Page 16 / 64 Scroll up to view Page 11 - 15
© Copyright 2014 TRENDnet. All Rights Reserved.
TRENDnet User’s Guide
TEW-823DRU
13
Parental Control
Basic > Parental Control
Parental control settings allow you to set up restrictions/filters specifically who is
allowed or denied access to your network for a specified period of time and restricted
access to web content.
Access Rule (MAC/IP Filter)
Basic > Parental Control
Every network device has a unique, 12-digit MAC (Media Access Control) address. Every
network device must be assigned or configured with a specific IP address in order to
communicate with your network which is typically assigned by your router DHCP server
automatically. Using access rules, you can deny specific computers and other devices
from using this router’s wired or wireless network by specifying the MAC address or IP
address.
1. Log into your router management page (see “
Access your router management page
on page 9).
2. Click on
Basic
, click on
Parental Control.
3. Check
Enabled
to enable the access rule.
4. Enter
a
Rule Name.
5. Select which
Address Type
to apply the filter. (MAC Address or IP Address)
Note:
If you device is not listed, please refer to your computer or device documentation
to find the MAC address.
6. Manually enter the
MAC Address
or
IP Address
in the field.
Note:
If the network device is connected to your router, you can also click the drop-down
list to choose one of the network devices (MAC Address/IP Address) detected by your
router.
7.
Schedule (Optional) –
The schedule function allows you to define a schedule when
the access should be active and blocking the specified MAC address or IP address. To
define a new schedule, click
New Schedule
and refer to page 33 “
Create Schedules
”.
After you have created a new schedule, click the drop-down list and the new schedule
will be available for selection.
Note:
Before applying scheduling, please ensure your Time
settings are configured correct and you have defined a schedule. See page 32 to
configure
Time Settings
and see page 33 “
Create Schedules
” to create a schedule.
8. Click
Add
to add the access rule to the
Access Rule List
. Wait of the rule to be added.
Note:
Clicking
Reset
will discard your settings and clear all fields.
Note:
In the
Access Rule List
, you can edit a rule by clicking
under the
Edit
column
next to the rule you would like to edit. You can also delete a rule by clicking
under
the
Delete
column next to the rule you would like to delete.
Page 17 / 64
© Copyright 2014 TRENDnet. All Rights Reserved.
TRENDnet User’s Guide
TEW-823DRU
14
Website Filter
Basic > Parental Control
You may want to block computers or devices on your network access to specific
websites (e.g.
www.xxxxxxxxx.com, etc.)
, also called domains or URLs (Uniform Resource
Locators). You may also apply a schedule when these websites are allowed or denied.
1. Log into your router management page (see “
Access your router management page
on page 9).
2. Click on
Basic
and click on
Parental Control.
3. Under
Website Filter
, click the
Website Filter
drop-down list and choose one of the
following options.
Disable
disables website filtering.
DENY computers access to ONLY these sites
: Only
Deny
computers/devices access
to the listed websites and allow access to others.
ALLOW computers access to ONLY these sites:
Only
Allow
computers/devices
access to the listed websites and deny access to others.
4. Check
Enable
to enable the access rule.
5. Enter
a
Rule Name.
6. Enter a
URL
(ex.
www.xxxxxxxx.com
) to apply for the filter or block
7.
Schedule (Optional) –
The schedule function allows you to define a schedule when
the access should be active and blocking the specified website. To define a new
schedule, click
New Schedule
and refer to page 33 “
Create Schedules
”. After you have
created a new schedule, click the drop-down list and the new schedule will be available
for selection.
Note:
Before applying scheduling, please ensure your Time settings are
configured correct and you have defined a schedule. See page 32 to configure
Time
Settings
and see page 33 “
Create Schedules
” to create a schedule.
8. Click
Add
to add the access rule to the
Access Rule List
. Wait of the rule to be added.
Note:
Clicking
Reset
will discard your settings and clear all fields.
Note:
In the
URL Fille List
, you can edit a rule by clicking
under the
Edit
column
next to the rule you would like to edit. You can also delete a rule by clicking
under
the
Delete
column next to the rule you would like to delete.
Page 18 / 64
© Copyright 2014 TRENDnet. All Rights Reserved.
