Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
Table of Contents Getting Started with the TEW-633GR Package Contents Minimum System Requirements 4 5 5 Wireless LAN Networking 6 Introduction Features 9 9 Hardware Overview Side Panel LEDs Installation Considerations Getting Started 10 10 11 12 12 Using the Configuration Menu Basic Advanced Tools Status 13 14 24 55 69 Glossary 80 Note: Please run the CD and follow the steps in the Quick Installation Guide to setup your router.
Getting Started with the TEW-633GR Congratulations on purchasing the TEW-633GR! This manual provides information for setting up and configuring the TEW-633GR. This manual is intended for both home users and professionals. The following conventions are used in this manual: THE NOTE SYMBOL INDICATES ADDITIONAL INFORMATION ON THE TOPIC AT HAND. THE TIP SYMBOL INDICATES HELPFULL INFORMATION AND TIPS TO IMPROVE YOUR NETWORK EXPERIENCE.
Package Contents z TEW-633GR 11n Wireless N Gigabit Router z CAT-5 Ethernet Cable z Power Adapter z User’s Guide CD-ROM z Multi-Language Quick Installation Guide Using a power supply with a different voltage than the one included with your product will cause damage and void the warranty for this product.
Wireless LAN Networking This section provides background information on wireless LAN networking technology. Consult the Glossary for definitions of the terminology used in this section. THE INFORMATION IN THIS SECTION IS FOR YOUR REFERENCE. CHANGING NETWORK SETTINGS AND PARTICULARLY SECURITY SETTTINGS SHOULD ONLY BE DONE BY AN AUTHORIZED ADMINISTRATOR. Transmission Rate (Transfer Rate) The TEW-633GR provides various transmission (data) rate options for you to select.
When a number of wireless stations are connected using a single access point, you have a Basic Service Set (BSS). In the ESS diagram below, communication is done through the access points, which relay data packets to other wireless stations or devices connected to the wired network. Wireless stations can then access resources, such as a printer, on the wired network.
In an ESS environment, users are able to move from one access point to another without losing the connection. In the diagram below, when the user moves from BSS (1) to BSS (2) the WLAN client devices automatically switches to the channel used in BSS (2).
Introduction The TEW-633GR 11n Wireless Gigabit Router is a high-performance, wireless router that supports high-speed wireless networking at home, at work or in public places. Unlike most routers, the TEW-633GR provides data transfers at up to 300Mbps when using 11n (Draft 2.0) connection. This router is also back compatible with 802.11g or 11b devices. This means that you do not need to change your entire network to maintain connectivity.
¾ Hardware Overview Side Panel DC-IN The DC power input connector is a single jack socket to supply power to the TEW-633GR. Please use the Power Adapter provided on the TEW-633GR package. Reset Button Pressing the reset button restores the router to its original factory default settings.
LEDs PWR/SYS LED Solid lights indicate a proper connection to the power supply, and indicate the system ready or not. LAN LEDs Solid lights indicate connections to Ethernet-enabled computers on ports 1-4. LED blinks during data transmission. WAN LED A solid light indicates connection on the WAN port. This LED blinks during data transmission. WLAN LED A solid light indicates that the wireless segment is ready. This LED blinks during wireless data transmission. WPS Button Enable the PBC WPS configuration.
Installation Considerations The TEW-633GR 11n (Draft 2.0) Wireless Router lets you access your network, using a wireless connection, from virtually anywhere within its operating range. Keep in mind, however, that the number, thickness and location of walls, ceilings, or other objects that the wireless signals must pass through, may limit the range. Typical ranges vary depending on the types of materials and background RF (radio frequency) noise in your home or business.
Using the Configuration Menu Whenever you want to configure your TEW-633GR, you can access the Configuration Menu through your PC by opening the Web-browser and typing in the IP Address of the TEW-633GR. The TEW-633GR’s default IP Address is http://192.168.10.1 ¾ ¾ Open the Web browser. Type in the IP Address of the Router (http://192.168.10.1). If you have changed the default IP Address assigned to the TEW-633GR, make sure to enter the correct IP Address. ¾ ¾ ¾ Select admin in the User Name field.
