802.11ac(draft 2.0) 3x3 Gigabit Wireless Router TEW-812DRU,TEW-800MB Rev 0.
Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
For product available in the USA/Canada market, only channel 1~11 can be operated. Selection of other channels is not possible. This device is going to be operated in 5.15~5.25GHz frequency range, it is restricted in indoor environment only. Europe – EU Declaration of Conformity This device complies with the essential requirements of the R&TTE Directive 1999/5/EC.
output power may be limited to 10 mW EIRP in the frequency range of 2454 – 2483.5 MHz. For detailed information the end-user should contact the national spectrum authority in France.
Česky [Jméno výrobce] tímto prohlašuje, že tento [typ zařízení] je ve shodě se [Czech] základními požadavky a dalšími příslušnými ustanoveními směrnice 1999/5/ES. Dansk [Danish] Undertegnede [fabrikantens navn] erklærer herved, at følgende udstyr [udstyrets typebetegnelse] overholder de væsentlige krav og øvrige relevante krav i direktiv 1999/5/EF.
Nederlan ds [Dutch] Malti [Maltese] Magyar [Hungarian] Polski [Polish] Portuguê s [Portuguese ] Slovensk o [Slovenian] Slovensk y [Slovak] Suomi [Finnish] Svenska [Swedish] Hierbij verklaart [naam van de fabrikant] dat het toestel [type van toestel] in overeenstemming is met de essentiële eisen en de andere relevante bepalingen van richtlijn 1999/5/EG.
Compliance with these directives implies conformity to the following European Norms: EN 60950 Product Safety EN 300 328 Technical requirement for radio equipment EN 301 489-1/-17 General EMC requirements for radio equipment EN 301 893 V1.5.1(2008-12) Trademark recognition All product names used in this manual are the properties of their respective owners and are acknowledged.
Getting Started with the TEW-812DRU Congratulations on purchasing the TEW-812DRU! This manual provides information for setting up and configuring the TEW-812DRU. This manual is intended for both home users and professionals. The following conventions are used in this manual: THE NOTE SYMBOL INDICATES ADDITIONAL INFORMATION ON THE TOPIC AT HAND. THE TIP SYMBOL INDICATES HELPFULL INFORMATION AND TIPS TO IMPROVE YOUR NETWORK EXPERIENCE.
Package Contents TEW-812DRU 802.11ac(draft 2.0)3x3 Gigabit Wireless Router CAT-5 Ethernet Cable (All the TEW-812DRU’s Ethernet ports are Auto-MDIX) Power Adapter (12V, 2A) CD-ROM with Software and Manual Quick Installation Guide Using a power supply with a different voltage than the one included with your product will cause damage and void the warranty for this product.
Wireless LAN Networking This section provides background information on wireless LAN networking technology. Consult the Glossary for definitions of the terminology used in this section. THE INFORMATION IN THIS SECTION IS FOR YOUR REFERENCE. CHANGING NETWORK SETTINGS AND PARTICULARLY SECURITY SETTTINGS SHOULD ONLY BE DONE BY AN AUTHORIZED ADMINISTRATOR. Transmission Rate (Transfer Rate) The TEW-812DRU provides various transmission (data) rate options for you to select.
10
When a number of wireless stations are connected using a single access point, you have a Basic Service Set (BSS). In the ESS diagram below, communication is done through the access points, which relay data packets to other wireless stations or devices connected to the wired network. Wireless stations can then access resources, such as a printer, on the wired network.
connection. In the diagram below, when the user moves from BSS (1) to BSS (2) the WLAN client devices automatically switches to the channel used in BSS (2).
Introduction The TEW-812DRU 802.11ac(draft 2.0)3x3 Gigabit Wireless Router is an high-performance, wireless router that supports high-speed wireless networking at home, at work or in public places. Unlike most routers, the TEW-812DRU provides data transfers at up to 1.3Gbps when using 11AC connection. This router is also back compatible with 802.11n or 802.11g or 11b devices. This means that you do not need to change your entire network to maintain connectivity.
