Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
Table of Contents Getting Started with the TEW-611BRP ………….....................3 Package Contents ......................................................................4 Minimum System Requirements ................................. …………4 Wireless LAN Networking ........................................................6 Introduction ...............................................................................7 Features .....................................................................................
Getting Started with the TEW-611BRP Congratulations on purchasing the TEW-611BRP! This manual provides information for setting up and configuring the TEW-611BRP. This manual is intended for both home users and professionals. The following conventions are used in this manual: THE NOTE SYMBOL INDICATES ADDITIONAL INFORMATION ON THE TOPIC AT HAND. THE TIP SYMBOL INDICATES HELPFULL INFORMATION AND TIPS TO IMPROVE YOUR NETWORK EXPERIENCE.
Package Contents z TEW-611BRP 108Mbps 11g MIMO Wireless Router z Power Adapter (5V DC, 2A) z CD-ROM with Software and Manual z Quick Installation Guide z Cat.5 Ethernet Cable Using a power supply with a different voltage than the one included with your product will cause damage and void the warranty for this product.
Wireless LAN Networking This section provides background information on wireless LAN networking technology. Consult the “Glossary” for definitions of the terminology used in this section. THE INFORMATION IN THIS SECTION IS FOR YOUR REFERENCE. CHANGING NETWORK SETTINGS AND PARTICULARLY SECURITY SETTTINGS SHOULD ONLY BE DONE BY AN AUTHORIZED ADMINISTRATOR.
Introduction The TEW-611BRP MIMO Wireless Router is an 802.11g high-performance, wireless router that supports high-speed wireless networking at home, at work or in public places. Unlike most routers, the TEW-611BRP provides data transfers at up to 108 Mbps (compared to the standard 54Mbps) when used with other Super G MIMO products. The 802.11g standard is backwards compatible with 802.11b products. This means that you do not need to change your entire network to maintain connectivity.
Hardware Overview Real Panel DC-IN The DC power input connector is a single jack socket to supply power to the TEW-611BRP. Please use the Power Adapter provided on the TEW-611BRP package. Auto-MDIX LAN Ports These ports automatically sense the cable type when connecting to Ethernet-enabled computers. Auto-MDIX WAN Port This is the connection for the Ethernet cable to the Cable or DSL modem WLAN Slide Switch Turn ON/OFF of wireless function.
LEDs POWER LED A solid light indicates a proper connection to the power supply. LAN1~LAN4 LED A solid light indicates a connection to an Ethernet-enabled computer on ports 1-4. This LED blinks during data transmission. WAN LED A solid light indicates connection on the WAN port. This LED blinks during data transmission. WLAN LED A solid light indicates that the wireless segment is ready. This LED blinks during wireless data transmission.
Installation Considerations The TEW-611BRP MIMO Wireless Router lets you access your network, using a wireless connection, from virtually anywhere within its operating range. Keep in mind, however, that the number, thickness and location of walls, ceilings, or other objects that the wireless signals must pass through, may limit the range. Typical ranges vary depending on the types of materials and background RF (radio frequency) noise in your home or business.
Using the Configuration Menu Whenever you want to configure your TEW-611BRP, you can access the Configuration Menu by opening the Web-browser and typing in the IP Address of the TEW-611BRP. The TEW-611BRP’s default IP Address is http://192.168.0.1 ¾ ¾ Open the Web browser. Type in the IP Address of the Router (http://192.168.0.1). If you have changed the default IP Address assigned to the TEW-611BRP, make sure to enter the correct IP Address. ¾ ¾ ¾ Type admin in the User Name field.
Basic The Basic tab provides the following configuration options: Wizard, WAN, LAN, DHCP, and Wireless.
Wireless Security Setup Wizard This wizard guides you through the following steps for setting up security for your wireless network: • Name your Wireless Network • Secure your Wireless Network Basic_WAN The WAN (Wide Area Network) section is where you configure your Internet Connection type. There are several connection types to choose from: Static IP, DHCP, PPPoE, PPTP, L2TP, and BigPond. If you are unsure of your connection method, please contact your Internet Service Provider.
