Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
- EN 301 489-1 V1.8.1: (2008-04) Electromagnetic compatibility and Radio Spectrum Matters (ERM); ElectroMagnetic Compatibility (EMC) standard for radio equipment and services; Part 1: Common technical requirements EN 301 489-17 V1.3.
Latviski [Latvian] Lietuvių [Lithuanian] Nederlands [Dutch] Malti [Maltese] Magyar [Hungarian] Polski [Polish] Português [Portuguese ] Slovensko [Slovenian] Slovensky [Slovak] Suomi [Finnish] Svenska [Swedish] Ar šo [name of manufacturer / izgatavotāja nosaukums] deklarē, ka [type of equipment / iekārtas tips] atbilst Direktīvas 1999/5/EK būtiskajām prasībām un citiem ar to saistītajiem noteikumiem.
Table of Contents 1. Getting Started with the TEW‐691GR ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ 6 1.1. 1.2. Package Contents ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ ‐‐‐‐‐‐‐ 6 Minimum System Requirements ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ 6 2. Wireless LAN Networking ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ 7 2.1. 2.2.
4.3.3 4.3.4 4.3.5 4.3.6 4.3.7 4.3.8 4.3.9 4.4. Administrator ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ 45 4.4.1 4.4.2 4.4.3 4.4.4 4.4.5 4.
1. Getting Started with the TEW-691GR Congratulations on purchasing the TEW-691GR! This manual provides information for setting up and configuring the TEW-691GR. This manual is intended for both home users and professionals. 1.1 Package Contents z TEW-691GR 2.
2. Wireless LAN Networking This section provides background information on wireless LAN networking technology. Consult the Glossary for definitions of the terminology used in this section. THE INFORMATION IN THIS SECTION IS FOR YOUR REFERENCE. CHANGING NETWORK SETTINGS AND PARTICULARLY SECURITY SETTTINGS SHOULD ONLY BE DONE BY AN AUTHORIZED ADMINISTRATOR. Transmission Rate (Transfer Rate) The TEW-691GR provides various transmission (data) rate options for you to select.
Firewall features Network Address Translation (NAT) UPnP support and ALGs Support for RTP/RTSP, SIP, FTP, TFTP NTP, SMTP, HTTPS, POP3, NetMeeting, Telnet, H.
3. Hardware Overview 3.1 LED Indications: (from left to right) WPS WLAN Reserve LAN1 LAN2 LAN3 LAN4 WAN PWR 3.
3.3 Installation Considerations The TEW-691GR 2.4GHz Wireless N Gigabit Router lets you access your network, using a wireless connection, from virtually anywhere within its operating range. Keep in mind, however, that the number, thickness and location of walls, ceilings, or other objects that the wireless signals must pass through, may limit the range. Typical ranges vary depending on the types of materials and background RF (radio frequency) noise in your home or business.
4. Using the Configuration Menu Whenever you want to configure your TEW-691GR, you can access the Configuration Menu through your PC by opening the Web-browser and typing in the IP Address of the TEW-691GR. The TEW-691GR’s default IP Address is http://192.168.10.1 ¾ ¾ Open the Web browser. Type in the IP Address of the Router (http://192.168.10.1 ) If you have changed the default IP Address assigned to the TEW-691GR, make sure to enter the correct IP Address. ¾ ¾ ¾ Select admin in the User Name field.
4.1 Network 4.1.1. Network: WAN Setting WAN Connection Type There are several connection types to choose from: Static IP, DHCP, PPPoE, PPTP, L2TP, and Russia PPTP. If you are unsure of your connection method, please contact your Internet Service Provider. Static Used when your ISP provides you a set IP address that does not change. The IP information is manually entered in your IP configuration settings. You must enter the IP address, Subnet Mask, Gateway, Primary DNS Server, and Secondary DNS Server.
On demand: A connection to the Internet is made as needed. Manual: You have to open up the Web-based management interface and click the Connect button manually any time that you wish to connect to the Internet. Maximum Idle Time: Time interval the machine can be idle before the PPPoE connection is disconnected. The Maximum Idle Time value is only used for the "On demand" and "Manual" reconnect modes. L2TP L2TP (Layer Two Tunneling Protocol) uses a virtual private network to connect to your ISP.
internal ISP’s network resources and also communicate with Internet through PPTP tunnel. It is specified by Russia Cobrina ISP, user can configure it the same as the normal PPTP and PPTP server IP Address can use the domain name string. WAN MTU Setting The Maximum Transmission Unit (MTU) is a parameter that determines the largest packet size (in bytes) that the router will send to the WAN. If LAN devices send larger packets, the router will break them into smaller packets.