Basic The Basic tab provides the following configuration options: INTERNET, WIRELESS and NETWORK SETTINGS. Basic_Internet Setup Wizard If you are new to networking and have never configured a router before, click on Setup Wizard and the router will guide you through a few simple steps to get your network up and running. Manual Configure If you consider yourself an advanced user and have configured a router before, click Manual Configure to input all the settings manually.
Basic_Wireless The wireless section is used to configure the wireless settings for your router. Note that changes made in this section may also need to be duplicated on wireless clients that you want to connect to your wireless network. To protect your privacy, use the wireless security mode to configure the wireless security features. This device supports three wireless security modes including: WEP, WPA-Personal, and WPA-Enterprise. WEP is the original wireless encryption standard.
Wireless Network Name When you are browsing for available wireless networks, this is the name that will appear in the list (unless Visibility Status is set to Invisible, see below). This name is also referred to as the SSID. For security purposes, it is highly recommended to change from the pre-configured network name. Enable Auto Channel Scan If you select this option, the router automatically finds the channel with least interference and uses that channel for wireless networking.
provided so you can enter a string that is easier to remember. The ASCII string is converted to HEX for use over the network. Four keys can be defined so that you can change keys easily. A default key is selected for use on the network. Example: 64-bit hexadecimal keys are exactly 10 characters in length. (12345678FA is a valid string of 10 characters for 64-bit encryption.) 128-bit hexadecimal keys are exactly 26 characters in length.
WPA-Enterprise This option works with a RADIUS Server to authenticate wireless clients. Wireless clients should have established the necessary credentials before attempting to authenticate to the Server through this Gateway. Furthermore, it may be necessary to configure the RADIUS Server to allow this Gateway to authenticate users. Authentication Timeout: Amount of time before a client will be required to re-authenticate. RADIUS Server IP Address: The IP address of the authentication server.
Basic_Network Settings Use this section to configure the internal network settings of your router. The IP Address that is configured here is the IP Address that you use to access the Web-based management interface. If you change the IP Address here, you may need to adjust your PC’s network settings to access the network again. WAN Port Mode This option controls how the device reacts to traffic on the WAN connector. In this case the Term “port” refers to the Ethernet connectors on the device.
must be set to the IP address of this device. The Gateway must be set to the IP address of the upstream router. Both addresses must be within the LAN subnet as specified by Subnet Mask. Router Settings These are the settings of the LAN (Local Area Network) interface for the router. The router's local network (LAN) settings are configured based on the IP Address and Subnet Mask assigned in this section. The IP address is also used to access this Web-based management interface.
The additional cost of routing a packet through this router. The normal value for a simple network is 1. This metric is added to routes learned from other routers; it is not added to static or system routes. Act as default router Make this router the preferred destination for packets that are not otherwise destined. Allow RIP updates from WAN For security, disable this option unless required by the ISP.
Suppose you configure the DHCP Server to manage addresses from 192.168.10.101 To 192.168.10.200. This means that 192.168.10.2 to 192.168.10.100 and 192.168.10.201 to 192.168.10.254 is NOT managed by the DHCP Server. Computers or devices that use addresses from these ranges are to be manually configured. Suppose you have a web server computer that has a manually configured address of 192.168.10.150.
Always Broadcast If all the computers on the LAN successfully obtain their IP addresses from the router's DHCP server as expected, this option can remain disabled. However, if one of the computers on the LAN fails to obtain an IP address from the router's DHCP server, it may have an old DHCP client that incorrectly turns off the broadcast flag of DHCP packets.
DHCP Reservations List This shows clients that you have specified to have reserved DHCP addresses. An entry can be changed by clicking the Edit icon, or deleted by clicking the Delete icon. When you click the Edit icon, the item is highlighted, and the "Edit DHCP Reservation" section is activated for editing. Number of Dynamic DHCP Clients In this section you can see what LAN devices are currently leasing IP addresses.
Advanced The Advanced tab provides the following configuration options: Virtual Server, Special Applications, Gaming, StreamEngine, Routing, Access Control, WEB Filter, MAC Address Filter, Firewall, Inbound Filter, Advanced Wireless and Advanced Network. Advanced_Virtual Server The Virtual Server option gives Internet users access to services on your LAN. This feature is useful for hosting online services such as FTP, Web, or game servers.