Static WAN Mode Used when your ISP provides you a set IP address that does not change. The IP information is manually entered in your IP configuration settings. You must enter the IP address, Subnet Mask, Gateway, Primary DNS Server, and Secondary DNS Server. Your ISP provides you with all of this information. DHCP WAN Mode A method of connection where the ISP assigns your IP address when your router requests one from the ISP's server.
• Always on: A connection to the Internet is always maintained. • On demand: A connection to the Internet is made as needed. • Manual: You have to open up the Web-based management interface and click the Connect button manually any time that you wish to connect to the Internet. Maximum Idle Time: Time interval the machine can be idle before the PPTP connection is disconnected. The Maximum Idle Time value is only used for the "On demand" connection mode.
IP address of the router not to respond to ping commands. Pinging public WAN IP addresses is a common method used by hackers to test whether your WAN IP address is valid. WAN Ping Inbound Filter: Select a filter that controls access as needed for WAN pings. If you do not see the filter you need in the list of filters, go to the Advanced -> Inbound Filter screen and create a new filter. MAC Cloning Enabled: Some ISP's may check your computer's MAC address.
Basic_LAN These are the settings of the LAN (Local Area Network) interface for the router. The router's local network (LAN) settings are configured based on the IP Address and Subnet Mask assigned in this section. The IP address is also used to access this Web-based management interface. It is recommended that you use the default settings if you do not have an existing network. IP Address. The IP address of your router on the local area network.
Basic_DHCP DHCP stands for Dynamic Host Configuration Protocol. The DHCP section is where you configure the built-in DHCP Server to assign IP addresses to the computers and other devices on your local area network (LAN). Enable DHCP Server Once your Wireless router is properly configured and this option is enabled, the DHCP Server will manage the IP addresses and other network configuration information for computers and other devices connected to your Local Area Network.
DHCP IP Address Range These two values (from and to) define a range of addresses that the DHCP Server uses when assigning addresses to computers and devices on your Local Area Network. Any addresses that are outside of this range are not managed by the DHCP Server; these could, therefore, be used for manually configured devices or devices that cannot use DHCP to obtain network address details automatically.
or nearly full, you need to recover space in the table for new entries, and you know that some of the currently allocated leases are no longer needed. Clicking Revoke cancels the lease for a specific LAN device and frees an entry in the lease table. Do this only if the device no longer needs the leased IP address, because, for example, it has been removed from the network.
Basic_Wireless The wireless section is used to configure the wireless settings for your Wireless router. Please note that changes made on this section may also need to be duplicated on your Wireless Client. To protect your privacy, use the wireless security mode to configure the wireless security features. This device supports three wireless security modes including: WEP, WPA-Personal, and WPA-Enterprise. WEP is the original wireless encryption standard. WPA provides a higher level of security.
Wireless Network Name When you are browsing for available wireless networks, this is the name that will appear in the list (unless Visibility Status is set to Invisible, see below). This name is also referred to as the SSID. For security purposes, it is highly recommended to change from the pre-configured network name. Visibility Status The Invisible option allows you to hide your wireless network.
WEP A method of encrypting data for wireless communication intended to provide the same level of privacy as a wired network. WEP is not as secure as WPA encryption. To gain access to a WEP network, you must know the key. The key is a string of characters that you create. When using WEP, you must determine the level of encryption. The type of encryption determines the key length. 128-bit encryption requires a longer key than 64-bit encryption.
to generate session keys that are unique for each wireless client. Example: Wireless Networking technology enables ubiquitous communication WPA-Enterprise This option works with a RADIUS Server to authenticate wireless clients. Wireless clients should have established the necessary credentials before attempting to authenticate to the Server through this Gateway. Furthermore, it may be necessary to configure the RADIUS Server to allow this Gateway to authenticate users.