4.1.2. Network: LAN Setting IP Address The IP address of the this device on the local area network. Assign any unused IP address in the range of IP addresses available for the LAN. Subnet Mask The subnet mask of the local area network.
DHCP stands for Dynamic Host Configuration Protocol. The DHCP section is where you configure the built-in DHCP Server to assign IP addresses to the computers and other devices on your local area network (LAN). Enable DHCP Server Once your router is properly configured and this option is enabled, the DHCP Server will manage the IP addresses and other network configuration information for computers and other devices connected to your Local Area Network. There is no need for you to do this yourself.
computer and the network card is already located inside the computer, you can connect to the router from the computer and click the Copy Your PC's MAC Address button to enter the MAC address. Clear Re-initialize this area of the screen, discarding any changes you have made. DHCP Reservations List This shows clients that you have specified to reserve DHCP addresses. Click the Enable checkbox at the left to directly activate or de-activate the entry.
4.1.3.
4.1.4. Network: DHCP Client List In this section you can see the connected LAN devices are currently receiving an IP addresses.
4.2 Wireless 4.2.1 Wireless: Basic Radio On/Off This indicates the wireless operating status. The wireless can be turned on or off by the slide switch. When the radio is on, the following parameters are in effect. Wireless Mode If all of the wireless devices you want to connect with this router can connect in the same transmission mode, you can improve performance slightly by choosing the appropriate wireless mode.
Note: One wireless mode can be selected can select at any one time. This means that you can only select one of the operating frequency at a time. Wireless Mode options 2.4GHz 802.11b/g mixed mode - This wireless mode works in the 2.4GHz frequency range and will allow both wireless b and wireless g client to connect and access the TEW-691GR at 11Mbps for wireless b, at 54Mbps for wireless g and share access at the same time. Although the wireless b/g operates in the 2.
Operating Mode Mixed Mode Green Field Mixed Mode: In this mode packets are transmitted with a preamble compatible with the legacy 802.11a/g, 802.11 the rest of the packet has a new format. In this mode the receiver shall be able to decode both the Mixed Mode packets and legacy packets. Green Field: In this mode high throughput packets are transmitted without a legacy compatible part. Channel BandWidth: Set channel width of wireless radio.
4.2.2 Wireless: Advanced Beacon Interval Beacons are packets sent by a wireless router to synchronize wireless devices. Specify a Beacon Period value between 20 and 1000. The default value is set to 100 milliseconds. DTIM A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast messages. When the wireless router has buffered broadcast or multicast messages for associated clients, it sends the next DTIM with a DTIM Interval value.
Increase efficiency by aggregating multiple packets of application data into a single transmission frame. In this way, 802.11n networks can send multiple data packets with the fixed overhead cost of just a single frame.
4.2.3 Wireless: Security Security Mode Unless one of these encryption modes is selected, wireless transmissions to and from your wireless network can be easily intercepted and interpreted by unauthorized users. WEP A method of encrypting data for wireless communication intended to provide the same level of privacy as a wired network. WEP is not as secure as WPA encryption. To gain access to a WEP network, you must know the key. The key is a string of characters that you create.
WPA Mode: WPA is the older standard; select this option if the clients that will be used with the router only support the older standard. WPA2 is the newer implementation of the stronger IEEE 802.11i security standard. With the "WPA2" option, the router tries WPA2 first, but falls back to WPA if the client only supports WPA. With the "WPA2 Only" option, the router associates only with clients that also support WPA2 security. Cipher Type: The encryption algorithm used to secure the data communication.
for WPA. (AES means the unicast and multicast key are all AES. TKIP/AES means multicast is TKIP. But unicast can be AES or TKIP, which depends on the peer.
4.2.
Enable Enable the WPS feature. Lock Wireless Security Settings Locking the wireless security settings prevents the settings from being changed by any new external registrar using its PIN. Devices can still be added to the wireless network using WPS. PIN Settings A PIN is a unique number that can be used to add the router to an existing network or to create a new network. The default PIN may be printed on the bottom of the router. For extra security, a new PIN can be generated.