Universal Plug and Play (UPnP) for auto discovery and support for device configuration of Internet applications 3- year limited warranty *Maximum wireless signal rates are referenced from IEEE 802.11 theoretical specifications. Actual data throughput and coverage will vary depending on interference, network traffic, building materials and other conditions ** Control Center utility installation required for each computer in order to access the print server ***For maximum performance of up to 1.
The TEW-812DRU 802.11ac(draft 2.0)3x3 Gigabit Wireless Router lets you access your network, using a wireless connection, from virtually anywhere within its operating range. Keep in mind, however, that the number, thickness and location of walls, ceilings, or other objects that the wireless signals must pass through, may limit the range. Typical ranges vary depending on the types of materials and background RF (radio frequency) noise in your home or business.
1. Plug in the power adapter and verify the Power & Ethernet LEDs are light. 3. To configure the router, open your browser, type 'http://192.168.10.1' into the address bar and click 'Go' to get to the setup wizard page. 4. At the Password prompt, the User name is 'admin' and password is admin.
Setup Wizard is an easy way to set up the TEW-812DRU step by step. The Wizard will teach user to set up the TEW-812DRU just few steps. 5. You could click ‘Launch Internet ConnectionSetup Wizard’ and follow Wizard to complete your setting.
If you choice “Static IP Address Connection” than press “Next” 18
Then press” Apply” 19
6.
Select the 2.
Enter your password 22
Press” Apply” 23
Network Network: WAN Setting WAN Connection Type There are several connection types to choose from: Static IP, DHCP, PPPoE, PPTP, L2TP, and Russia PPTP. If you are unsure of your connection method, please contact your Internet Service Provider. Static Used when your ISP provides you a set IP address that does not change. The IP information is manually entered in your IP configuration settings. You must enter the IP address, Subnet Mask, Gateway, Primary DNS Server, and Secondary DNS Server.
A method of connection where the ISP assigns your IP address when your router requests one from the ISP's server. Host Name: Some ISP's may check your computer's Host Name. The Host Name identifies your system to the ISP's server. PPPoE Select this option if your ISP requires you to use a PPPoE (Point to Point Protocol over Ethernet) connection. DSL providers typically use this option.
L2TP (Layer Two Tunneling Protocol) uses a virtual private network to connect to your ISP. This method of connection requires you to enter a Username and Password (provided by your Internet Service Provider) to gain access to the Internet. L2TP Server IP Address: The ISP provides this parameter, if necessary. The value may be the same as the Gateway IP Address. Reconnect Mode: Typically PPPoE connections are not always on. The router allows you to set the reconnection mode.
Static: If your ISP has assigned a fixed IP address, select this option. The ISP provides the values for the following fields for WAN Interface IP Setting: IP Address, Subnet Mask , Default Gateway, and optional for DNS Server Dynamic: If the ISP's servers assign the router's IP addressing upon establishing a connection, select this option. MAC Address Clone Each networking device has it's own unique MAC address defined by the hardware manufacturer. Some ISP's may check your computer's MAC address.
Network: LAN Setting IP Address The IP address of the this device on the local area network. Assign any unused IP address in the range of IP addresses available for the LAN. Subnet Mask The subnet mask of the local area network. Enable DHCP Server Once your router is properly configured and this option is enabled, the DHCP Server will manage the IP addresses and other network configuration information for computers and other devices connected to your Local Area Network.
The computers (and other devices) connected to your LAN also need to have their TCP/IP configuration set to "DHCP" or "Obtain an IP address automatically". When you set Enable DHCP Server, the following options are displayed. DHCP IP Address Range These two IP values (Start and End) define a range of IP addresses that the DHCP Server uses when assigning addresses to computers and devices on your Local Area Network.
router from the computer and click the Copy Your PC's MAC Address button to enter the MAC address.