4. Enter the Public Port as [8888] 5. Select the Protocol (for example TCP). 6. Ensure the schedule is set to Always 7. Click Save to add the settings to the Virtual Servers List 8. Repeat these steps for each Virtual Server Rule you wish to add. After the list is complete, click Save Settings at the top of the page. With this Virtual Server entry, all Internet traffic on Port 8888 will be redirected to your internal web server on port 80 at IP Address 192.168.10.50.
Add/Edit Virtual Server In this section you can add an entry to the Virtual Servers List below or edit an existing entry. Enable Entries in the list can be either active (enabled) or inactive (disabled). Save Saves the new or edited virtual server entry in the following list. When finished updating the virtual server entries, you must still click the Save Settings button at the top of the page to make the changes effective and permanent.
Advanced_Special Applications An application rule is used to open single or multiple ports on your router when the router senses data sent to the Internet on a "trigger" port or port range. An application rule applies to all computers on your internal network. Parameters for an Application Rule Example: You need to configure your router to allow a software application running on any computer on your network to connect to a web-based server or another user on the Internet.
Trigger Protocol Select the outbound protocol used by your application (for example Both). Input Port Range Enter the port range that you want to open up to Internet traffic (for example 6000-6200). Input Protocol Select the protocol used by the Internet traffic coming back into the router through the opened port range (for example Both). Schedule Select a schedule for when this rule is in effect.
Advanced_Gaming Multiple connections are required by some applications, such as internet games, video conferencing, Internet telephony, and others. These applications have difficulties working through NAT (Network Address Translation). This section is used to open multiple ports or a range of ports in your router and redirect data through those ports to a single PC on your network.
Port Forwarding Fields Name Give the rule a name that is meaningful to you, for example Game Server. You can also select from a list of popular games, and many of the remaining configuration values will be filled in accordingly. However, you should check whether the port values have changed since this list was created, and you must fill in the IP address field. IP Address Enter the local network IP address of the system hosting the server, for example 192.168.10.50.
Advanced_StreamEngine The StreamEngine feature helps improve your network gaming performance by prioritizing the data flows of network applications. StreamEngine Setup Enable StreamEngine Enable this option for better performance and experience with online games and other interactive applications, such as VoIP.
Automatic Classification This option is enabled by default so that your router will automatically determine which programs should have network priority. Dynamic Fragmentation This option should be enabled when you have a slow Internet uplink. It helps to reduce the impact that large low priority network packets can have on more urgent ones by breaking the large packets into several smaller packets.
Conflicting rules are not permitted. Conflicting rules are those that share any combination of source address/port, destination address/port, and protocol. Rejecting conflicting rules ensures that every flow defined in a rule receives the expected priority and avoids indeterminate prioritization that could reduce QoS effectiveness. Name Create a name for the rule that is meaningful to you.
Advanced_Routing Add/Edit Route Adds a new route to the IP routing table or edits an existing route. Enable: Specifies whether the entry will be enabled or disabled. Destination IP: The IP address of packets that will take this route. Netmask: One bits in the mask specify which bits of the IP address must match. Gateway: Specifies the next hop to be taken if this route is used. A gateway of 0.0.0.
Routes List The section shows the current routing table entries. Certain required routes are predefined and cannot be changed. Routes that you add can be changed by clicking the Edit icon, or deleted by clicking the Delete icon. When you click the Edit icon, the item is highlighted, and the "Edit Route" section is activated for editing. Advanced_Access Control The Access Control section allows you to control access in and out of devices on your network.
Advanced_WEB Filter This section is where you add the Web sites to be used for Access Control. The Web sites listed here are used when the Web Filter option is enabled in Access Control. The Web Filter section is one of two means by which you can specify the web sites you want to allow. Web Filter Parameters Web Site Enter the address of the web site that you want to allow; for example: trendnet.com. Do not enter the http:// preceding the address.