Advanced The Advanced tab provides the following configuration options: Virtual Server, Special Applications, Gaming, Traffic Shaping, Routing, Access Control, WEB Filter, MAC Address Filter, Firewall, Inbound Filter, Advanced Wireless and Schedules. Advanced_Virtual Server The Virtual Server option gives Internet users access to services on your LAN. This feature is useful for hosting online services such as FTP, Web, or game servers.
5. Select the Protocol - TCP 6. Ensure the schedule is set to Always 7. Click Save to add the settings to the Virtual Servers List 8. Repeat these steps for each Virtual Server Rule you wish to add. After the list is complete, click Save Settings at the top of the page. With this Virtual Server entry, all Internet traffic on Port 8888 will be redirected to your internal web server on port 80 at IP Address 192.168.0.50.
virtual server entries, you must still click the Save Settings button at the top of the page to make the changes effective and permanent. Virtual Servers List The section shows the currently defined virtual servers. A Virtual Server can be changed by clicking the Edit icon, or deleted by clicking the Delete icon. When you click the Edit icon, the item is highlighted, and the "Edit Virtual Server" section is activated for editing.
Application Level Gateway (ALG) Configurations Here you can enable or disable ALGs. Some protocols and applications require special handling of the IP payload to make them work with network address translation (NAT). Each ALG provides special handling for a specific protocol or application. A number of ALGs for common applications are enabled by default. PPTP Allows multiple machines on the LAN to connect to their corporate network using PPTP protocol.
192.168.0.255. The computer on the LAN whose MAC address is contained in the magic packet will be awakened. AOL Use this ALG if you are experiencing frequent disconnects from the AOL server due to inactivity. MMS Allows Windows Media Player, using MMS protocol, to receive streaming media from the internet. L2TP Allows multiple machines on the LAN to connect to their corporate network using the L2TP protocol.
Saves the new or edited Special Applications Rule in the following list. When finished updating the special applications rules, you must still click the Save Settings button at the top of the page to make the changes effective and permanent.
Edit/Add Game Rule Here you can add entries to the Game Rules List below, or edit existing entries. Example: You are hosting an online game server that is running on a PC with a Private IP Address of 192.168.0.50. This game requires that you open multiple ports (6159-6180, 99) on the router so Internet users can connect. Enable Each entry in Game Rules List can be active (enabled) or inactive (disabled) Name Give the Gaming Rule a name that is meaningful to you, for example Game Server.
Advanced_Traffic Shaping The Traffic Shaping™ feature helps improve your network gaming performance by prioritizing applications. By default, the Traffic Shaping settings are disabled.
Traffic Shaping Setup Enable Traffic Shaping This option is disabled by default. Enable it for better performance and experience with online games and other interactive applications, such as VoIP. Automatic Classification This option is enabled by default so that your router will automatically determine which programs should have network priority. Dynamic Fragmentation This option should be enabled when you have a slow Internet uplink.
displayed here. Add/Edit Traffic Shaping Rule Automatic classification will be adequate for most applications, and specific Traffic Shaping Rules will not be required. A Traffic Shaping Rule identifies a specific message flow and assigns a priority to that flow. Enable Each entry in Traffic Shaping Rules List can be active (enabled) or inactive (disabled) Name Create a name for the rule that is meaningful to you. Priority The priority of the message flow is entered here.
Advanced_Routing Add/Edit Route Adds a new route to the IP routing table or edits an existing route. Enable: Specifies whether the entry will be enabled or disabled. Destination IP: The IP address of packets that will take this route. Netmask: One bits in the mask specify which bits of the IP address must match. Gateway: Specifies the next hop to be taken if this route is used. A gateway of 0.0.0.
Advanced_Access Control The Access Control section allows you to control access in and out of devices on your network. Use this feature as Parental Controls to only grant access to approved sites, limit web access based on time or dates, and/or block access from applications such as peer-to-peer utilities or games. Enable By default, the Access Control feature is disabled. If you need Access Control, check this option, and you will see the following configuration sections.