Network: IPv6 Setting 6to4 6to4 is provided as a transition for migrating from IPv4 to IPv6. It allows IPv6 packets to be transmitted over an IPv4 network through the automatic tunneling technology, and routes traffic between 6to4 and IPv6 networks.
Network: QoS QoS Setup 32
There are several Maximum upload bandwidth to choose or user defined. QoS Group There are several group of QoS rate and ceil upload bandwidth to setup. QoS List You can setup QoS per different protocol Application.
Network: DHCP Client List In this section you can see the connected LAN devices are currently receiving an IP addresses.
Wireless Wireless: Basic 35
Radio On/Off This indicates the wireless operating status. The wireless can be turned on or off by the slide switch. When the radio is on, the following parameters are in effect. Wireless Mode If all of the wireless devices you want to connect with this router can connect in the same transmission mode, you can improve performance slightly by choosing the appropriate wireless mode. If you have some devices that use a different transmission mode, choose the appropriate wireless mode.
Click on apply at the bottom of the page, to apply your setting changes. Enable the security seeing in security page, each WDS APs need to use same security setting. (Note: WDS supports wireless g/n modes. The use multiple Access Point will reduces the overall network throughput to ½ the TEW-812DRU.
Wireless: Advanced Beacon Interval Beacons are packets sent by a wireless router to synchronize wireless devices. Specify a Beacon Period value between 20 and 1000. The default value is set to 100 milliseconds. DTIM A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast messages. When the wireless router has buffered broadcast or multicast messages for associated clients, it sends the next DTIM with a DTIM Interval value.
in bytes is greater than the RTS Threshold. This setting should remain at its default value of 2346 bytes. Short Preamble and Slot Using a short (400ns) guard interval can increase throughput. However, it can also increase error rate in some installations, due to increased sensitivity to radio-frequency reflections. Select the option that works best for your installation.
Wireless: Security Security Mode Unless one of these encryption modes is selected, wireless transmissions to and from your wireless network can be easily intercepted and interpreted by unauthorized users. WPABoth of these options select some variant of Wi-Fi Protected Access (WPA) -- security standards published by the Wi-Fi Alliance. The WPA Mode further refines the variant that the router should employ.
WPA if the client only supports WPA. With the "WPA2 Only" option, the router associates only with clients that also support WPA2 security. Cipher Type: The encryption algorithm used to secure the data communication. TKIP (Temporal Key Integrity Protocol) provides per-packet key generation and is based on WEP. AES (Advanced Encryption Standard) is a very secure block based encryption. With the "TKIP and AES" option, the router negotiates the cipher type with the client, and uses AES when available.
Wireless: Guest Network Guest Network Enter the SSID of Guest Network, this allow families to share their home network with friends and relatives in a controlled manner without needing to expose private Wi-Fi access codes or other personal data. A guest network is a small section of an organization's computer network designed for use by temporary visitors.
Wireless: WPS 43
Enable Enable the WPS feature. PIN Settings A PIN is a unique number that can be used to add the router to an existing network or to create a new network. The default PIN may be printed on the bottom of the router. For extra security, a new PIN can be generated. You can restore the default PIN at any time. Only the Administrator ("admin" account) can change or reset the PIN. Current PIN Shows the current value of the router's PIN. Reset To WPS Default Restore the default PIN of the router.
Wireless: Station List All the wireless clients connecting to the router will be shown here, you could monitor your network and prevent any unauthorized wireless connection easily.
Advanced Advanced: DMZ DMZ Setting DMZ means "Demilitarized Zone." If an application has trouble working from behind the router, you can expose one computer to the Internet and run the application on that computer. When a LAN host is configured as a DMZ host, it becomes the destination for all incoming packets that do not match some other incoming session or rule.
"outside the firewall". Anyone considering using a DMZ host should also consider running a firewall on that DMZ host system to provide additional protection. Packets received by the DMZ host have their IP addresses translated from the WAN-side IP address of the router to the LAN-side IP address of the DMZ host. However, port numbers are not translated; so applications on the DMZ host can depend on specific port numbers.