4.2.5 Wireless: Station List All the wireless clients connecting to the router will be shown here, you could monitor your network and prevent any unauthorized wireless connection easily.
4.3 Advanced 4.3.1 Advanced: DMZ DMZ Setting DMZ means "Demilitarized Zone." If an application has trouble working from behind the router, you can expose one computer to the Internet and run the application on that computer. When a LAN host is configured as a DMZ host, it becomes the destination for all incoming packets that do not match some other incoming session or rule.
Port triggering is a special form of port forwarding, which is activated by outgoing traffic, and for which ports are only forwarded while the trigger is active. Few applications truly require the use of the DMZ host. Following are examples of when a DMZ host might be required: ‧ A host needs to support several applications that might use overlapping ingress ports such that two port forwarding rules cannot be used because they would potentially be in conflict.
4.3.2 Advanced: Virtual Server Enable Specifies whether the entry will be active or inactive. Name Assign a meaningful name to the virtual server, for example Web Server. Several well-known types of virtual server are available from the "Application Name" drop-down list. Selecting one of these entries fills some of the remaining parameters with standard values for that type of server. IP Address The IP address of the system on your internal network that will provide the virtual service, for example 192.
Select a schedule for when the service will be enabled. If you do not see the schedule you need in the list of schedules. Clear Re-initialize this area of the screen, discarding any changes you have made.
4.3.3 Advanced: Routing Add/Edit Route Adds a new route to the IP routing table or edits an existing route. Destination IP The IP address of packets that will take this route. Gateway Specifies the next hop to be taken if this route is used. A gateway of 0.0.0.0 implies there is no next hop, and the IP address matched is directly connected to the router on the interface specified: LAN or WAN. Metric The route metric is a value from 1 to 16 that indicates the cost of using this route.
Clear Re-initialize this area of the screen, discarding any changes you have made. Routes List The section shows the current routing table entries. Certain required routes are predefined and cannot be changed. Routes that you add can be changed by clicking the Edit icon or can be deleted by clicking the Delete icon. When you click the Edit icon, the item is highlighted, and the "Edit Route" section is activated for editing. Click the Enable checkbox at the left to directly activate or de-activate the entry.
4.3.4 Advanced: Access Control Enable By default, the Access Control feature is disabled. If you need Access Control, check this option. Note: When Access Control is disabled, every device on the LAN has unrestricted access to the Internet. However, if you enable Access Control, Internet access is restricted for those devices that have an Access Control Policy configured for them. All other devices have unrestricted access to the Internet.
4.3.5 Advanced: Special Applications Add/Edit Port Trigger Rule Enable Specifies whether the entry will be active or inactive. Name Enter a name for the Special Application Rule, for example Game App, which will help you identify the rule in the future. Alternatively, you can select from the Application list of common applications. Protocol Select the protocol used by the service. The common choices -- UDP, TCP, and both UDP and TCP -- can be selected from the drop-down menu.
Schedule Select a schedule for when this rule is in effect. Clear Re-initialize this area of the screen, discarding any changes you have made. Port Trigger Rule List This is a list of the defined application rules. Click the Enable checkbox at the left to directly activate or de-activate the entry. An entry can be changed by clicking the Edit icon or can be deleted by clicking the Delete icon.
4.3.6 Advanced: Gaming Add/Edit Port Range Rule Use this section to add a Port Range Rule to the following list or to edit a rule already in the list. Rule Enable Specifies whether the entry will be active or inactive. Rule Name Give the rule a name that is meaningful to you, for example Game Server. You can also select from a list of popular games, and many of the remaining configuration values will be filled in accordingly.
Schedule Select a schedule for the times when this rule is in effect. Clear Re-initialize this area of the screen, discarding any changes you have made. Port Range Rule List This is a list of the defined Port Range Rules. Click the Enable checkbox at the left to directly activate or de-activate the entry. An entry can be changed by clicking the Edit icon or can be deleted by clicking the Delete icon.
4.3.7 Advanced: Inbound Filter Add/Edit Inbound Filter Rule Here you can add entries to the Inbound Filter Rules List below, or edit existing entries. Name Enter a name for the rule that is meaningful to you. Action The rule can either Allow or Deny messages. Remote IP Range Define the ranges of Internet addresses this rule applies to. For a single IP address, enter the same address in both the Start and End boxes. Up to eight ranges can be entered.
