of routing a p acket through this router . The normal value for a simple network is 1. This metric is added to routes learned from other routers; it is not added to static or system routes. Act as default router Make this router the preferred destination for p ackets that are not otherwise destined. Allow RIP up dates from W [...]
-
Pagina 22
22 Suppose you configure the DHCP Server to manage addresses from 192.168.10.101 T o 192.168.10.200. This means that 192.168.10. 2 to 192.168.10.100 and 192.168.10.201 to 192.168.10.254 is NOT managed by the DHCP Server . Computers or devices that use addresses from thes e ranges are to be manually configured. Suppose you have a web server computer[...]
-
Pagina 23
23 Always Broadcast If all the computers on the LAN successfully obt ain their IP addresses from the router's DHCP server as expected, this option can remain disabled. However , if one of the computers on the LAN fails to obtain an IP address from the router's DHCP server , it may have an old DHCP client that incorrectly turns of f the br[...]
-
Pagina 24
24 DHCP Reservations List This shows clients that y ou have specified to have reserved DHCP addresses. An entry can be changed by clicking the Edit icon, or deleted by clicking the Delete icon. When you click the Edit icon, the item is highlighted, and the "E dit DHCP Reservation" section is activated for editing. Number of Dynamic DHCP C[...]
-
Pagina 25
25 Advanced The Advanced tab provides the following configuration options: Virtual Server, Special Applications, Gaming, StreamEngine, Routing, Access Control, WEB Filter, MAC Address Filter, Firewall, Inbound Filter, Advanced Wireless and Advanced Network. Advanced_Virtual Server The Virtual Server option gives Internet users access to services on[...]
-
Pagina 26
26 4. Enter the Public Port as [8888] 5. Select the Protocol (for example TCP ). 6. Ensure the schedule is set to Always 7. Click Save to add the settings to the V irtual Servers List 8. Repeat these steps for each V irtual Server Rule you wish to add. After the list is complete, click Save Settings at the top of the p age. With this V irtual Serve[...]
-
Pagina 27
27 Add/Edit Virtual Server In this section you can add an entry to the V irtual Servers List below or edit an existing entry . Enable Entries in the list can be either active (enabled) or inactive (disabled). Save Saves the new or edited virtual server entry in the following list. When finished updating the virtual server entries, you must still cl[...]
-
Pagina 28
28 Advanced_Special Applications An application rule is used to open single or multiple ports on your router when the router senses data sent to the Internet on a "trigger" port or port range. An application rule applies to all computers on your internal network. Parameters for an Application Rule Example: Y ou need to configure your rout[...]
-
Pagina 29
29 T rigger Protocol Select the outbound protocol used by your application (for example Both ). Input Port Range Enter the port range that you want to open up to Internet traf fic (for example 6000-6200 ). Input Protocol Select the protocol used by the Internet traf fic coming back into the router through the opened port range (for example Both ). [...]
-
Pagina 30
30 Advanced_Gaming Multiple connections are required by some applicat ions, such as internet games, video conferencing, Internet telephony, and others. These applications have difficulties working through NAT (Network Address Translation). This section is used to ope n multiple ports or a range of ports in your router and redirect data through thos[...]
-
Pagina 31
31 Port Forwarding Fields Name Give the rule a name that is meaningful to you, for example Game Server . Y ou can also select from a list of popular games, and many of the remaining configuration values will be f illed in accordingly . However , you should check whether the port values have changed since this list was created, and you must fill in [...]
-
Pagina 32
32 Advanced_StreamEngine The StreamEngine feature helps improve your netwo rk gaming performance by prioritizing the data flows of network applications. StreamEngine Setup Enable StreamEngine Enable this option for better performance and experience with online games and other interactive applications, such as V oIP .[...]
-
Pagina 33
33 Automatic Classification This option is enabled by default so that your router will automatically determine which programs should have network priority . Dynamic Fragment ation This option should be enabled when you have a slow Internet uplink. It helps to reduce the impact that large low priority network p ackets can have on more urgent ones by[...]