Advanced: Virtual Server Enable Specifies whether the entry will be active or inactive. IP Address The IP address of the system on your internal network that will provide the virtual service, for example 192.168.10.50. You can select a computer from the list of DHCP clients in the "Computer Name" drop-down menu, or you can manually enter the IP address of the server computer. Protocol Select the protocol used by the service. The common choices -- UDP, TCP -- can be selected from the drop-down menu.
Private Port The port that will be used on your internal network. Public Port The port that will be accessed from the Internet. Schedule Select a schedule for when the service will be enabled. If you do not see the schedule you need in the list of schedules.
Advanced: Routing Add/Edit Route Adds a new route to the IP routing table or edits an existing route. Destination IP The IP address of packets that will take this route. Gateway Specifies the next hop to be taken if this route is used. A gateway of 0.0.0.0 implies there is no next hop, and the IP address matched is directly connected to the router on the interface specified: LAN or WAN.
The route metric is a value from 1 to 16 that indicates the cost of using this route. A value of 1 is the lowest cost, and 15 is the highest cost. A value of 16 indicates that the route is not reachable from this router. When trying to reach a particular destination, computers on your network will select the best route, ignoring unreachable routes. Interface Specifies the interface -- LAN or WAN -- that the IP packet must use to transit out of the router, when this route is used.
Advanced: Access Control Enable By default, the Access Control feature is disabled. If you need Access Control, check this option.
Note: When Access Control is disabled, every device on the LAN has unrestricted access to the Internet. However, if you enable Access Control, Internet access is restricted for those devices that have an Access Control Policy configured for them. All other devices have unrestricted access to the Internet.
ALG Application Level Gatwway(ALG) By default, the ALG feature is enabled. ALG configuration allows users to disable some application service.
Advanced: Special Applications Add/Edit Port Trigger Rule Enable Specifies whether the entry will be active or inactive. Name Enter a name for the Special Application Rule, for example Game App, which will help you identify the rule in the future. Alternatively, you can select from the Application list of common applications.
Select the protocol used by the service. The common choices -- UDP, TCP, and both UDP and TCP -- can be selected from the drop-down menu. Trigger Port Enter the outgoing port range used by your application (for example 6500-6700). Schedule Select a schedule for when this rule is in effect. Clear Re-initialize this area of the screen, discarding any changes you have made. Port Trigger Rule List This is a list of the defined application rules.
Advanced: Gaming Add/Edit Port Range Rule Use this section to add a Port Range Rule to the following list or to edit a rule already in the list. Rule Enable Specifies whether the entry will be active or inactive. IP Address Enter the local network IP address of the system hosting the server, for example 192.168.10.50. You can select a computer from the list of DHCP clients in the "Computer Name" drop-down menu, or you can manually enter the IP address of the server computer.
Enter the TCP ports to open (for example 6159-6180, 99). UDP Ports to Open Enter the UDP ports to open (for example 6159-6180, 99). Schedule Select a schedule for the times when this rule is in effect. Clear Re-initialize this area of the screen, discarding any changes you have made.
Advanced: Filter Add/Edit Filter Rule Here you can add entries to the Filter Rules List below, or edit existing entries. Action The rule can either Allow or Deny messages. Filter Rules List The section lists the current Inbound Filter Rules. An entry can be changed by clicking the Edit icon or can be deleted by clicking the Delete icon. When you click the Edit icon, the item is highlighted, and the "Edit Filter Rule" section is activated for editing.
Permit any WAN user to access the related capability. Deny All Prevent all WAN users from accessing the related capability. (LAN users are not affected by Filter Rules.
Advanced: Schedule Add/Edit Schedule Rule In this section you can add entries to the Schedule Rules List below or edit existing entries. Name Give the schedule a name that is meaningful to you, such as "Weekday rule". Day(s) Place a checkmark in the boxes for the desired days or select the All Week radio button to select all seven days of the week. All Day - 24 hrs Select this option if you want this schedule in effect all day for the selected day(s).