4.3.8 Advanced: Schedule Add/Edit Schedule Rule In this section you can add entries to the Schedule Rules List below or edit existing entries. Name Give the schedule a name that is meaningful to you, such as "Weekday rule". Day(s) Place a checkmark in the boxes for the desired days or select the All Week radio button to select all seven days of the week. All Day - 24 hrs Select this option if you want this schedule in effect all day for the selected day(s).
4.3.
Administrator 4.4.1 Administrator: Management Admin Password Enter a password for the user "admin", who will have full access to the Web-based management interface. Device Name The name of the router can be changed here.
Enable this option only if you have purchased your own domain name and registered with a dynamic DNS service provider. The following parameters are displayed when the option is enabled. Dynamic DNS Provider Select a dynamic DNS service provider from the pull-down list. Host Name Enter your host name, fully qualified; for example: myhost.mydomain.net. Account Enter the account provided by your service provider. If the Dynamic DNS provider supplies only a key, enter that key in all three fields.
4.4.2 Administrator: Upload Firmware Once you have a firmware update on your computer, use this option to browse for the file and then upload the information into the router.
4.4.3 Administrator: Setting Management Export Settings This option allows you to export and then save the router's configuration to a file on your computer. Be sure to save the configuration before performing a firmware upgrade. Import Settings Use this option to restore previously saved router configuration settings. Load Factory Defaults This option restores all configuration settings back to the settings that were in effect at the time the router was shipped from the factory.
4.4.4 Administrator: Time Time Configuration Current Router Time Displays the time currently maintained by the router. If this is not correct, use the following options to configure the time correctly. Time Zone Select your local time zone from pull down menu. Automatic Time Configuration Enable NTP Server Select this option if you want to synchronize the router's clock to a Network Time Server over the Internet.
4.4.5 Administrator: Status The device status.
4.4 Help Help section provides web-based explanations on each configurable field.
Network Glossary Access Point - A device that allows wireless-equipped computers and other devices to communicate with a wired network. also used to expand the range of a wireless network. AES (Advanced Encryption Standard) - A security method that uses symmetric 128-bit block data encryption. Bandwidth - The transmission capacity of a given device or network. Bit - A binary digit. Boot - To start a device and cause it to start executing instructions. Broadband - An always-on, fast Internet connection.
Full Duplex - The ability of a networking device to receive and transmit data simultaneously. Gateway - A device that interconnects networks with different, incompatible communications protocols. Half Duplex - Data transmission that can occur in two directions over a single line, but only one direction at a time. HTTP (HyperText Transport Protocol) - The communications protocol used to connect to servers on the World Wide Web.
SMTP (Simple Mail Transfer Protocol) - The standard e-mail protocol on the Internet. SNMP (Simple Network Management Protocol) - A widely used network monitoring and control protocol. SPI (Stateful Packet Inspection) Firewall - A technology that inspects incoming packets of information before allowing them to enter the network. SSID (Service Set IDentifier) - Wireless network's name. Static IP Address - A fixed assigned address to a computer or device that is connected to a network.
Limited Warranty TRENDnet warrants its products against defects in material and workmanship, under normal use and service, for the following lengths of time from the date of purchase. TEW-691GR 3 years If a product does not operate as warranted above during the applicable warranty period, TRENDnet shall, at its option and expense, repair the defective product or deliver to customer an equivalent product to replace the defective item. All products that are replaced will become the property of TRENDnet.
INDIRECT, SPECIAL, OR PUNITIVE DAMAGES OF ANY KIND, OR FOR LOSS OF REVENUE OR PROFITS, LOSS OF BUSINESS, LOSS OF INFORMATION OR DATE, OR OTHER FINANCIAL LOSS ARISING OUT OF OR IN CONNECTION WITH THE SALE, INSTALLATION, MAINTENANCE, USE, PERFORMANCE, FAILURE, OR INTERRUPTION OF THE POSSIBILITY OF SUCH DAMAGES, AND LIMITS ITS LIABILITY TO REPAIR, REPLACEMENT, OR REFUND OF THE PURCHASE PRICE PAID, AT TRENDNET’S OPTION.