Add/Edit Access Control Rule Access Control Rules specify what a LAN device is allowed to access. Here you can add entries to the Access Control Rules List or edit existing entries. Enable Each entry in Access Control Rules List can be active (enabled) or inactive (disabled) Policy Name Create a name for this access control policy (rule) that is meaningful to you. Typically this would be a system name or user name; for example "Casey's PC".
Access Control Rules List This section shows the current access control rules. Rules can be changed by clicking the Edit icon, or deleted by clicking the Delete icon. When you click the Edit icon, the item is highlighted, and the "Edit Access Control Rule" section is activated for editing. Advanced_WEB Filter The Web Filter section is where you add the Web sites to be used for Access Control.
doubleclick.net. Save Saves the new or edited Allowed Web Site in the following list. When finished updating the Allowed Web Site List, you must still click the Save Settings button at the top of the page to make the changes effective and permanent. Allowed Web Site List The section lists the currently allowed web sites. An allowed web site can be changed by clicking the Edit icon, or deleted by clicking the Delete icon.
Note: Misconfiguration of this feature can prevent any machine from accessing the network. In such a situation, you can regain access by activating the factory defaults button on the router itself. Filter Settings Mode When "only allow listed machines" is selected, only computers with MAC addresses listed in the MAC Address List are granted network access. When "only deny listed machines" is selected, any computer with a MAC address listed in the MAC Address List is refused access to the network.
Advanced_Firewall Enable SPI SPI ("stateful packet inspection" also known as "dynamic packet filtering") helps to prevent cyberattacks by tracking more state per session. It validates that the traffic passing through that session conforms to the protocol. When SPI is enabled, the extra state information will be reported on the Status -> Active Sessions page. Enable DMZ DMZ means "Demilitarized Zone.
Advanced_Inbound Filter The Inbound Filter option is an advanced method of controlling data received from the Internet. With this feature you can configure inbound data filtering rules that control data based on IP Address. Inbound Filters can be used for limiting access to a server on your network to a system or group of systems. Filter rules can be used with Virtual Server, Gaming, or Remote Administration features.
Source IP Range Define the ranges of Internet addresses this rule applies to. For a single IP address, enter the same address in both the Start and End boxes. Up to eight ranges can be entered. The Enable checkbox allows you to turn on or off specific entries in the list of ranges. Save Saves the new or edited Inbound Filter Rule in the following list. When finished updating the Inbound Filter Rules List, you must still click the button at the top of the page to make the changes effective and permanent.
Fragmentation Threshold This setting should remain at its default value of 2346. Setting the Fragmentation value too low may result in poor performance. RTS Threshold This setting should remain at its default value of 2346. If you encounter inconsistent data flow, only minor modifications to the value are recommended. Beacon Period Beacons are packets sent by a wireless router to synchronize wireless devices. Specify a Beacon Period value between 20 and 1000. The default value is set to 100 milliseconds.
Advanced_Schedules Schedules can be created for use with enforcing rules. For example, if you want to restrict web access to Mon-Fri from 3pm to 8pm, you could create a schedule selecting Mon, Tue, Wed, Thu, and Fri and enter a Start Time of 3pm and End Time of 8pm. Add/Edit Schedule Rule In this section you can add entries to the Schedule Rules List below or edit existing entries. Name Give the schedule a name that is meaningful to you, such as "Weekday rule".
End Time The end time is entered in the same format as the start time. The hour in the first box and the minutes in the second box. The end time is used for most other rules, but is not used for email events. Save Saves the new or edited Schedule Rule in the following list. When finished updating the Schedule Rules, you must still click the button at the top of the page to make the changes effective and permanent. Schedule Rules List The section shows the currently defined Schedule Rules.