-
Pagina 34
34 Conflicting rules are not permitted. Conflicting rules are those that share any combination of source address/port, destination address/port, a nd protocol. Rejecting conflicting rules ensures that every flow defined in a rule receives the expected priority and avoids indeterminate prioritization that could reduce QoS ef fectiveness. Name Create[...]
-
Pagina 35
35 Advanced_Routing Add/Edit Route Adds a new route to the IP routing table or edits an existing route. Enable: Specifies whether the entry will be enabled or disabled. Destination IP: The IP address of packets that will take this route. Netmask: One bits in the mask specify which bits of the IP address must match. Gateway: Specifies the next hop t[...]
-
Pagina 36
36 Routes List The section shows the current routing table entries. Certain required routes are pred efined and cannot be changed. Routes that you add can be changed by clicking th e Edit icon, or deleted by clicking the Delete icon. When you click the Ed it icon, the item is hig hlighted, and the "Edit Route" section is activated for edi[...]
-
Pagina 37
37 Advanced_WEB Filter This section is where you add the Web sites to be used for A ccess Control. The Web sites listed here are used when the Web Filter option is enabled in Access Control . The Web Filter section is one of two means by which you can specify the web sites you want to allow. Web Filter Parameters Web Site Enter the address of the w[...]
-
Pagina 38
38 This is where you can add Web sites to the Allowed Web Site List or change entries in the Allowed Web Site List. Enable Entries in the Allowed Web Site List can be activated or deactivated with this che ckbox. New entries are activated by default. Save Saves the new or edited Allowed Web Site in the following list. When finished updating the All[...]
-
Pagina 39
39 Advanced_MAC Address Filter The MAC address filter section can be used to filter network access by machines based on the un ique MAC addresses of their network adapter(s). It is most useful to prevent unauthorized wireless dev ices from connecting to your network. A MAC address is a unique ID assigned by the manufacturer of the network adapter. [...]
-
Pagina 40
40 Filter Settings Mode When "only allow listed machines" is selected, only computers with MAC addresses listed in the MAC Address List are granted network access. When "only deny listed machines" is selected, any computer with a MAC address listed in the MAC Address List is refused access to the network. Filter Wireless Clients[...]
-
Pagina 41
41 Advanced_Firewall The router provides a tight firewall by virtue of the way NAT works. Unless you configure the router to the contrary, the NAT does not respond to unsolicited incoming requests on any port, thereby making your LAN invisible to Internet cyber attackers. However, some network applications cannot run with a tight firewall. Those ap[...]
-
Pagina 42
42 Firewall Settings Enable SPI SPI ("stateful p acket inspection" also known as "d ynamic packet filtering") help s to prevent cyber att acks by tracking more st ate per session. It validates that the traf fic passing through that session confor ms to the protocol. When the protocol is TCP , SPI checks that packet sequ ence num[...]
-
Pagina 43
43 DMZ Host DMZ means "Demilitarized Zone." If an application has troub le working from behind the router , you can expose one computer to the Internet and run the application o n that computer . When a LAN host is configured as a DMZ host, it becomes the destination for all in coming packet s that do not match some other incoming session[...]
-
Pagina 44
44 DMZ IP Address S pecify the LAN IP address of the LAN computer that you want to have unrestricted Internet communication. If this computer obtains its address automatically using DHCP , then you may want to make a static reservation on the Basic → Network Settings p age so that the IP a ddress of the DMZ computer does not change. Non-UDP/TCP/I[...]
-
Pagina 45
45 Windows/MSN Messenger Supports use on LAN computers of Microsof t Windows Messenger (the Internet messaging client that ship s with Microsoft Windows) and MSN Messenger . The SIP ALG must also be enabled when the Windows Messenger ALG is enabled. FTP Allows FTP client s and servers to transfer dat a across NA T . Refer to the Advanced → Virtua[...]
