Manuel d'utilisation / d'entretien du produit TEW-633GR du fabricant TRENDnet
Aller à la page of 97
1.
2 Federal Communication Commission Interference St atement This equipment has been tested and found to comply with the limit s for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential inst allation.
3 Table of Contents Getting Started with the TEW-633GR 4 P a c k a g e C o n t e n t s 5 Minimum System Requirements 5 Wireless LAN Networking 6 I n t r o d u c t i o n 9 F e a t u r e s 9 Hardware Ov.
4 Getting S tarted with the TEW -633GR Congratulations on purchasing the TEW -633GR! Thi s manual provides in formation for setting up and configuring the TEW -633GR.
5 Package Content s z TEW-633GR 11n Wireless N Gigabit Router z CAT-5 Ethernet Cable z Power Adapter z User’s Guide CD-ROM z Multi-Language Quick Installation Guide Using a power supply with a different voltage than the one included with your product will cause damage and void the warranty for this product.
6 Wireless LAN Networking This section provides background information on wireless LAN networking technolog y . Consult the Glossary for definitions of the terminology used in this section.
7 When a number of wireless stations are connecte d using a single access point, you have a Basic Service Set (BSS). In the ESS diagram below , communication is done through the access points, which relay dat a packet s to other wireless st ations or devices connected to the wired network.
8 In an ESS environ ment, users are able to mo ve from one access point to another without losing th e connection. In the diagram below , wh en the user moves from BSS (1) to BSS (2) the WLAN client devices automatically switches to the channel used in BSS (2).
9 Introduction The TEW-633GR 11n Wireless Gigabit Router is a high-performance, wireless router that supports high-speed wireless networking at home, at work or in public places. Unlike most routers, the TEW-633GR provides data transfers at up to 300Mbps when using 11n (Draft 2.
10 ¾ Hardwar e Overview Side Panel DC-IN The DC power input connector is a single jack socket to sup ply power to the TEW-633GR. Please use the Power Adapter provided on the TEW-633GR package. Reset Button Pressing the reset button restores the router to its original fa ctory default settings.
11 LEDs PWR/SYS LED Solid lights indicate a proper connection to the powe r supply, and indicat e the system ready or not. LAN LEDs Solid lights indicate connections to Ethernet-enabled computers on ports 1-4. LED blinks during data transmission. WAN LED A solid light indicates connection on the WAN port.
12 Installation Considerations The TEW-633GR 11n (Draft 2.0) Wireless Router lets you access your network, using a wireless connection, from virtually anywhere within its operating range.
13 Using the Configuration Menu Whenever you want to configure your TEW-633GR, you can access the Configurat ion Menu through your PC by opening the Web-browser and typing in th e IP Address of the TEW-633GR. The TEW-633GR’s default IP Address is http://192.
14 Basic The Basic tab provides the following configuration options: INTERNET, WIRELESS and NETWORK SETTINGS. Basic_Internet Setup Wizard If you are new to networking and have never configured a router before, click on Setup W izard and the router will guide you through a few simple step s to get your network up and running.
15 Basic_Wireless The wireless section is used to configure the wireless settings for your router. Note that changes made in this section may also need to be duplicated on wireless clients that you want to connect to your wireless network. To protect your privacy, use the wireless security mode to configure the wireless security features.
16 Wireless Network Name When you are browsing for available wireless networks, this i s the name that will appear in the list (unless Visibility Status is set to Invisible, see below). This name is also referred t o as the SSID. For security purposes, it is highly recommended to change from the pre-configured network name.
17 provided so you can enter a string that is easier to remember. The ASCII string is converted to HEX for use over the network. Four keys can be defined so that you can change keys easily. A default key is selected for use on the network. Example: 64-bit hexadecimal keys are exactly 10 characters in length.
18 WPA-Enterprise This option works with a RADIUS Server to authenticate wireless clients. Wireless clients should have established the necessary credentials before attempting to authenticate to the Server through this Gateway. Furthermore, it may be necessary to configure the RADIUS Server to allow this Gateway to authenticate users.
19 Basic_ Network Settings Use this section to configure the internal network settings of your router. The IP Address that is configured here is the IP Address that you use to access the Web-base d management interface. If you change the IP Address here, you may need to adjust your PC’s network settings to access the network again.
20 must be set to the IP ad dress of this device. The Gateway must be set to the IP address of the upstream router . Both addresses must be within the LAN subnet as specified by Subnet Mask. Router Settings These are the settings of the LAN (Local Area Network) interface for the router .
