TEW-637AP User Manual Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
European Union Notice: Radio products with the CE marking comply with the R&TTE Directive (1999/5/EC), the EMC Directive (89/336/EEC) and the Low Voltage Directive (73/23/EEC) issued by the Commission of the European Community.
Package Contents z TEW-637AP wireless n AP z CAT-5 Ethernet Cable (the TEW-638AP’s Ethernet ports is Auto-MDIX) z Power Adapter (12.0V, 1.0A) z CD-ROM with Manual & Wizard z Quick Installation Guide Using a power supply with a different voltage than the one included with your product will cause damage and void the warranty for this product. Minimum System Requirements Installation Requirements • Web Browser: Internet Explorer (6 or higher) Mozilla or Safari.
Introduction The versatile 300Mbps Wireless Easy-N-Upgrader is designed to create a scalable high speed wireless n network or to connect a wired device to an existing wireless network. Use multiple 300Mbps Wireless Easy-N-Upgrader together to extend your network using Wireless Distribution System (WDS), Wireless Bridge and AP Client Modes. Expand a wireless network without running additional cabling with Wireless Distribution Service (WDS) technology by connecting multiple access points wirelessly.
Installation Considerations The TEW-637AP AP lets you access your network, using a wireless connection, from virtually anywhere within its operating range. Keep in mind, however, that the number, thickness and location of walls, ceilings, or other objects that the wireless signals must pass through, may limit the range. Typical ranges vary depending on the types of materials and background RF (radio frequency) noise in your home or business.
Using the Configuration Menu Whenever you want to configure your TEW-637AP, you can access the Configuration Menu by opening the Web-browser and typing in the IP Address of the TEW-637AP. ¾ ¾ Open the Web browser. Type in the current IP Address of the AP (i.e. http://192.168.10.100). If you have changed the default IP Address assigned to the TEW-637AP (192.168.10.100), make sure to enter the correct IP Address. ¾ ¾ ¾ Type admin in the User Name field. The Password is admin. Click Login In.
Network The Network tab provides the following configuration options: LAN Setting. Access Point This mode setting allows the TEW-637AP to work as an Access Point. This will allow for wireless connectivity from this device to other wireless clients. This mode also includes the use of the AP mode to connect Local Area Networks (LAN) together (Point to Point bridging) and extend the wireless coverage with Wireless Distribution System (WDS).
AP Client This mode setting allows the TEW-637AP to work just like a wireless adapter. By using AP Client mode, the TEW-637AP can connect to any device that has an Ethernet port (RJ-45 connector) and support for TCP/IP protocol. Devices like Network storage, network enable printers, and gaming consoles can now be wirelessly enable by connect the TEW-637AP in the AP Client mode. AP Client Mode Network LAN Setting These are the settings of the LAN (Local Area Network) interface for the Access Point.
Choose "Static IP (fixed IP)" if your router does not support DHCP or if for any other reason you need to assign a fixed address to the AP. In this case, you must also configure the following fields. IP Address The IP address of the AP on the local area network. Assign any unused IP address in the range of IP addresses available for the LAN. For example, 192.168.10.100. Subnet Mask The subnet mask of the local area network. Default Gateway The IP address of the router on the local area network.
AP Mode Support (Point to Point Bridging) Use the AP Mode setting to enable the Point to Point bridging option of the TEW-637AP. Select the radio button to toggle between the AP Mode enable or disabled the feature. To configure two AP to work together in the bridging mode, add the wireless MAC address of the remote AP in to the AP MAC Addr. (Optional) field. Perform the same process on the second AP using the wireless MAC address from the first configured AP.
AP #2 MAC Address entered here AP #1 MAC Address entered here Wireless Mode If all of the wireless devices you want to connect with this Access Point can connect in the same transmission mode, you can improve performance slightly by choosing the appropriate "Only" mode. If you have some devices that use a different transmission mode, choose the appropriate "Mixed" mode. Wireless Modes 802.11b/g mixed mode (2.4GHz) - This wireless mode works in the 2.
When you are browsing for available wireless networks, this is the name that will appear in the list (unless Broadcast Network Name is set to Disable, see below). This name is also referred to as the SSID. For security purposes, it is highly recommended to change from the pre-configured network name. Add up to three additional SSIDs to create virtual wireless networks from one wireless Access Point.
This option allows you to hide your wireless network. When this option is set to enable, your wireless network name is broadcast to anyone within the range of your signal. If you're not using encryption then they could connect to your network. When this mode is disabled, you must enter the Wireless Network Name (SSID) on the client manually to connect to the network. Frequency (Channel) A wireless network uses specific channels in the wireless spectrum to handle communication between clients.
If you have both wireless g and wireless n client devices included on your wireless network at the same time, you should choose Mixed Mode. And if you only have wireless n client devices on your wireless network, you can choose Green Field to enjoy high throughput. Channel Bandwidth The "20/40” MHz option is usually best. The other option is available for special circumstances. Guard Interval Using “Auto” option can increase throughput.
Beacon Interval Beacons are packets sent by a wireless Access Point to synchronize wireless devices. Specify a Beacon Period value between 20 and 1000. The default value is set to 100 milliseconds. Data Beacon Rate (DTIM) A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast messages. When the wireless Access Point has buffered broadcast or multicast messages for associated clients, it sends the next DTIM with a DTIM Interval value.
*Maximum wireless signal rates are referenced from IEEE 802.11 theoretical specifications.
. Wireless MAC Filter The MAC address filter section can be used to filter network access by machines based on the unique MAC addresses of their network adapter(s). It is most useful to prevent unauthorized wireless devices from connecting to your network. A MAC address is a unique ID assigned by the manufacturer of the network adapter. Policy Three policies can be selected - Disable, Allow All & Reject All.