-
Pagina 46
46 Advanced_Inbound Filter When you use the Virtual Server, Gaming, or Remote Administration features to open specific ports to traffic from the Internet, you could be increasing the ex posure of your LAN to cyber attacks from the Internet. In these cases, you can use Inbound Filter s to limit that exposure by specifying the IP addresses of interne[...]
-
Pagina 47
47 Add/Edit Inbound Filter Rule Here you can add entries to the Inbound Filter Rules List below, or edit existing entries. Name Enter a name for the rule that is meaningful to you. Action The rule can either Allow or Deny messages. Source IP Range Define the ranges of Internet addresses this rule applies to. For a single IP address, enter the same [...]
-
Pagina 48
48 Advanced_Advanced Wireless Transmit Power Normally the wireless transmitter operates at 100% power. In some circumstances, however, there might be a need to isolate specific frequencies to a smaller area. By reducing th e power of the radio, you can prevent transmissions fr om reaching beyond your corporate/home office or designated wireless are[...]
-
Pagina 49
49 Short GI Using a short (400ns) guard interval can increase throughput. However, it can also in crease error rate in some installations, due to increased sensitivity to radio-frequ ency reflections. Select the option that works best for your installation. Extra Wireless Protection Extra protection for neighboring 11b wireless networks. Turn this [...]
-
Pagina 50
50 Advanced_Network UPnP UPnP is short for Universal Plug and Play, which is a networking architecture that pr ovides compatibility among networking equipment, software, and peripherals. This router ha s optional UPnP capability, and can work with other UPnP devices and software. Enable UPnP If you need to use the UPnP functionality, you can enable[...]
-
Pagina 51
51 Advanced_ WISH WISH is short for Wireless Intelligent Stream Handling, a technology developed to en hance your experience of using a wireless network by prioritizing the traffic of differe nt applications. WISH Enable WISH Enable this option if you want to allow WISH to prioritize your traffic. Priority Classifiers HTTP Allows the router to reco[...]
-
Pagina 52
52 Windows Media Center Enables the router to recognize certain audio and video streams generated by a Windows Media Center PC and to prioritize these above ot her traffic. Such streams are used by systems known as Windows Media Extenders, such as the Xbox 360. Automatic When enabled, this option causes the router to automatically attempt to priori[...]
-
Pagina 53
53 Host 2 Port Range The rule applies to a flow of messages for which host 2's p ort number is within the range set here. Save/Update Record the changes you have made into the following list. Clear Re-initialize this area of the screen, discarding an y changes you have made. WISH Rules This section lists the defined WISH Rules. Click the Enabl[...]
-
Pagina 54
54 Advanced_ Wi-Fi Protected Setup Wi-Fi Protected Setup Enable Enable the Wi-Fi Protected Setup feature. Lock Wireless Security Settings Locking the wireless security settings prevent s the settings from being changed by any new external registrar using its PIN. Devices can st ill be added to the wireless network using Wi-Fi Protected Setup. It is[...]
-
Pagina 55
55 Generate New PIN Create a random number that is a valid PIN. This becomes the router's PIN. Y ou can then copy this PIN to the user interface of the registrar . Add Wireless St ation This Wizard helps you add wireless devices to the wireless network. The wizard will either display the wireless network setting s to guide you through manual c[...]
-
Pagina 56
56 Tools The Tools tab provides the following configuration options: A dmin, Time, Email Settings, System, Firmware, Dynamic DNS, Windows Connect Now, System Check & Schedules. Tools_Admin The Admin option is used to set a password for access to the Web-based ma nagement. By default there is no password configured. It is highl y recommended tha[...]
-
Pagina 57
57 Admin Password Enter a password for the user "admin", who will have full access to the W eb-based management interface. User Password Enter a password for the user "user" , who will have read-only access to the Web-based management interface. Gateway Name The name of the router can be changed here. Enable Remote Management En[...]
-
Pagina 58
58 Tools_Time The Time Configuration option allows you to configure, update, and maintain the corre ct time on the router's internal system clock. From this section you can set the time zone that you are in and set the Time Server. Daylight saving can also be configured to automatically adjust the time when needed. Time Configuration Current R[...]
