Page 11 / 68 Scroll up to view Page 6 - 10
© Copyright 2013 TRENDnet. All Rights Reserved.
TRENDnet User’s Guide
TEW-811DRU
11
5. Click “
Next”
to begin the wizard .
6. Select “
DHCP Connection (Dynamic IP Address)”
and click
“Next”
to continue.
Note:
Dynamic IP (DHCP) is typical for most Internet services. You can verify your
settings with your Internet Service Provider.
7. Click “
Apply”
.
8. Click
“OK”
.
9. Open your web browser and enter in a website (e.g.
www.trendnet.com
) to verify
that you have an Internet connection.
10. For added security, the router is pre-encrypted with its own unique wireless network
security key. You can find the unique network security key and pre-assigned network
name (SSID) on a sticker on the front of the router and on a label on the bottom of the
router. If you would like to change the wireless settings, continue to the next page to
launch the wireless setup wizard.
Page 12 / 68
© Copyright 2013 TRENDnet. All Rights Reserved.
TRENDnet User’s Guide
TEW-811DRU
12
Wireless Setup Wizard
1. Open your web browser (e.g. Internet Explorer, Firefox, Safari, Chrome, or Opera) and
go to
http://tew-811dru
or you can access the router management using the IP
address
. Your router will prompt you for a user name and
password.
2. For added security, the router is preconfigured with a unique password. You can find
the
Password
on a sticker on the sticker of the router and on the label on the bottom of
the router.
Enter your
Username
and
Password
, select your preferred language, then
click “
Login”
.
User Name:
admin
Password:
(xxxxxxxx)
Note:
User Name and Password are case sensitive.
3. Click the “
Wizard
” button on the left side.
4. Click “Launch Wireless Security Setup Wizard”.
Page 13 / 68
© Copyright 2013 TRENDnet. All Rights Reserved.
TRENDnet User’s Guide
TEW-811DRU
13
5. Select which wireless network you would like to configure, then click
“Next”.
6. Enter the Wireless Network Name (SSID) you would like to assign your wireless
network. This name will be used to identify your wireless network when scanning and
connecting your laptops, mobile devices, or other client devices. Click “
Next”
.
7. Select the type of wireless security for your wireless network. Click Next. It is strongly
recommended to use wireless security to protect your wireless network. See page 15 for
additional information on wireless security.
8. Enter the wireless network key or password that will be used to connect to your
wireless network. Click “
Next”
.
Page 14 / 68
© Copyright 2013 TRENDnet. All Rights Reserved.
TRENDnet User’s Guide
TEW-811DRU
14
9. Verify your wireless settings are correct and click “
Apply”.
Note:
It is recommended to save your wireless settings in a location you can easily find,
in case you forget and need to reference the wireless settings you applied.
10. Click
“OK”
.
11. Wait for the device to apply the new wireless settings.
Connect additional wired devices to your network
You can connect additional computers or other network enabled devices to your
network by using Ethernet cables to connect them to one of the available LAN ports
labeled 1,2,3,4 on your router. Check the status of the LED indicators (1, 2, 3, or 4) on
the front panel of your router to ensure the physical cable connection from your
computer or device.
Note:
If you encounter issues connecting to your network, there may be a problem with
your computer or device network settings. Please ensure that your computer or device
network settings (also called TCP/IP settings) are configured to obtain IP address settings
automatically (also called dynamic IP address or DHCP) and to Obtain DNS Server
address settings automatically.
Page 15 / 68
© Copyright 2013 TRENDnet. All Rights Reserved.
TRENDnet User’s Guide
TEW-811DRU
15
Wireless Networking and Security
How to choose the type of security for your wireless network
Setting up wireless security is very important. Leaving your wireless network open and
unsecure could expose your entire network and personal files to outsiders. TRENDnet
recommends reading through this entire section and setting up wireless security on your
new router.
There are a few different wireless security types supported in wireless networking each
having its own characteristics which may be more suitable for your wireless network
taking into consideration compatibility, performance, as well as the security strength
along with using older wireless networking hardware (also called legacy hardware).
It is strongly recommended to enable wireless security to prevent unwanted users from
accessing your network and network resources (personal documents, media, etc.).
In general, it is recommended that you choose the security type with the highest
strength and performance supported by the wireless computers and devices in your
network. Please review the security types to determine which one you should use for
your network.
Wireless Encryption Types
WEP:
Legacy encryption method supported by older 802.11b/g hardware. This is
the oldest and least secure type of wireless encryption. It is generally not
recommended to use this encryption standard, however if you have old 802.11 b or
802.11g wireless adapters or computers with old embedded wireless cards(wireless
clients), you may have to set your router to WEP to allow the old adapters to
connect to the router.
Note:
This encryption standard will limit connection speeds to 54Mbps.
WPA:
This encryption is significantly more robust than the WEP technology. Much
of the older 802.11g hardware was been upgraded (with firmware/driver upgrades)
to support this encryption standard. Total wireless speeds under this encryption
type however are limited to 54Mbps.
WPA-
Auto: This setting provides the router with the ability to detect wireless
devices using either WPA or WPA2 encryption. Your wireless network will
automatically change the encryption setting based on the first wireless device
connected. For example, if the first wireless client that connects to your wireless
network uses WPA encryption your wireless network will use WPA encryption. Only
when all wireless clients disconnect to the network and a wireless client with WPA2
encryption connects your wireless network will then change to WPA2 encryption.
Note:
WPA2 encryption supports 802.11n speeds and WPA encryption will limit
your connection speeds to 54Mbps
WPA2:
This is the most secure wireless encryption available today, similar to WPA
encryption but more robust.
This encryption standard also supports the highest
connection speeds. TRENDnet recommends setting your router to this encryption
standard. If you find that one of your wireless network devices does not support
WPA2 encryption, then set your router to either WPA or WPA-Auto encryption.
Note:
Check the specifications of your wireless network adapters and wireless
appliances to verify the highest level of encryption supported.
Below is brief
comparison chart of the wireless security types and the recommended
configuration depending on which type you choose for your wireless network.
Security Standard
WEP
WPA
WPA2
Compatible
Wireless
Standards
IEEE 802.11a/b/g
(802.11n devices
will operate at
802.11g to connect
using this standard)
IEEE 802.11a/b/g
(802.11n devices
will operate at
802.11g to connect
using this
standard)
IEEE 802.11a/b/g/n
Highest
Performance
Under This
Setting
Up to 54Mbps
Up to 54Mbps
Up to 450Mbps (11n)
and up to 1.3Gbps
(11ac)
*
Encryption
Strength
Low
Medium
High
Additional
Options
Open System or
Shared Key,
HEX or ASCII,
Different key sizes
TKIP or AES,
Preshared Key or
RADIUS
TKIP or AES,
Preshared Key or
RADIUS
Recommended
Configuration
Open System ASCII
13 characters
TKIP
Preshared Key
8-63 characters
AES
Preshared Key
8-63 characters
*Dependent on the maximum 802.11n/ac data rate supported by the device (150Mbps,
300Mbps, 450Mbps, 867Mbps, or 1.3Gbps)

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top