This is where you can add Web sites to the Allowed Web Site List or change entries in the Allowed Web Site List. Enable Entries in the Allowed Web Site List can be activated or deactivated with this checkbox. New entries are activated by default. Save Saves the new or edited Allowed Web Site in the following list. When finished updating the Allowed Web Site List, you must still click the Save Settings button at the top of the page to make the changes effective and permanent.
Advanced_MAC Address Filter The MAC address filter section can be used to filter network access by machines based on the unique MAC addresses of their network adapter(s). It is most useful to prevent unauthorized wireless devices from connecting to your network. A MAC address is a unique ID assigned by the manufacturer of the network adapter. Enable MAC Address Filter When this is enabled, computers are granted or denied network access depending on the mode of the filter.
Filter Settings Mode When "only allow listed machines" is selected, only computers with MAC addresses listed in the MAC Address List are granted network access. When "only deny listed machines" is selected, any computer with a MAC address listed in the MAC Address List is refused access to the network. Filter Wireless Clients When this is selected, the MAC address filters will be applied to wireless network clients.
Advanced_Firewall The router provides a tight firewall by virtue of the way NAT works. Unless you configure the router to the contrary, the NAT does not respond to unsolicited incoming requests on any port, thereby making your LAN invisible to Internet cyber attackers. However, some network applications cannot run with a tight firewall. Those applications need to selectively open ports in the firewall to function correctly.
Firewall Settings Enable SPI SPI ("stateful packet inspection" also known as "dynamic packet filtering") helps to prevent cyber attacks by tracking more state per session. It validates that the traffic passing through that session conforms to the protocol. When the protocol is TCP, SPI checks that packet sequence numbers are within the valid range for the session, discarding those packets that do not have valid sequence numbers.
DMZ Host DMZ means "Demilitarized Zone." If an application has trouble working from behind the router, you can expose one computer to the Internet and run the application on that computer. When a LAN host is configured as a DMZ host, it becomes the destination for all incoming packets that do not match some other incoming session or rule.
DMZ IP Address Specify the LAN IP address of the LAN computer that you want to have unrestricted Internet communication. If this computer obtains its address automatically using DHCP, then you may want to make a static reservation on the Basic → Network Settings page so that the IP address of the DMZ computer does not change.
Windows/MSN Messenger Supports use on LAN computers of Microsoft Windows Messenger (the Internet messaging client that ships with Microsoft Windows) and MSN Messenger. The SIP ALG must also be enabled when the Windows Messenger ALG is enabled. FTP Allows FTP clients and servers to transfer data across NAT. Refer to the Advanced → Virtual Server page if you want to host an FTP server. H.323 (Netmeeting) Allows H.323 (specifically Microsoft Netmeeting) clients to communicate across NAT.
Advanced_Inbound Filter When you use the Virtual Server, Gaming, or Remote Administration features to open specific ports to traffic from the Internet, you could be increasing the exposure of your LAN to cyber attacks from the Internet. In these cases, you can use Inbound Filters to limit that exposure by specifying the IP addresses of internet hosts that you trust to access your LAN through the ports that you have opened.
Add/Edit Inbound Filter Rule Here you can add entries to the Inbound Filter Rules List below, or edit existing entries. Name Enter a name for the rule that is meaningful to you. Action The rule can either Allow or Deny messages. Source IP Range Define the ranges of Internet addresses this rule applies to. For a single IP address, enter the same address in both the Start and End boxes. Up to eight ranges can be entered. The Enable checkbox allows you to turn on or off specific entries in the list of ranges.
Advanced_Advanced Wireless Transmit Power Normally the wireless transmitter operates at 100% power. In some circumstances, however, there might be a need to isolate specific frequencies to a smaller area. By reducing the power of the radio, you can prevent transmissions from reaching beyond your corporate/home office or designated wireless area. Beacon Period Beacons are packets sent by a wireless router to synchronize wireless devices. Specify a Beacon Period value between 20 and 1000.
Short GI Using a short (400ns) guard interval can increase throughput. However, it can also increase error rate in some installations, due to increased sensitivity to radio-frequency reflections. Select the option that works best for your installation. Extra Wireless Protection Extra protection for neighboring 11b wireless networks. Turn this option off to reduce the adverse effect of legacy wireless networks on 802.11ng performance.