21 The additional cost of routing a p acket through this router . The normal value for a simple network is 1. This metric is added to routes learned from other routers; it is not added to static or system routes. Act as default router Make this router the preferred destination for p ackets that are not otherwise destined.
22 Suppose you configure the DHCP Server to manage addresses from 192.168.10.101 T o 192.168.10.200. This means that 192.168.10. 2 to 192.168.10.100 and 192.168.10.201 to 192.168.10.254 is NOT managed by the DHCP Server . Computers or devices that use addresses from thes e ranges are to be manually configured.
23 Always Broadcast If all the computers on the LAN successfully obt ain their IP addresses from the router's DHCP server as expected, this option can remain disabled.
24 DHCP Reservations List This shows clients that y ou have specified to have reserved DHCP addresses. An entry can be changed by clicking the Edit icon, or deleted by clicking the Delete icon. When you click the Edit icon, the item is highlighted, and the "E dit DHCP Reservation" section is activated for editing.
25 Advanced The Advanced tab provides the following configuration options: Virtual Server, Special Applications, Gaming, StreamEngine, Routing, Access Control, WEB Filter, MAC Address Filter, Firewall, Inbound Filter, Advanced Wireless and Advanced Network.
26 4. Enter the Public Port as [8888] 5. Select the Protocol (for example TCP ). 6. Ensure the schedule is set to Always 7. Click Save to add the settings to the V irtual Servers List 8. Repeat these steps for each V irtual Server Rule you wish to add.
27 Add/Edit Virtual Server In this section you can add an entry to the V irtual Servers List below or edit an existing entry . Enable Entries in the list can be either active (enabled) or inactive (disabled). Save Saves the new or edited virtual server entry in the following list.
28 Advanced_Special Applications An application rule is used to open single or multiple ports on your router when the router senses data sent to the Internet on a "trigger" port or port range. An application rule applies to all computers on your internal network.
29 T rigger Protocol Select the outbound protocol used by your application (for example Both ). Input Port Range Enter the port range that you want to open up to Internet traf fic (for example 6000-6200 ). Input Protocol Select the protocol used by the Internet traf fic coming back into the router through the opened port range (for example Both ).
30 Advanced_Gaming Multiple connections are required by some applicat ions, such as internet games, video conferencing, Internet telephony, and others.
31 Port Forwarding Fields Name Give the rule a name that is meaningful to you, for example Game Server . Y ou can also select from a list of popular games, and many of the remaining configuration values will be f illed in accordingly .
32 Advanced_StreamEngine The StreamEngine feature helps improve your netwo rk gaming performance by prioritizing the data flows of network applications. StreamEngine Setup Enable StreamEngine Enable this option for better performance and experience with online games and other interactive applications, such as V oIP .
33 Automatic Classification This option is enabled by default so that your router will automatically determine which programs should have network priority .
34 Conflicting rules are not permitted. Conflicting rules are those that share any combination of source address/port, destination address/port, a nd protocol. Rejecting conflicting rules ensures that every flow defined in a rule receives the expected priority and avoids indeterminate prioritization that could reduce QoS ef fectiveness.
35 Advanced_Routing Add/Edit Route Adds a new route to the IP routing table or edits an existing route. Enable: Specifies whether the entry will be enabled or disabled. Destination IP: The IP address of packets that will take this route. Netmask: One bits in the mask specify which bits of the IP address must match.
36 Routes List The section shows the current routing table entries. Certain required routes are pred efined and cannot be changed. Routes that you add can be changed by clicking th e Edit icon, or deleted by clicking the Delete icon.
37 Advanced_WEB Filter This section is where you add the Web sites to be used for A ccess Control. The Web sites listed here are used when the Web Filter option is enabled in Access Control . The Web Filter section is one of two means by which you can specify the web sites you want to allow.
38 This is where you can add Web sites to the Allowed Web Site List or change entries in the Allowed Web Site List. Enable Entries in the Allowed Web Site List can be activated or deactivated with this che ckbox. New entries are activated by default. Save Saves the new or edited Allowed Web Site in the following list.
39 Advanced_MAC Address Filter The MAC address filter section can be used to filter network access by machines based on the un ique MAC addresses of their network adapter(s). It is most useful to prevent unauthorized wireless dev ices from connecting to your network.
40 Filter Settings Mode When "only allow listed machines" is selected, only computers with MAC addresses listed in the MAC Address List are granted network access. When "only deny listed machines" is selected, any computer with a MAC address listed in the MAC Address List is refused access to the network.