Tools The Tools tab provides the following configuration options: Admin, Time, Syslog, Email, System, Firmware and Dynamic DNS. Tools_Admin The Admin option is used to set a password for access to the Web-based management. By default there is no password configured. It is highly recommended that you create a password to keep your new router secure.
Admin Password Enter a password for the user "admin", who will have full access to the Web-based management interface. User Password Enter a password for the user "user", who will have read-only access to the Web-based management interface. Router Name The name of the router can be changed here. Enable Remote Management Enabling Remote Management allows you to manage the router from anywhere on the Internet. Disabling Remote Management allows you to manage the router only from computers on your LAN.
-> Internet Options -> Security -> Custom Level -> Medium). Click the Save to Windows Connect Now button, and the WCN technology will capture the wireless network settings from your router and save them on your PC. Note that WCN only saves a few of the wireless security settings. When you use WCN to propagate settings to other wireless devices, you may have to make additional settings manually on those devices.
Time Configuration Time Zone Select your local time zone from pull down menu. Daylight Saving Enable Check this option if your location observes daylight saving time. Daylight Saving Offset Select the time offset, if your location observes daylight saving time. DST Start and DST End Select the starting and ending times for the change to and from daylight saving time. For example, suppose for DST Start you select Month="Oct", Week="3rd", Day="Sun" and Time="2am".
Tools_Syslog This section allows you to archive your log files to a Syslog Server. Enable Logging to Syslog Server Enable this option if you have a syslog server currently running on the LAN and wish to send log messages to it. Enabling this option causes the following parameter to be displayed. Syslog Server IP Address Enter the LAN IP address of the Syslog Server.
Tools_Email The Email feature can be used to send the system log files, router alert messages, and firmware update notification to your email address. Enable Enable Email Notification When this option is enabled, router activity logs or firmware upgrade notifications can be emailed to a designated email address, and the following parameters are displayed. Email Settings From Email Address This email address will appear as the sender when you receive a log file or firmware upgrade notification via email.
SMTP Server Address Enter the SMTP server address for sending email. Enable Authentication If your SMTP server requires authentication, select this option. Account Name Enter your account for sending email. Password Enter the password associated with the account. Verify Password Re-type the password associated with the account. Email Log When Full or on Schedule On Log Full Select this option if you want logs to be sent by email when the log is full.
Tools_System This section allows you to reboot the device, and restore the router to the factory default settings. Restoring the unit to the factory default settings will erase all settings, including any rules that you've created. Reboot the Device This restarts the router. Useful for restarting when you are not near the device.
Firmware Information Here are displayed the version numbers of the firmware currently installed in your router and the most recent upgrade that is available. Firmware Upgrade Note: Firmware upgrade cannot be performed from a wireless device. To perform an upgrade, ensure that you are using a PC that is connected to the router by wire. Note: Some firmware upgrades reset the router's configuration options to the factory defaults.
Tools_Dynamic DNS The Dynamic DNS feature allows you to host a server (Web, FTP, Game Server, etc.) using a domain name that you have purchased (www.whateveryournameis.com) with your dynamically assigned IP address. Most broadband Internet Service Providers assign dynamic (changing) IP addresses. When you use a Dynamic DNS service provider, your friends can enter your domain name to connect to your server, no matter what your IP address is.
Password or Key Enter the password or key provided by your service provider. If the Dynamic DNS provider supplies only a key, enter that key in all three fields. Verify Password or Key Re-type the password or key provided by your service provider. If the Dynamic DNS provider supplies only a key, enter that key in all three fields. Timeout The time between periodic updates to the Dynamic DNS, if your dynamic IP address has not changed. The timeout period is entered in hours.
Status The Status tab provides the following configuration options: Device Info, Wireless, Routing, Logs, Statistics and Active Sessions. Status_Device info All of your Internet and network connection details are displayed on the Device Info page. The firmware version is also displayed here. Some browsers have limitations that make it impossible to update the WAN status display when the status changes. Some browsers require that you refresh the display to obtain updated status.