Advanced_Network UPnP UPnP is short for Universal Plug and Play, which is a networking architecture that provides compatibility among networking equipment, software, and peripherals. This router has optional UPnP capability, and can work with other UPnP devices and software. Enable UPnP If you need to use the UPnP functionality, you can enable it here. WAN Ping Pinging public WAN IP addresses is a common method used by hackers to test whether your WAN IP address is valid.
Advanced_ WISH WISH is short for Wireless Intelligent Stream Handling, a technology developed to enhance your experience of using a wireless network by prioritizing the traffic of different applications. WISH Enable WISH Enable this option if you want to allow WISH to prioritize your traffic. Priority Classifiers HTTP Allows the router to recognize HTTP transfers for many common audio and video streams and prioritize them above other traffic. Such streams are frequently used by digital media players.
Windows Media Center Enables the router to recognize certain audio and video streams generated by a Windows Media Center PC and to prioritize these above other traffic. Such streams are used by systems known as Windows Media Extenders, such as the Xbox 360. Automatic When enabled, this option causes the router to automatically attempt to prioritize traffic streams that it doesn't otherwise recognize, based on the behaviour that the streams exhibit.
Host 2 Port Range The rule applies to a flow of messages for which host 2's port number is within the range set here. Save/Update Record the changes you have made into the following list. Clear Re-initialize this area of the screen, discarding any changes you have made. WISH Rules This section lists the defined WISH Rules. Click the Enable checkbox at the left to directly activate or de-activate the entry. An entry can be changed by clicking the Edit icon or can be deleted by clicking the Delete icon.
Advanced_ Wi-Fi Protected Setup Wi-Fi Protected Setup Enable Enable the Wi-Fi Protected Setup feature. Lock Wireless Security Settings Locking the wireless security settings prevents the settings from being changed by any new external registrar using its PIN. Devices can still be added to the wireless network using Wi-Fi Protected Setup. It is still possible to change wireless network settings with Manual Wireless Network Setup, Wireless Network Setup Wizard, or an existing external WLAN Manager Registrar.
Generate New PIN Create a random number that is a valid PIN. This becomes the router's PIN. You can then copy this PIN to the user interface of the registrar. Add Wireless Station This Wizard helps you add wireless devices to the wireless network. The wizard will either display the wireless network settings to guide you through manual configuration, prompt you to enter the PIN for the device, or ask you to press the configuration button on the device.
Tools The Tools tab provides the following configuration options: Admin, Time, Email Settings, System, Firmware, Dynamic DNS, Windows Connect Now, System Check & Schedules. Tools_Admin The Admin option is used to set a password for access to the Web-based management. By default there is no password configured. It is highly recommended that you create a password to keep your new router secure.
Admin Password Enter a password for the user "admin", who will have full access to the Web-based management interface. User Password Enter a password for the user "user", who will have read-only access to the Web-based management interface. Gateway Name The name of the router can be changed here. Enable Remote Management Enabling Remote Management allows you to manage the router from anywhere on the Internet. Disabling Remote Management allows you to manage the router only from computers on your LAN.
Tools_Time The Time Configuration option allows you to configure, update, and maintain the correct time on the router's internal system clock. From this section you can set the time zone that you are in and set the Time Server. Daylight saving can also be configured to automatically adjust the time when needed. Time Configuration Current Router Time Displays the time currently maintained by the router. If this is not correct, use the following options to configure the time correctly.
Automatic Time Configuration Enable NTP Server Select this option if you want to synchronize the router's clock to a Network Time Server over the Internet. If you are using schedules or logs, this is the best way to ensure that the schedules and logs are kept accurate. NTP Server Used Select a Network Time Server for synchronization. You can type in the address of a time server or select one from the list. If you have trouble using one server, select another.
Tools_Email Settings The Email feature can be used to send the system log files, router alert messages, and firmware update notification to your email address. Enable Enable Email Notification When this option is enabled, router activity logs or firmware upgrade notifications can be emailed to a designated email address, and the following parameters are displayed.