If you don't use the All Day option, then you enter the time here. The start time is entered in two fields. The first box is for the hour and the second box is for the minute. Email events are normally triggered only by the start time. End Time The end time is entered in the same format as the start time. The hour in the first box and the minutes in the second box. The end time is used for most other rules, but is not normally used for email events.
Advanced: Advanced Network UPnP By default, the UPnP feature is enabled. Universal Plug and Play (UPnP) is a set of networking protocols for primarily residential networks without enterprise class devices that permits networked devices, such as personal computers, printers, Internet gateways, Wi-Fi access points and mobile devices to seamlessly discover each other's presence on the network and establish functional network services for data sharing, communications, and entertainment.
Administrator Administrator: Management Admin Password 64
Enter a password for the user "admin", who will have full access to the Web-based management interface. Device Name The name of the router can be changed here. Enable Dynamic DNS Enable this option only if you have purchased your own domain name and registered with a dynamic DNS service provider. The following parameters are displayed when the option is enabled. Dynamic DNS Provider Select a dynamic DNS service provider from the pull-down list.
Administrator: Upload Firmware Once you have a firmware update on your computer, use this option to browse for the file and then upload the information into the router.
Administrator: Setting Management Export Settings This option allows you to export and then save the router's configuration to a file on your computer. Be sure to save the configuration before performing a firmware upgrade. Import Settings Use this option to restore previously saved router configuration settings. Load Factory Defaults This option restores all configuration settings back to the settings that were in effect at the time the router was shipped from the factory.
Administrator: file sharing User Account List Enter username / password and setting permission to limit user account could read file only or could read/write file.
Administrator: Time Time Configuration Current Router Time Displays the time currently maintained by the router. If this is not correct, use the following options to configure the time correctly. Automatic Time Configuration Enable NTP Server Select this option if you want to synchronize the router's clock to a Network Time Server over the Internet. If you are using schedules or logs, this is the best way to ensure that the schedules and logs are kept accurate.
Set the Date and Time Manually If you do not have the NTP Server option in effect, you can either manually set the time for your router here.
Administrator: System log This page can be used to set remote log server and show the system log.
Administrator: Status The device status.
Glossary 8 802.11 A family of specifications for wireless local area networks (WLANs) developed by a working group of the Institute of Electrical and Electronics Engineers (IEEE). A Access Control List ACL. This is a database of network devices that are allowed to access resources on the network. Access Point AP. Device that allows wireless clients to connect to it and access the network ActiveX A Microsoft specification for the interaction of software components. Address Resolution Protocol ARP.
AARP. Used to map the MAC addresses of Apple computers to their AppleTalk network addresses, so that conversions can be made in both directions. Application layer 7th Layer of the OSI model. Provides services to applications to ensure that they can communicate properly with other applications on a network. ASCII American Standard Code for Information Interchange. This system of characters is most commonly used for text files Attenuation The loss in strength of digital and analog signals.
Bit rate The amount of bits that pass in given amount of time Bit/sec Bits per second BOOTP Bootstrap Protocol.
Information that is stored on the hard drive of your computer that holds your preferences to the site that gave your computer the cookie D Data Information that has been translated into binary so that it can be processed or moved to another device Data Encryption Standard Uses a randomly selected 56-bit key that must be known by both the sender and the receiver when information is exchanged Database Organizes information so that it can be managed updated, as well as easily accessed by users or applications
DMZ: A single computer or group of computers that can be accessed by both users on the Internet as well as users on the Local Network, but that is not protected by the same security as the Local Network.
IP address that is assigned by a DHCP server and that may change. Cable Internet providers usually use this method to assign IP addresses to their customers. E EAP Extensible Authentication Protocol Email Electronic Mail is a computer-stored message that is transmitted over the Internet Encryption Converting data into cyphertext so that it cannot be easily read Ethernet The most widely used technology for Local Area Networks.