DHCP Connection Click the DHCP Release button to release the router's IP address. The router will not respond to IP messages from the WAN side until you click the DHCP Renew button or power-up the router again. Clicking the DHCP Renew button causes the router to request a new IP address from the ISP's server.
Signal This is a relative measure of signal quality. The value is expressed as a percentage of theoretical best quality. Signal quality can be reduced by distance, by interference from other radio-frequency sources (such as cordless telephones or neighboring wireless networks), and by obstacles between the router and the wireless device. Status_Routing The routing section displays all of the routing details configured for your router. A value of 0.0.0.
Status_Logs The router automatically logs (records) events of possible interest in its internal memory. If there is not enough internal memory for all events, logs of older events are deleted, but logs of the latest events are retained. The Logs option allows you to view the router logs. You can define what types of events you want to view and the level of events to view.
Apply Log Settings Now Click this button after changing Log Options to make them effective and permanent. Refresh Clicking this button refreshes the display of log entries. There may be new events since the last time you accessed the log. Clear Clicking this button erases all log entries. Email Now If you provided email information with the Tools -> Email screen, clicking the Email Now button sends the router log to the configured email address.
Sent The number of packets sent from the router. Received The number of packets received by the router. TX Packets Dropped The number of packets that were dropped while being sent, due to errors, collisions, or router resource limitations. RX Packets Dropped The number of packets that were dropped while being received, due to errors, collisions, or router resource limitations.
Protocol The communications protocol used for the conversation. External The IP address and port number of the WAN-side application. NAT The port number of the LAN-side application as viewed by the WAN-side application. Priority The preference given to outbound packets of this conversation by the Traffic Shaping logic. Smaller numbers represent higher priority. State When SPI (Stateful Packet Inspection) is enabled, this is the state for sessions that use the TCP protocol.
Glossary A Access Control List ACL. This is a database of network devices that are allowed to access resources on the network. Access Point AP. Device that allows wireless clients to connect to it and access the network ActiveX A Microsoft specification for the interaction of software components. Ad-hoc network Peer-to-Peer network between wireless clients Address Resolution Protocol ARP. Used to map MAC addresses to IP addresses so that conversions can be made in both directions.
American Standard Code for Information Interchange. This system of characters is most commonly used for text files Attenuation The loss in strength of digital and analog signals. The loss is greater when the signal is being transmitted over long distances. Authentication To provide credentials, like a Password, in order to verify that the person or device is really who they are claiming to be Automatic Private IP Addressing APIPA.
A time during processes when something causes the process to slowdown or stop all together Broadband A wide band of frequencies available for transmitting data Broadcast Transmitting data in all directions at once Browser A program that allows you to access resources on the web and provides them to you graphically C Cable modem A device that allows you to connect a computer up to a coaxial cable and receive Internet access from your Cable provider CardBus A newer version of the PC Card or PCMCIA interface.
The second layer of the OSI model. Controls the movement of data on the physical link of a network Database Organizes information so that it can be managed updated, as well as easily accessed by users or applications.
"Demilitarized Zone". A computer that logically sits in a "no-mans land" between the LAN and the WAN. The DMZ computer trades some of the protection of the router's security mechanisms for the convenience of being directly addressable from the Internet.