Account Name Enter your account for sending email. Password Enter the password associated with the account. Verify Password Re-type the password associated with the account. Email Log When Full or on Schedule On Log Full Select this option if you want logs to be sent by email when the log is full. On Schedule Select this option if you want logs to be sent by email according to a schedule. Schedule If you selected the On Schedule option, select one of the defined schedule rules.
Tools_System This section allows you to manage the router's configuration settings, reboot the router, and restore the router to the factory default settings. Restoring the unit to the factory default settings will erase all settings, including any rules that you've created. Save Settings To Local Hard Drive This option allows you to save the router's configuration to a file on your computer. Be sure to save the configuration before performing a firmware upgrade.
Tools_Firmware The Firmware Upgrade section can be used to update to the latest firmware code to improve functionality and performance. To check for the latest firmware, click the Check Online Now button. If you would like to be notified when new firmware is released, place a checkmark in the box next to Email Notification of Newer Firmware Version. To upgrade the firmware, follow these steps: 1. Click the Browse button to locate the upgrade file on your computer. 2.
Firmware Upgrade Firmware upgrade cannot be performed from a wireless device. To perform an upgrade, ensure that you are using a PC that is connected to the router by wire. Some firmware upgrades reset the configuration options to the factory defaults. Before performing an upgrade, be sure to save the current configuration from the Tools -> Admin screen. Upload Once you have a firmware update on your computer, use this option to browse for the file and then upload the information into the router.
Tools_Dynamic DNS The Dynamic DNS feature allows you to host a server (Web, FTP, Game Server, etc.) using a domain name that you have purchased (www.whateveryournameis.com) with your dynamically assigned IP address. Most broadband Internet Service Providers assign dynamic (changing) IP addresses. When you use a Dynamic DNS service provider, your friends can enter your host name to connect to your server, no matter what your IP address is.
Verify Password or Key Re-type the password or key provided by your service provider. If the Dynamic DNS provider supplies only a key, enter that key in all three fields. Timeout The time between periodic updates to the Dynamic DNS, if your dynamic IP address has not changed. The timeout period is entered in hours. If a dynamic DNS update fails for any reason (for example, when incorrect parameters are entered), the router automatically disables the Dynamic DNS feature and records the failure in the log.
Tools_System Check Ping Test "Ping" is an Internet utility function that sends a series of short messages to a target computer and reports the results. You can use it to test whether a computer is running, and to get an idea of the quality of the connection to that computer, based on the speed of the responses. Host Name or IP Address Enter either the IP address of the target computer or enter its fully qualified domain name. Ping Start pinging the specified host.
Tools_Schedules Schedules can be created for use with enforcing rules. For example, if you want to restrict web access to Mon-Fri from 3pm to 8pm, you could create a schedule selecting Mon, Tue, Wed, Thu, and Fri and enter a Start Time of 3pm and End Time of 8pm. Add/Edit Schedule Rule In this section you can add entries to the Schedule Rules List below or edit existing entries. Name Give the schedule a name that is meaningful to you, such as "Weekday rule".
Save Saves the new or edited Schedule Rule in the following list. When finished updating the Schedule Rules, you must still click the Save Settings button at the top of the page to make the changes effective and permanent. Schedule Rules List This section shows the currently defined Schedule Rules. A Schedule Rule can be changed by clicking the Edit icon, or deleted by clicking the Delete icon.
Status The Status tab provides the following configuration options: Device Info, Wireless, Routing, Logs, Statistics and Active Sessions. Status_Device info All of your Internet and network connection details are displayed on the Device Info page. The firmware version is also displayed here. Some browsers have limitations that make it impossible to update the WAN status display when the status changes. Some browsers require that you refresh the display to obtain updated status.
PPPoE, PPTP, L2TP Connection Depending on whether the WAN connection is currently established, you can click either the Connect to attempt to establish the WAN connection or the Disconnect to break the WAN connection. BigPond Connection Depending on whether you are currently logged in to BigPond, you can click either the BigPond Login to attempt to establish the WAN connection or the BigPond Logout to break the WAN connection.