41 Advanced_Firewall The router provides a tight firewall by virtue of the way NAT works. Unless you configure the router to the contrary, the NAT does not respond to unsolicited incoming requests on any port, thereby making your LAN invisible to Internet cyber attackers.
42 Firewall Settings Enable SPI SPI ("stateful p acket inspection" also known as "d ynamic packet filtering") help s to prevent cyber att acks by tracking more st ate per session. It validates that the traf fic passing through that session confor ms to the protocol.
43 DMZ Host DMZ means "Demilitarized Zone." If an application has troub le working from behind the router , you can expose one computer to the Internet and run the application o n that computer .
44 DMZ IP Address S pecify the LAN IP address of the LAN computer that you want to have unrestricted Internet communication. If this computer obtains its address automatically using DHCP , then you may want to make a static reservation on the Basic → Network Settings p age so that the IP a ddress of the DMZ computer does not change.
45 Windows/MSN Messenger Supports use on LAN computers of Microsof t Windows Messenger (the Internet messaging client that ship s with Microsoft Windows) and MSN Messenger . The SIP ALG must also be enabled when the Windows Messenger ALG is enabled. FTP Allows FTP client s and servers to transfer dat a across NA T .
46 Advanced_Inbound Filter When you use the Virtual Server, Gaming, or Remote Administration features to open specific ports to traffic from the Internet, you could be increasing the ex posure of your LAN to cyber attacks from the Internet.
47 Add/Edit Inbound Filter Rule Here you can add entries to the Inbound Filter Rules List below, or edit existing entries. Name Enter a name for the rule that is meaningful to you. Action The rule can either Allow or Deny messages. Source IP Range Define the ranges of Internet addresses this rule applies to.
48 Advanced_Advanced Wireless Transmit Power Normally the wireless transmitter operates at 100% power. In some circumstances, however, there might be a need to isolate specific frequencies to a smaller area.
49 Short GI Using a short (400ns) guard interval can increase throughput. However, it can also in crease error rate in some installations, due to increased sensitivity to radio-frequ ency reflections. Select the option that works best for your installation.
50 Advanced_Network UPnP UPnP is short for Universal Plug and Play, which is a networking architecture that pr ovides compatibility among networking equipment, software, and peripherals. This router ha s optional UPnP capability, and can work with other UPnP devices and software.
51 Advanced_ WISH WISH is short for Wireless Intelligent Stream Handling, a technology developed to en hance your experience of using a wireless network by prioritizing the traffic of differe nt applications. WISH Enable WISH Enable this option if you want to allow WISH to prioritize your traffic.
52 Windows Media Center Enables the router to recognize certain audio and video streams generated by a Windows Media Center PC and to prioritize these above ot her traffic. Such streams are used by systems known as Windows Media Extenders, such as the Xbox 360.
53 Host 2 Port Range The rule applies to a flow of messages for which host 2's p ort number is within the range set here. Save/Update Record the changes you have made into the following list. Clear Re-initialize this area of the screen, discarding an y changes you have made.
54 Advanced_ Wi-Fi Protected Setup Wi-Fi Protected Setup Enable Enable the Wi-Fi Protected Setup feature. Lock Wireless Security Settings Locking the wireless security settings prevent s the settings from being changed by any new external registrar using its PIN.
55 Generate New PIN Create a random number that is a valid PIN. This becomes the router's PIN. Y ou can then copy this PIN to the user interface of the registrar . Add Wireless St ation This Wizard helps you add wireless devices to the wireless network.
56 Tools The Tools tab provides the following configuration options: A dmin, Time, Email Settings, System, Firmware, Dynamic DNS, Windows Connect Now, System Check & Schedules. Tools_Admin The Admin option is used to set a password for access to the Web-based ma nagement.
57 Admin Password Enter a password for the user "admin", who will have full access to the W eb-based management interface. User Password Enter a password for the user "user" , who will have read-only access to the Web-based management interface.
58 Tools_Time The Time Configuration option allows you to configure, update, and maintain the corre ct time on the router's internal system clock. From this section you can set the time zone that you are in and set the Time Server. Daylight saving can also be configured to automatically adjust the time when needed.
59 Automatic Time Configuration Enable NTP Server Select this option if you want to synchronize the router's clock to a Network Time Server over the Internet. If you are using schedules or logs, this is the best way to ensure tha t the schedules and logs are kept accurate.
60 Tools_Email Settings The Email feature can be used to send the system log files, r outer alert messages, and firmware update notification to your email address.