A way of sending data through light impulses over glass or plastic wire or fiber File server A computer on a network that stores data so that the other computers on the network can all access it File sharing Allowing data from computers on a network to be accessed by other computers on the network with different levels of access rights Firewall A device that protects resources of the Local Area Network from unauthorized users outside of the local network Firmware Programming that is inserted into a hardware
A standard that provides consistency of voice and video transmissions and compatibility for videoconferencing devices Half-duplex Data cannot be transmitted and received at the same time Hashing Transforming a string of characters into a shorter string with a predefined length Hexadecimal Characters 0-9 and A-F Hop The action of data packets being transmitted from one router to another Host Computer on a network HTTP Hypertext Transfer Protocol is used to transfer files from HTTP servers (web servers) to HT
Infrastructure In terms of a wireless network, this is when wireless clients use an Access Point to gain access to the network Internet A system of worldwide networks which use TCP/IP to allow for resources to be accessed from computers around the world Internet Explorer A World Wide Web browser created and provided by Microsoft Internet Protocol The method of transferring data from one computer to another on the Internet Internet Protocol Security IPsec provides security at the packet processing layer of n
Java A programming language used to create programs and applets for web pages K Kbps Kilobits per second Kbyte Kilobyte L LAN Local Area Network Latency The amount of time that it takes a packet to get from the one point to another on a network. Also referred to as delay LED Light Emitting Diode Legacy Older devices or technology Local Area Network A group of computers in a building that usually access files from a server LPR/LPD "Line Printer Requestor"/"Line Printer Daemon".
MDIX Medium Dependent Interface Crossover, is an Ethernet port for a connection to a crossover cable MIB Management Information Base is a set of objects that can be managed by using SNMP Modem A device that Modulates digital signals from a computer to an analog signal in order to transmit the signal over phone lines.
Network Time Protocol Used to synchronize the time of all the computers in a network NIC Network Interface Card NTP Network Time Protocol O OFDM Orthogonal Frequency-Division Multiplexing is the modulation technique for both 802.11a and 802.
Port A logical channel endpoint in a network. A computer might have only one physical channel (its Ethernet channel) but can have multiple ports (logical channels) each identified by a number.
RJ-45 The most commonly used connection method for Ethernet RS-232C The interface for serial communication between computers and other related devices RSA Algorithm used for encryption and authentication S Server A computer on a network that provides services and resources to other computers on the network Session key An encryption and decryption key that is generated for every communication session between two computers Session layer The fifth layer of the OSI model which coordinates the connection and com
Secure Shell is a command line interface that allows for secure connections to remote computers SSID Service Set Identifier is a name for a wireless network Stateful inspection A feature of a firewall that monitors outgoing and incoming traffic to make sure that only valid responses to outgoing requests are allowed to pass though the firewall Subnet mask Determines what portion of an IP address designates the Network and which part designates the Host Syslog System Logger -- a distributed logging interface
Universal Plug and Play A standard that allows network devices to discover each other and configure themselves to be a part of the network Upgrade To install a more recent version of a software or firmware product Upload To send a request from one computer to another and have a file transmitted from the requesting computer to the other UPnP Universal Plug and Play URL Uniform Resource Locator is a unique address for files accessible on the Internet USB Universal Serial Bus UTP Unshielded Twisted Pair V Virt
Windows Connect Now. A Microsoft method for configuring and bootstrapping wireless networking hardware (access points) and wireless clients, including PCs and other devices. WDS Wireless Distribution System. A system that enables the interconnection of access points wirelessly.
Limited Warranty TRENDware warrants its products against defects in material and workmanship, under normal use and service, for the following lengths of time from the date of purchase.
LIMITATION OF LIABILITY: TO THE FULL EXTENT ALLOWED BY LAW TRENDWARE ALSO EXCLUDES FOR ITSELF AND ITS SUPPLIERS ANY LIABILITY, WHETHER BASED IN CONTRACT OR TORT (INCLUDING NEGLIGENCE), FOR INCIDENTAL, CONSEQUENTIAL, INDIRECT, SPECIAL, OR PUNITIVE DAMAGES OF ANY KIND, OR FOR LOSS OF REVENUE OR PROFITS, LOSS OF BUSINESS, LOSS OF INFORMATION OR DATE, OR OTHER FINANCIAL LOSS ARISING OUT OF OR IN CONNECTION WITH THE SALE, INSTALLATION, MAINTENANCE, USE, PERFORMANCE, FAILURE, OR INTERRUPTION OF THE POSSIBILITY OF