Status_Wireless The wireless section allows you to view the wireless clients that are connected to your wireless router. MAC Address The Ethernet ID (MAC address) of the wireless client. IP Address The LAN-side IP address of the client. Mode The transmission standard being used by the client. Values are 11b, or 11g for 802.11b, or 802.11g respectively. Rate The actual transmission rate of the client in megabits per second. Signal This is a relative measure of signal quality.
Status_Routing The routing section displays all of the routing details configured for your router. A value of 0.0.0.0 for gateway means there is no next hop, and the IP address is directly connected to the router on the interface specified: LAN or WAN. A value of 0.0.0.0 in both the destination IP and netmask means that this is the default route.
Status_Logs The router automatically logs (records) events of possible interest in its internal memory. If there is not enough internal memory for all events, logs of older events are deleted, but logs of the latest events are retained. The Logs option allows you to view the router logs. You can define what types of events you want to view and the level of events to view.
View Levels Select the level of events that you want to view. • Critical • Warning • Informational Apply Log Settings Now Click this button after changing Log Options to make them effective and permanent. Refresh Clicking this button refreshes the display of log entries. There may be new events since the last time you accessed the log. Clear Clicking this button erases all log entries.
Status_Statistics The Statistics page displays all of the LAN, WAN, and Wireless packet transmit and receive statistics. Sent The number of packets sent from the router. Received The number of packets received by the router. TX Packets Dropped The number of packets that were dropped while being sent, due to errors, collisions, or router resource limitations. RX Packets Dropped The number of packets that were dropped while being received, due to errors, collisions, or router resource limitations.
Status_Active Sessions The Active Sessions page displays full details of active sessions through your router. A session is a conversation between a program or application on a LAN-side computer and a program or application on a WAN-side computer. Internal The IP address and port number of the LAN-side application. Protocol The communications protocol used for the conversation. External The IP address and port number of the WAN-side application.
State State for sessions that use the TCP protocol. • NO: None -- This entry is used as a placeholder for a future connection that may occur. • SS: SYN Sent -- One of the systems is attempting to start a connection. • EST: Established -- the connection is passing data. • FW: FIN Wait -- The client system has requested that the connection be stopped. • CW: Close Wait -- the server system has requested that the connection be stopped.
Status_WISH Sessions The WISH Sessions page displays full details of active local wireless sessions through your router when WISH has been enabled. A WISH session is a conversation between a program or application on a wirelessly connected LAN-side computer and another computer, however connected. Originator The IP address and, where appropriate, port number of the computer that originated a network connection.
• LA: Last ACK -- Waiting for a short time while a connection that was in Close Wait is fully closed. • CL: Closed -- The connection is no longer active but the session is being tracked in case there are any retransmitted packets still pending. Priority The priority given to packets sent wirelessly over this conversation by the WISH logic. The priorities are: • BK: Background (least urgent). • BE: Best Effort. • VI: Video. • VO: Voice (most urgent).
Glossary 8 802.11 A family of specifications for wireless local area networks (WLANs) developed by a working group of the Institute of Electrical and Electronics Engineers (IEEE). A Access Control List ACL. This is a database of network devices that are allowed to access resources on the network. Access Point AP. Device that allows wireless clients to connect to it and access the network ActiveX A Microsoft specification for the interaction of software components. Address Resolution Protocol ARP.
ASCII American Standard Code for Information Interchange. This system of characters is most commonly used for text files Attenuation The loss in strength of digital and analog signals. The loss is greater when the signal is being transmitted over long distances. Authentication To provide credentials, like a Password, in order to verify that the person or device is really who they are claiming to be Automatic Private IP Addressing APIPA.
A wide band of frequencies available for transmitting data Broadcast Transmitting data in all directions at once Browser A program that allows you to access resources on the web and provides them to you graphically C Cable modem A device that allows you to connect a computer up to a coaxial cable and receive Internet access from your Cable provider CardBus A newer version of the PC Card or PCMCIA interface. It supports a 32-bit data path, DMA, and consumes less voltage CAT 5 Category 5.