Sending and Receiving data at the same time G Gain The amount an amplifier boosts the wireless signal Gateway A device that connects your network to another, like the internet Gbps Gigabits per second Gigabit Ethernet Transmission technology that provides a data rate of 1 billion bits per second GUI Graphical user interface H H.
HTTP over SSL is used to encrypt and decrypt HTTP transmissions Hub A networking device that connects multiple devices together I ICMP Internet Control Message Protocol IEEE Institute of Electrical and Electronics Engineers IGMP Internet Group Management Protocol is used to make sure that computers can report their multicast group membership to adjacent routers IIS Internet Information Server is a WEB server and FTP server provided by Microsoft IKE Internet Key Exchange is used to ensure security for VPN c
Intrusion Detection A type of security that scans a network to detect attacks coming from inside and outside of the network IP Internet Protocol IP address A 32-bit number, when talking about Internet Protocol Version 4, that identifies each computer that transmits data on the Internet or on an Intranet IPsec Internet Protocol Security IPX Internetwork Packet Exchange is a networking protocol developed by Novel to enable their Netware clients and servers to communicate ISP Internet Service Provider J Java
The amount of time that it takes a packet to get from the one point to another on a network. Also referred to as delay LED Light Emitting Diode Legacy Older devices or technology Local Area Network A group of computers in a building that usually access files from a server LPR/LPD "Line Printer Requestor"/"Line Printer Daemon". A TCP/IP protocol for transmitting streams of printer data. M MAC Address A unique hardware ID assigned to every Ethernet adapter by the manufacturer.
Maximum Transmission Unit is the largest packet that can be transmitted on a packet-based network like the Internet Multicast Sending data from one device to many devices on a network N NAT Network Address Translation allows many private IP addresses to connect to the Internet, or another network, through one IP address NetBEUI NetBIOS Extended User Interface is a Local Area Network communication protocol.
Orthogonal Frequency-Division Multiplexing is the modulation technique for both 802.11a and 802.
PPPoE Point-to-Point Protocol over Ethernet is used to connect multiple computers to a remote server over Ethernet PPTP Point-to-Point Tunneling Protocol is used for creating VPN tunnels over the Internet between two networks Preamble Used to synchronize communication timing between devices on a network Q QoS Quality of Service R RADIUS Remote Authentication Dial-In User Service allows for remote users to dial into a central server and be authenticated in order to access resources on a network Reboot To r
The interface for serial communication between computers and other related devices RSA Algorithm used for encryption and authentication S Server A computer on a network that provides services and resources to other computers on the network Session key An encryption and decryption key that is generated for every communication session between two computers Session layer The fifth layer of the OSI model which coordinates the connection and communication between applications on both ends Simple Mail Transfer P
SSID Service Set Identifier is a name for a wireless network Stateful inspection A feature of a firewall that monitors outgoing and incoming traffic to make sure that only valid responses to outgoing requests are allowed to pass though the firewall Subnet mask Determines what portion of an IP address designates the Network and which part designates the Host Syslog System Logger -- a distributed logging interface for collecting in one place the logs from different sources.
Communication between a single sender and receiver Universal Plug and Play A standard that allows network devices to discover each other and configure themselves to be a part of the network Upgrade To install a more recent version of a software or firmware product Upload To send a request from one computer to another and have a file transmitted from the requesting computer to the other UPnP Universal Plug and Play URL Uniform Resource Locator is a unique address for files accessible on the Internet USB Univ
WAN Wide Area Network WCN Windows Connect Now. A Microsoft method for configuring and bootstrapping wireless networking hardware (access points) and wireless clients, including PCs and other devices. WDS Wireless Distribution System. A system that enables the interconnection of access points wirelessly.
Wi-Fi Protected Access. A Wi-Fi security enhancement that provides improved data encryption, relative to WEP. X xDSL A generic term for the family of digital subscriber line (DSL) technologies, such as ADSL, HDSL, RADSL, and SDSL.