-
Pagina 59
59 Automatic Time Configuration Enable NTP Server Select this option if you want to synchronize the router's clock to a Network Time Server over the Internet. If you are using schedules or logs, this is the best way to ensure tha t the schedules and logs are kept accurate. NTP Server Used Select a Network Time Server for synchroniza tion. You [...]
-
Pagina 60
60 Tools_Email Settings The Email feature can be used to send the system log files, r outer alert messages, and firmware update notification to your email address. Enable Enable Email Notification When this option is enabled, router activity logs or firmware upgrade notifications can be emailed to a designated email address, and the following p ara[...]
-
Pagina 61
61 Account Name Enter your account for sending email. Password Enter the password associated with t he account. V erify Password Re-type the password associated with the account. Email Log When Full or on Schedule On Log Full Select this option if you want logs to be sent by email when the log is full. On Schedule Select this option if you want log[...]
-
Pagina 62
62 Tools_System This section allows you to manage the router's configuration settings, reboot the router, and restor e the router to the factory default settings. Restoring the unit to the factory default sett ings will erase all settings, including any rules that you've created. Save Settings To Local Hard Drive This option allows you to[...]
-
Pagina 63
63 Tools_Firmware The Firmware Upgrade section can be used to update to the latest firmware code to improve functionality and performance. To check for the latest firmware, click the Check Online Now button. If you would like to be notified when new firmware is released, place a checkmark in the box next to Email Notification of Newer Firmware Vers[...]
-
Pagina 64
64 Firmware Upgrade Firmware upgrade cannot be performed from a wireless device. T o perform an upgrade, ensure that you are using a PC that is connected to the router by wire. Some firmware upgrades reset the configuration options to the factory default s. Before performing an upgrade, be sure to save the current configuration from the T ools ->[...]
-
Pagina 65
65 Tools_Dynamic DNS The Dynamic DNS feature allows you to host a server (Web, FTP, Game Server, etc.) using a domain name that you have purchased (www.whateveryournam eis.com) with your dynamically assigned IP address. Most broadband Internet Service Provider s assign dynamic (changing) IP addresses. When you use a Dynamic DNS service prov ider, y[...]
-
Pagina 66
66 V erify Password or Key Re-type the password or key provided by your service provider . If the Dynamic DNS provider supplies only a key , enter that key in all three fields. Timeout The time between periodic updates to the Dynamic DNS, if your dynamic IP address has not changed. The timeout period is enter ed in hours. If a dynamic DNS update fa[...]
-
Pagina 67
67 Tools_System Check Ping Test "Ping" is an Internet utility function that sends a series of shor t messages to a target computer and reports the results. You can use it to test whether a computer is runn ing, and to get an idea of the quality of the connection to that computer, based on the speed of the responses. Host Name or IP Addres[...]
-
Pagina 68
68 Tools_Schedules Schedules can be created for use with enforcing rules. For example, if you want to restrict web access to Mon-Fri from 3pm to 8pm, you could create a schedule selecting Mon, Tue, Wed, Thu, and Fri and enter a Start Time of 3pm and End Time of 8pm. Add/Edit Schedule Rule In this section you can add entries to the Schedul e Rules L[...]
-
Pagina 69
69 Save Saves the new or edited Schedule Rule in the following list. When finished updating the Schedule Rules, you must still click the Save Settings button at the top of the page to make the changes effective and permanent. Schedule Rules List This section shows the currently defined Schedule Rules. A Schedule Rule can be changed by clicking the [...]
-
Pagina 70
70 Status The Status tab provides the following configuration options: Device Info, Wireless, Routing, Logs, Statistics and Active Sessions. Status_Device info All of your Internet and network connecti on deta ils are displayed on the Devi ce Info page. T he firmware version is also displayed here. Some browsers have limitations that make it imposs[...]
-
Pagina 71
71 PPPoE, PPTP, L2TP Connection Depending on whether the WAN connection is currently established, you can click either the Connect to attempt to establish the WAN connection or the Disconnect to break the WAN connection. BigPond Connection Depending on whether you are currently logged in to BigPond, you can click either the BigPond Login to attempt[...]