Wireless Security SSID choice Choose the SSID which need to implement security.
Wireless WPS You can setup security easily by choosing PIN or PBC method to do Wi-Fi Protected Setup. WPS mode Two WPS modes can be selected – PIN & PBC. If PIN is selected, you should enter PIN code of your wireless client device to get wireless connection with this AP. Wireless Station List You can monitor stations which associated to this AP.
Administrator This Administrator section is used to set password for access to the Web-based management, also provide function of firmware upgrade. The Administrator tab provides the following configuration options: Management, Upload Firmware, settings, Management and Status. System Management At this page, you can configure administrator account and password.
Page 21
Administrator Upload Firmware By assigning firmware location, you can upload firmware at this page.
Administrator Settings Management You can save system settings by exporting them to a configuration file, restore them by importing the file, or reset them to factory default.
Administrator Status You can check system information and network configurations on this page.
Glossary A Access Control List ACL. This is a database of network devices that are allowed to access resources on the network. Access Point AP. Device that allows wireless clients to connect to it and access the network Ad-hoc network Peer-to-Peer network between wireless clients Address Resolution Protocol ARP. Used to map MAC addresses to IP addresses so that conversions can be made in both directions. Advanced Encryption Standard AES.
Bandwidth The maximum amount of bytes or bits per second that can be transmitted to and from a network device Beacon A data frame by which one of the stations in a Wi-Fi network periodically broadcasts network control data to other wireless stations. Bit rate The amount of bits that pass in given amount of time Bit/sec Bits per second BOOTP Bootstrap Protocol.
dBd Decibels related to dipole antenna dBi Decibels relative to isotropic radiator dBm Decibels relative to one milliwatt Decrypt To unscramble an encrypted message back into plain text Default A predetermined value or setting that is used by a program when no user input has been entered for this value or setting DHCP Dynamic Host Configuration Protocol: Used to automatically assign IP addresses from a predefined pool of addresses to computers or devices that request them Digital certificate: An electronic
Extensible Authentication Protocol Encryption Converting data into cyphertext so that it cannot be easily read Ethernet The most widely used technology for Local Area Networks.
GUI Graphical user interface H Half-duplex Data cannot be transmitted and received at the same time Hashing Transforming a string of characters into a shorter string with a predefined length Hexadecimal Characters 0-9 and A-F Hop The action of data packets being transmitted from one AP to another Host Computer on a network HTTP Hypertext Transfer Protocol is used to transfer files from HTTP servers (web servers) to HTTP clients (web browsers) HTTPS HTTP over SSL is used to encrypt and decrypt HTTP transmiss
In terms of a wireless network, this is when wireless clients use an Access Point to gain access to the network Internet A system of worldwide networks which use TCP/IP to allow for resources to be accessed from computers around the world Internet Explorer A World Wide Web browser created and provided by Microsoft Internet Protocol The method of transferring data from one computer to another on the Internet Internet Protocol Security IPsec provides security at the packet processing layer of network communic
K Kbps Kilobits per second Kbyte Kilobyte L LAN Local Area Network Latency The amount of time that it takes a packet to get from the one point to another on a network. Also referred to as delay LED Light Emitting Diode Legacy Older devices or technology Local Area Network A group of computers in a building that usually access files from a server LPR/LPD "Line Printer Requestor"/"Line Printer Daemon". A TCP/IP protocol for transmitting streams of printer data.
Management Information Base is a set of objects that can be managed by using SNMP Modem A device that Modulates digital signals from a computer to an analog signal in order to transmit the signal over phone lines.
Network Time Protocol O OFDM Orthogonal Frequency-Division Multiplexing is the modulation technique for both 802.11a and 802.
PPTP Point-to-Point Tunneling Protocol is used for creating VPN tunnels over the Internet between two networks Preamble Used to synchronize communication timing between devices on a network Q QoS Quality of Service R RADIUS Remote Authentication Dial-In User Service allows for remote users to dial into a central server and be authenticated in order to access resources on a network Reboot To restart a computer and reload it's operating software or firmware from nonvolatile storage.
Session key An encryption and decryption key that is generated for every communication session between two computers Session layer The fifth layer of the OSI model which coordinates the connection and communication between applications on both ends Simple Mail Transfer Protocol Used for sending and receiving email Simple Network Management Protocol Governs the management and monitoring of network devices SIP Session Initiation Protocol.
System Logger -- a distributed logging interface for collecting in one place the logs from different sources. Originally written for UNIX, it is now available for other operating systems, including Windows. T TCP Transmission Control Protocol TCP/IP Transmission Control Protocol/Internet Protocol TCP Raw A TCP/IP protocol for transmitting streams of printer data.
Uniform Resource Locator is a unique address for files accessible on the Internet USB Universal Serial Bus UTP Unshielded Twisted Pair V Virtual Private Network VPN: A secure tunnel over the Internet to connect remote offices or users to their company's network VLAN Virtual LAN Voice over IP Sending voice information over the Internet as opposed to the PSTN VoIP Voice over IP W Wake on LAN Allows you to power up a computer though it's Network Interface Card WAN Wide Area Network WCN Windows Connect Now.
Wireless Fidelity Wi-Fi Protected Access An updated version of security for wireless networks that provides authentication as well as encryption Wide Area Network The larger network that your LAN is connected to, which may be the Internet itself, or a regional or corporate network Wireless ISP A company that provides a broadband Internet connection over a wireless connection Wireless LAN Connecting to a Local Area Network over one of the 802.