DB-25 A 25 ping male connector for attaching External modems or RS-232 serial devices DB-9 A 9 pin connector for RS-232 connections dBd Decibels related to dipole antenna dBi Decibels relative to isotropic radiator dBm Decibels relative to one milliwatt Decrypt To unscramble an encrypted message back into plain text Default A predetermined value or setting that is used by a program when no user input has been entered for this value or setting Demilitarized zone DMZ: A single computer or group of computers t
To send a request from one computer to another and have the file transmitted back to the requesting computer DSL Digital Subscriber Line. High bandwidth Internet connection over telephone lines Duplex Sending and Receiving data transmissions at the sane time Dynamic DNS service Dynamic DNS is provided by companies to allow users with Dynamic IP addresses to obtain a Domain Name that will always by linked to their changing IP address.
Programming that is inserted into a hardware device that tells it how to function Fragmentation Breaking up data into smaller pieces to make it easier to store FTP File Transfer Protocol.
Hypertext Transfer Protocol is used to transfer files from HTTP servers (web servers) to HTTP clients (web browsers) HTTPS HTTP over SSL is used to encrypt and decrypt HTTP transmissions Hub A networking device that connects multiple devices together I ICMP Internet Control Message Protocol IEEE Institute of Electrical and Electronics Engineers IGMP Internet Group Management Protocol is used to make sure that computers can report their multicast group membership to adjacent routers IIS Internet Information
A type of security that scans a network to detect attacks coming from inside and outside of the network IP Internet Protocol IP address A 32-bit number, when talking about Internet Protocol Version 4, that identifies each computer that transmits data on the Internet or on an Intranet IPsec Internet Protocol Security IPX Internetwork Packet Exchange is a networking protocol developed by Novel to enable their Netware clients and servers to communicate ISP Internet Service Provider J Java A programming langua
Local Area Network A group of computers in a building that usually access files from a server LPR/LPD "Line Printer Requestor"/"Line Printer Daemon". A TCP/IP protocol for transmitting streams of printer data. M MAC Address A unique hardware ID assigned to every Ethernet adapter by the manufacturer.
NetBIOS Network Basic Input/Output System Netmask Determines what portion of an IP address designates the Network and which part designates the Host Network Interface Card A card installed in a computer or built onto the motherboard that allows the computer to connect to a network Network Layer The third layer of the OSI model which handles the routing of traffic on a network Network Time Protocol Used to synchronize the time of all the computers in a network NIC Network Interface Card NTP Network Time Prot
Ping A utility program that verifies that a given Internet address exists and can receive messages. The utility sends a control packet to the given address and waits for a response. PoE Power over Ethernet is the means of transmitting electricity over the unused pairs in a category 5 Ethernet cable POP3 Post Office Protocol 3 is used for receiving email Port A logical channel endpoint in a network.
RIP Routing Information Protocol is used to synchronize the routing table of all the routers on a network RJ-11 The most commonly used connection method for telephones RJ-45 The most commonly used connection method for Ethernet RS-232C The interface for serial communication between computers and other related devices RSA Algorithm used for encryption and authentication S Server A computer on a network that provides services and resources to other computers on the network Session key An encryption and decry
Stateful Packet Inspection SSH Secure Shell is a command line interface that allows for secure connections to remote computers SSID Service Set Identifier is a name for a wireless network Stateful inspection A feature of a firewall that monitors outgoing and incoming traffic to make sure that only valid responses to outgoing requests are allowed to pass though the firewall Subnet mask Determines what portion of an IP address designates the Network and which part designates the Host Syslog System Logger -- a
Universal Plug and Play A standard that allows network devices to discover each other and configure themselves to be a part of the network Upgrade To install a more recent version of a software or firmware product Upload To send a request from one computer to another and have a file transmitted from the requesting computer to the other UPnP Universal Plug and Play URL Uniform Resource Locator is a unique address for files accessible on the Internet USB Universal Serial Bus UTP Unshielded Twisted Pair V Vir
Wireless Distribution System. A system that enables the interconnection of access points wirelessly.
Limited Warranty TRENDnet warrants its products against defects in material and workmanship, under normal use and service, for the following lengths of time from the date of purchase. TEW-633GR 3 years If a product does not operate as warranted above during the applicable warranty period, TRENDnet shall, at its option and expense, repair the defective product or deliver to customer an equivalent product to replace the defective item. All products that are replaced will become the property of TRENDnet.