-
Pagina 72
72 Status_Wireless The wireless section allows you to view the wireless clients that are connected to your wireless router. MAC Address The Ethernet ID (MAC address) of the wireless client. IP Address The LAN-side IP address of the client. Mode The transmission standard being used by the client. Values are 11b, or 11g for 802.11b, or 802.11g respec[...]
-
Pagina 73
73 Status_Routing The routing section displays all of the routing details co nfigured for your router. A value of 0.0.0.0 for gateway means there is no next hop, and the IP address is directly connected to the router on the interface specified: LAN or WAN. A value of 0.0.0.0 in both the destination IP and netmask means that this is the default rout[...]
-
Pagina 74
74 Status_Logs The router automatically logs (records) events of possibl e interest in its int ernal memory. If there is not enough internal memory for all events, logs of older events are deleted, but logs of the latest events are retained. The Logs option allows you to view the router logs. You can define what types of events you want to view and[...]
-
Pagina 75
75 Vie w Levels Select the level of events that you want to view . • Critical • W arning • Informational Apply Log Settings Now Click this button after changing Log Options to make them effective and permanent. Refresh Clicking this button refreshes the display of log entries. There may be new events since the last time you accessed the log. [...]
-
Pagina 76
76 Status_Statistics The Statistics page displays all of the LAN, WAN, and Wireless packet transmit and receive statistics. Sent The number of packets sent from the router. Received The number of packets received by the router. TX Packets Dropped The number of packets that were dropped while being sent, due to errors, collisio ns, or router resourc[...]
-
Pagina 77
77 Status_Active Sessions The Active Sessions page displays full details of ac tive sessions through your router. A session is a conversation between a program or application on a LAN-side computer and a program or application on a WAN-side computer. Internal The IP address and port number of the LAN-side application. Protocol The communications pr[...]
-
Pagina 78
78 State State for sessions that use the TCP protocol. • NO: None -- This entry is used as a placeholder for a future connection t hat may occur. • SS: SYN Sent -- One of the systems is attempting to start a connection. • EST: Established -- the connection is passing data. • FW: FIN Wait -- The client system has requested that the connectio[...]
-
Pagina 79
79 S t atus_WISH Sessions The WISH Sessions page displays full details of acti ve local w ireless sessions through your router when WISH has been enabled. A WISH session is a conversation between a program or application on a wirelessly connected LAN-side computer and another computer, however connected. Originator The IP address and, where appropr[...]
-
Pagina 80
80 • LA: Last ACK -- Waiting for a short time while a connection that was in Close Wait is fully closed. • CL: Closed -- The connection is no longer active but the session is being tracked in case there are any retransmitted packets still pending. Priority The priority given to packets sent wirelessly over this conversation by the WISH logic. T[...]
-
Pagina 81
81 Glossary 8 802.11 A family of specifications for wireless lo cal area networks (WLANs) developed by a working group of the Institute of Electrical and Electronics Engineers (IEEE). A Access Control List ACL. This is a database of network devices that are allowed to access resources on t he network. Access Point AP. Device that allows wireless cl[...]
-
Pagina 82
82 ASCII American Standard Code for Information Interchange. This system of characters is most commonly used for text files Attenuation The loss in strength of digital and an alog signals. The loss is greater when the signal is being transmitted over long distances. Authentication To provide credentials, like a Password, in order to verify that the[...]
-
Pagina 83
83 A wide band of frequencies available for transmitting data Broadcast Transmitting data in all directions at once Browser A program that allows you to access resources on the web and provides them to you graphically C Cable modem A device that allows you to connect a computer up to a coaxial cable and receive Internet access from your Cable provi[...]
-
Pagina 84
84 DB-25 A 25 ping male connector for attaching Exte rnal modems or RS-232 serial devices DB-9 A 9 pin connector for RS-232 connections dBd Decibels related to dipole antenna dBi Decibels relative to isotropic radiator dBm Decibels relative to one milliwatt Decrypt To unscramble an encrypted message back into plain text Default A predetermined valu[...]