TRENDnet User’s Guide
TEW-823DRU
15
Wireless Networking and Security
How to choose the type of security for your wireless network
Setting up wireless security is very important. Leaving your wireless network open and
unsecure could expose your entire network and personal files to outsiders. TRENDnet
recommends reading through this entire section and setting up wireless security on your
new router.
There are a few different wireless security types supported in wireless networking each
having its own characteristics which may be more suitable for your wireless network
taking into consideration compatibility, performance, as well as the security strength
along with using older wireless networking hardware (also called legacy hardware).
It is strongly recommended to enable wireless security to prevent unwanted users from
accessing your network and network resources (personal documents, media, etc.).
In general, it is recommended that you choose the security type with the highest
strength and performance supported by the wireless computers and devices in your
network. Please review the security types to determine which one you should use for
your network.
Wireless Encryption Types
WEP:
Legacy encryption method supported by older 802.11b/g hardware. This is
the oldest and least secure type of wireless encryption. It is generally not
recommended to use this encryption standard, however if you have old 802.11 b or
802.11g wireless adapters or computers with old embedded wireless cards(wireless
clients), you may have to set your router to WEP to allow the old adapters to
connect to the router.
Note:
This encryption standard will limit connection speeds to 54Mbps.
WPA:
This encryption is significantly more robust than the WEP technology. Much
of the older 802.11g hardware was been upgraded (with firmware/driver upgrades)
to support this encryption standard. Total wireless speeds under this encryption
type however are limited to 54Mbps.
WPA-
Auto: This setting provides the router with the ability to detect wireless
devices using either WPA or WPA2 encryption. Your wireless network will
automatically change the encryption setting based on the first wireless device
connected. For example, if the first wireless client that connects to your wireless
network uses WPA encryption your wireless network will use WPA encryption. Only
when all wireless clients disconnect to the network and a wireless client with WPA2
encryption connects your wireless network will then change to WPA2 encryption.
Note:
WPA2 encryption supports 802.11n speeds and WPA encryption will limit
your connection speeds to 54Mbps
WPA2:
This is the most secure wireless encryption available today, similar to WPA
encryption but more robust.
This encryption standard also supports the highest
connection speeds. TRENDnet recommends setting your router to this encryption
standard. If you find that one of your wireless network devices does not support
WPA2 encryption, then set your router to either WPA or WPA-Auto encryption.
Note:
Check the specifications of your wireless network adapters and wireless
appliances to verify the highest level of encryption supported.
Below is brief
comparison chart of the wireless security types and the recommended
configuration depending on which type you choose for your wireless network.
Security Standard
WEP
WPA
WPA2
Compatible
Wireless
Standards
IEEE 802.11a/b/g
(802.11n devices
will operate at
802.11g to connect
using this standard)
IEEE 802.11a/b/g
(802.11n devices
will operate at
802.11g to connect
using this
standard)
IEEE
802.11a/b/g/n/ac
Highest
Performance
Under This
Setting
Up to 54Mbps
Up to 54Mbps
Up to 450Mbps (11n)
or 1.3 Gbps (11ac)
Encryption
Strength
Low
Medium
High
Additional
Options
Open System or
Shared Key,
HEX or ASCII,
Different key sizes
TKIP or AES,
Preshared Key or
RADIUS
TKIP or AES,
Preshared Key or
RADIUS
Recommended
Configuration
Open System ASCII
13 characters
TKIP
Preshared Key
8-63 characters
AES
Preshared Key
8-63 characters
*Dependent on the maximum 802.11n data rate supported by the device (150Mbps,
300Mbps, 450Mbps) or maximum 802.11ac data rate supported by the device
(433Mbps, 867Mbps, 1.3Gbps)
Page 19 / 64
© Copyright 2014 TRENDnet. All Rights Reserved.
TRENDnet User’s Guide
TEW-823DRU
16
Secure your wireless network
Basic > Wireless
After you have determined which security type to use for your wireless network (see
How to choose the security type for your wireless network
” on page 12), you can set up
wireless security.
Note:
By default, your router is configured with a predefined wireless network name
(SSID) and security key using WPA2-Personal. The predefined wireless network name and
security can be found on the sticker on the side of the router or on the device label at the
bottom of the router.