61 Account Name Enter your account for sending email. Password Enter the password associated with t he account. V erify Password Re-type the password associated with the account. Email Log When Full or on Schedule On Log Full Select this option if you want logs to be sent by email when the log is full.
62 Tools_System This section allows you to manage the router's configuration settings, reboot the router, and restor e the router to the factory default settings. Restoring the unit to the factory default sett ings will erase all settings, including any rules that you've created.
63 Tools_Firmware The Firmware Upgrade section can be used to update to the latest firmware code to improve functionality and performance. To check for the latest firmware, click the Check Online Now button.
64 Firmware Upgrade Firmware upgrade cannot be performed from a wireless device. T o perform an upgrade, ensure that you are using a PC that is connected to the router by wire. Some firmware upgrades reset the configuration options to the factory default s.
65 Tools_Dynamic DNS The Dynamic DNS feature allows you to host a server (Web, FTP, Game Server, etc.) using a domain name that you have purchased (www.whateveryournam eis.com) with your dynamically assigned IP address. Most broadband Internet Service Provider s assign dynamic (changing) IP addresses.
66 V erify Password or Key Re-type the password or key provided by your service provider . If the Dynamic DNS provider supplies only a key , enter that key in all three fields. Timeout The time between periodic updates to the Dynamic DNS, if your dynamic IP address has not changed.
67 Tools_System Check Ping Test "Ping" is an Internet utility function that sends a series of shor t messages to a target computer and reports the results. You can use it to test whether a computer is runn ing, and to get an idea of the quality of the connection to that computer, based on the speed of the responses.
68 Tools_Schedules Schedules can be created for use with enforcing rules. For example, if you want to restrict web access to Mon-Fri from 3pm to 8pm, you could create a schedule selecting Mon, Tue, Wed, Thu, and Fri and enter a Start Time of 3pm and End Time of 8pm.
69 Save Saves the new or edited Schedule Rule in the following list. When finished updating the Schedule Rules, you must still click the Save Settings button at the top of the page to make the changes effective and permanent. Schedule Rules List This section shows the currently defined Schedule Rules.
70 Status The Status tab provides the following configuration options: Device Info, Wireless, Routing, Logs, Statistics and Active Sessions. Status_Device info All of your Internet and network connecti on deta ils are displayed on the Devi ce Info page.
71 PPPoE, PPTP, L2TP Connection Depending on whether the WAN connection is currently established, you can click either the Connect to attempt to establish the WAN connection or the Disconnect to break the WAN connection.
72 Status_Wireless The wireless section allows you to view the wireless clients that are connected to your wireless router. MAC Address The Ethernet ID (MAC address) of the wireless client. IP Address The LAN-side IP address of the client. Mode The transmission standard being used by the client.
73 Status_Routing The routing section displays all of the routing details co nfigured for your router. A value of 0.0.0.0 for gateway means there is no next hop, and the IP address is directly connected to the router on the interface specified: LAN or WAN.
74 Status_Logs The router automatically logs (records) events of possibl e interest in its int ernal memory. If there is not enough internal memory for all events, logs of older events are deleted, but logs of the latest events are retained. The Logs option allows you to view the router logs.
75 Vie w Levels Select the level of events that you want to view . • Critical • W arning • Informational Apply Log Settings Now Click this button after changing Log Options to make them effective and permanent. Refresh Clicking this button refreshes the display of log entries.
76 Status_Statistics The Statistics page displays all of the LAN, WAN, and Wireless packet transmit and receive statistics. Sent The number of packets sent from the router.
77 Status_Active Sessions The Active Sessions page displays full details of ac tive sessions through your router. A session is a conversation between a program or application on a LAN-side computer and a program or application on a WAN-side computer. Internal The IP address and port number of the LAN-side application.
78 State State for sessions that use the TCP protocol. • NO: None -- This entry is used as a placeholder for a future connection t hat may occur. • SS: SYN Sent -- One of the systems is attempting to start a connection. • EST: Established -- the connection is passing data.
79 S t atus_WISH Sessions The WISH Sessions page displays full details of acti ve local w ireless sessions through your router when WISH has been enabled. A WISH session is a conversation between a program or application on a wirelessly connected LAN-side computer and another computer, however connected.
80 • LA: Last ACK -- Waiting for a short time while a connection that was in Close Wait is fully closed. • CL: Closed -- The connection is no longer active but the session is being tracked in case there are any retransmitted packets still pending.
81 Glossary 8 802.11 A family of specifications for wireless lo cal area networks (WLANs) developed by a working group of the Institute of Electrical and Electronics Engineers (IEEE). A Access Control List ACL. This is a database of network devices that are allowed to access resources on t he network.