-
Pagina 85
85 To send a request from one computer to another and have the file transmitted back to the requesting computer DSL Digital Subscriber Line. High bandwidth Internet connection over telephone lines Duplex Sending and Receiving data transmissions at the sane time Dynamic DNS service Dynamic DNS is provided by companies to allo w users with Dynamic IP[...]
-
Pagina 86
86 Programming that is inserted into a hardware device that tells it how to function Fragmentation Breaking up data into smaller pieces to make it easier to store FTP File Transfer Protocol. Easiest way to transfer files between computers on the Internet Full-duplex Sending and Receiving data at the same time G Gain The amount an amplifier boosts t[...]
-
Pagina 87
87 Hypertext Transfer Protocol is used to transfer fi les from HTTP servers (web servers) to HTTP clients (web browsers) HTTPS HTTP over SSL is used to encrypt and decrypt HTTP transmissions Hub A networking device that connects multiple devices together I ICMP Internet Control Message Protocol IEEE Institute of Electrical and Electronics Engineers[...]
-
Pagina 88
88 A type of security that scans a network to detect attacks co ming from inside and outside of the network IP Internet Protocol IP address A 32-bit number, when talking about Internet Protocol Version 4, that identifies each computer that transmits data on the Internet or on an Intranet IPsec Internet Protocol Security IPX Internetwork Packet Exch[...]
-
Pagina 89
89 Local Area Network A group of computers in a building that usually access files from a server LPR/LPD "Line Printer Requestor"/"Line Printer Daemon". A TCP/IP protocol for transmitting streams of printer data. M MAC Address A unique hardware ID assigned to every Ethernet adapter by the manufacturer. Mbps Megabits per second M[...]
-
Pagina 90
90 NetBIOS Network Basic Input/Output System Netmask Determines what portion of an IP address designates the Network and which part designates the Host Network Interface Card A card installed in a computer or built onto the motherboard that allows the computer to connect to a network Network Layer The third layer of the OSI model which handles the [...]
-
Pagina 91
91 Ping A utility program that verifies that a given Internet address exists and can receive messages. The utility sends a control packet to the given address and w aits for a response. PoE Power over Ethernet is the means of transmitting electricity over the unused pairs in a category 5 Ethernet cable POP3 Post Office Protocol 3 is used for receiv[...]
-
Pagina 92
92 RIP Routing Information Protocol is used to synchronize the routing table of all the routers on a network RJ-11 The most commonly used connection method for telephones RJ-45 The most commonly used connection method for Ethernet RS-232C The interface for serial communication between computers and other related devices RSA Algorithm used for encry[...]
-
Pagina 93
93 Stateful Packet Inspection SSH Secure Shell is a command line interface that allows for secure connections to remote computers SSID Service Set Identifier is a name for a wireless network Stateful inspection A feature of a firewall that monitors outgoing and incoming traffic to make sure that only valid responses to outgoing requests are allowed[...]
-
Pagina 94
94 Universal Plug and Play A standard that allows network devices to discover each other and configure themselves to be a part of the network Upgrade To install a more recent version of a software or firmware product Upload To send a request from one computer to another and have a file transmitted from the requesting computer to the other UPnP Univ[...]
-
Pagina 95
95 Wireless Distribution System. A system that enables the interconnection of access points wirelessly. Web browser A utility that allows you to view content and interact with all of the information on the World Wide Web WEP Wired Equivalent Privacy is security for wireless networks that is supposed to be co mparable to that of a wired network Wide[...]
-
Pagina 96
96 Limited W arranty TRENDnet warrants its products against defects in materi al and workmanship, under normal use and service, for the following lengths of time from the date of purchase. TEW-633GR 3 years If a product does not operate as warranted above during the applicable warranty period, TRENDnet shall, at its option and expense, repair the d[...]
-
Pagina 97
97[...]