1. Log into your router management page (see “
Access your router management page
on page 9).
2. Click on
Basic
, and click on
Wireless
.
3. Under
Security
, click on the
Security Mode
drop-down list to select your wireless
security type.
Selecting WEP:
If selecting
WEP
(Wired Equivalent Privacy), please review the WEP settings to configure
and click
Apply
to save the changes.
Security Mode:
Choose
WEP-OPEN
,
WEP-SHARED
, or
WEP-AUTO.
Note:
It is recommended to use Open since it is known to be more secure than
Shared Key.
Default Key
: Choose the key index to use for security to the corresponding WEP
Keys 1-4. You can only use one key at any given time.
Note:
Please note that they wireless client key index 1-4 should also match the key
index chosen here in order to establish connection.
WEP Key 1-4:
Enter the WEP key. This is the password or key that is used to
connect your computer to this router wirelessly. You can enter 64-bit or 128-bit
key. You can enter up to four keys but only the one chosen as the Default Key will
be used.
Note:
It is recommended to use 128-bit because it is more secure to use a key that
consists of more characters.
Hex/ASCII:
Enter the WEP key format. See the table below for the acceptable
characters and lengths for each format.
WEP Key Format
HEX
ASCII
Character set
0-9 & A-F, a-f only
Alphanumeric (a,b,C,?,*, /,1,2, etc.)
64-bit key length
10 characters
5 characters
128-bit key length
26 characters
13 characters
Page 20 / 64
© Copyright 2014 TRENDnet. All Rights Reserved.
TRENDnet User’s Guide
TEW-823DRU
17
Selecting WPA-Personal / WPA2-Personal / WPA2-Personal Mixed
(WPA2-Personal recommended):
In the
Security Mode
drop-down list, select
WPA-Personal
,
WPA2-Personal
, or
WPA2-
Personal Mixed.
Please review the WPA-Personal settings to configure and click
Apply
to save the changes.
The following section outlines options when selecting
WPA-Personal
,
WPA2-Personal
,
or
WPA2-Personal Mixed
(Preshared Key),
WPA Cipher:
Select a Cipher Type to use.
o
When selecting
WPA2-Personal Mixed
security, it is recommended to use
TKIP/AES.
o
When selecting
WPA2-Personal
security, it is recommended to use
AES
.
WPA Pre-Shared Key:
Enter the passphrase.
o
This is the password or key that is used to connect your computer to this router
wirelessly
Key Format:
8-63 alphanumeric characters (a,b,C,?,*, /,1,2, etc.)
Key Update Interval:
Enter the time interval (seconds) of when the network
passphrase will rotate.
Note:
It is recommended to use the default interval time. Your passphrase will not
change, rotation of the key is part of the WPA protocol and designed to increase
security.
Selecting WPA-Enterprise / WPA2-Enterprise / WPA2-Enterprise Mixed
(WPA2-Personal recommended):
The following section outlines options when selecting
WPA-Enterprise
,
WPA2-
Enterprise
, or
WPA2-Enterprise Mixed
(EAP or RADIUS)
.
This security type is also known
as EAP (Extensible Authentication Protocol) or Remote Authentication Dial-In User
Service or RADIUS.
Note:
This security type requires an external RADIUS server, Pre-Shared Key only requires
you to create a passphrase.
WPA Cipher:
Select a Cipher Type to use.
o
When selecting
WPA2-Personal Mixed
security, it is recommended to use
TKIP/AES.
o
When selecting
WPA2-Personal
security, it is recommended to use
AES
.
Key Update Interval:
Enter the time interval (seconds) of when the network
passphrase will rotate.
Note:
It is recommended to use the default interval time. Your passphrase will not
change, rotation of the key is part of the WPA protocol and designed to increase
security.
RADIUS Server Address:
Enter the IP address of the RADIUS server. (e.g.
192.168.10.250)
RADIUS Port:
Enter the port your RADIUS server is configured to use for RADIUS
authentication.
Note:
It is recommended to use port 1812 which is typical default RADIUS port.
RADIUS Server Shared Secret:
Enter the shared secret used to authorize your
router with your RADIUS server.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top