82 ASCII American Standard Code for Information Interchange. This system of characters is most commonly used for text files Attenuation The loss in strength of digital and an alog signals. The loss is greater when the signal is being transmitted over long distances.
83 A wide band of frequencies available for transmitting data Broadcast Transmitting data in all directions at once Browser A program that allows you to access resources on the web and provides them t.
84 DB-25 A 25 ping male connector for attaching Exte rnal modems or RS-232 serial devices DB-9 A 9 pin connector for RS-232 connections dBd Decibels related to dipole antenna dBi Decibels relative to .
85 To send a request from one computer to another and have the file transmitted back to the requesting computer DSL Digital Subscriber Line. High bandwidth Internet connection over telephone lines Dup.
86 Programming that is inserted into a hardware device that tells it how to function Fragmentation Breaking up data into smaller pieces to make it easier to store FTP File Transfer Protocol.
87 Hypertext Transfer Protocol is used to transfer fi les from HTTP servers (web servers) to HTTP clients (web browsers) HTTPS HTTP over SSL is used to encrypt and decrypt HTTP transmissions Hub A net.
88 A type of security that scans a network to detect attacks co ming from inside and outside of the network IP Internet Protocol IP address A 32-bit number, when talking about Internet Protocol Versio.
89 Local Area Network A group of computers in a building that usually access files from a server LPR/LPD "Line Printer Requestor"/"Line Printer Daemon". A TCP/IP protocol for transmitting streams of printer data. M MAC Address A unique hardware ID assigned to every Ethernet adapter by the manufacturer.
90 NetBIOS Network Basic Input/Output System Netmask Determines what portion of an IP address designates the Network and which part designates the Host Network Interface Card A card installed in a com.
91 Ping A utility program that verifies that a given Internet address exists and can receive messages. The utility sends a control packet to the given address and w aits for a response.
92 RIP Routing Information Protocol is used to synchronize the routing table of all the routers on a network RJ-11 The most commonly used connection method for telephones RJ-45 The most commonly used .
93 Stateful Packet Inspection SSH Secure Shell is a command line interface that allows for secure connections to remote computers SSID Service Set Identifier is a name for a wireless network Stateful .
94 Universal Plug and Play A standard that allows network devices to discover each other and configure themselves to be a part of the network Upgrade To install a more recent version of a software or .
95 Wireless Distribution System. A system that enables the interconnection of access points wirelessly. Web browser A utility that allows you to view content and interact with all of the information o.
96 Limited W arranty TRENDnet warrants its products against defects in materi al and workmanship, under normal use and service, for the following lengths of time from the date of purchase.
97.
Un point important après l'achat de l'appareil (ou même avant l'achat) est de lire le manuel d'utilisation. Nous devons le faire pour quelques raisons simples:
Si vous n'avez pas encore acheté TRENDnet TEW-633GR c'est un bon moment pour vous familiariser avec les données de base sur le produit. Consulter d'abord les pages initiales du manuel d'utilisation, que vous trouverez ci-dessus. Vous devriez y trouver les données techniques les plus importants du TRENDnet TEW-633GR - de cette manière, vous pouvez vérifier si l'équipement répond à vos besoins. Explorant les pages suivantes du manuel d'utilisation TRENDnet TEW-633GR, vous apprendrez toutes les caractéristiques du produit et des informations sur son fonctionnement. Les informations sur le TRENDnet TEW-633GR va certainement vous aider à prendre une décision concernant l'achat.
Dans une situation où vous avez déjà le TRENDnet TEW-633GR, mais vous avez pas encore lu le manuel d'utilisation, vous devez le faire pour les raisons décrites ci-dessus,. Vous saurez alors si vous avez correctement utilisé les fonctions disponibles, et si vous avez commis des erreurs qui peuvent réduire la durée de vie du TRENDnet TEW-633GR.
Cependant, l'un des rôles les plus importants pour l'utilisateur joués par les manuels d'utilisateur est d'aider à résoudre les problèmes concernant le TRENDnet TEW-633GR. Presque toujours, vous y trouverez Troubleshooting, soit les pannes et les défaillances les plus fréquentes de l'apparei TRENDnet TEW-633GR ainsi que les instructions sur la façon de les résoudre. Même si vous ne parvenez pas à résoudre le problème, le manuel d‘utilisation va vous montrer le chemin d'une nouvelle procédure – le contact avec le centre de service à la clientèle ou le service le plus proche.