Datasheet
Page 1
... and Wireless Distribution System (WDS) feature • Wireless Protected Setup (WPS) for effortless installation • Supports 64/128-bit WEP(Hex) WPA/WPA2 and WPA-PSK/WPA2-PSK Encryption • Advanced wireless protection (EAP-MD5, EAP-TLS, EAP-TTLS, PEAP) • Support for 802.1x and...16 entries) and SSID Broadcast Control • Access Control list for your most demanding networking needs. wireless 300Mbps Wireless N Hot Spot Access Point TEW-636APB (V1.0R) The Wireless N Hot Spot Access Point creates a high speed wireless n network with Windows 2000/XP/2003 Server/Vista, Linux ...
... and Wireless Distribution System (WDS) feature • Wireless Protected Setup (WPS) for effortless installation • Supports 64/128-bit WEP(Hex) WPA/WPA2 and WPA-PSK/WPA2-PSK Encryption • Advanced wireless protection (EAP-MD5, EAP-TLS, EAP-TTLS, PEAP) • Support for 802.1x and...16 entries) and SSID Broadcast Control • Access Control list for your most demanding networking needs. wireless 300Mbps Wireless N Hot Spot Access Point TEW-636APB (V1.0R) The Wireless N Hot Spot Access Point creates a high speed wireless n network with Windows 2000/XP/2003 Server/Vista, Linux ...
Datasheet
Page 2
Wireless N Hot Spot Access Point TEW-636APB (V1.0R) SPECIFICATIONS Hardware Standards Interface Reset Button Config Button LED Indicator Power Adapter Dimension (L x W x H) Weight Temperature Humidity Certification Wireless Frequency Module Technique Antenna Media ... • 802.11n (Draft 2.0): Up to 300Mbps • Encryption: Hardware AES/TKIP, 64/128-bit WEP (Hex) • 802.1X/EAP: WPA/WPA2/802.1X authenticator • WPA: WPA-PSK/WPA2-PSK, WPA-enterprise, WPA2-Enterprise • SSID Broadcast Control • 802.11b: 18dBm (Typical) • 802.11g: 15dBm (Typical) • 802.11n (...
Wireless N Hot Spot Access Point TEW-636APB (V1.0R) SPECIFICATIONS Hardware Standards Interface Reset Button Config Button LED Indicator Power Adapter Dimension (L x W x H) Weight Temperature Humidity Certification Wireless Frequency Module Technique Antenna Media ... • 802.11n (Draft 2.0): Up to 300Mbps • Encryption: Hardware AES/TKIP, 64/128-bit WEP (Hex) • 802.1X/EAP: WPA/WPA2/802.1X authenticator • WPA: WPA-PSK/WPA2-PSK, WPA-enterprise, WPA2-Enterprise • SSID Broadcast Control • 802.11b: 18dBm (Typical) • 802.11g: 15dBm (Typical) • 802.11n (...
User's Guide
Page 2
... Control ...33 Advanced Settings ...36 Wi-Fi Protected Setup ...37 CHAPTER 4 PC AND SERVER CONFIGURATION 38 Overview ...38 Using WEP ...38 Using WPA-PSK/WPA2-PSK 39 Using WPA-Enterprise...40 802.1x Server Setup (Windows 2000 Server 41 802.1x Client Setup on Windows XP 51 Using 802.1x Mode (without... WPA 57 CHAPTER 5 OPERATION AND STATUS 58 Operation ...58 Status Screen...58 CHAPTER 6 ACCESS POINT MANAGEMENT 65 Overview ...65 Admin Login Screen ...65 Config File ...67 ...
... Control ...33 Advanced Settings ...36 Wi-Fi Protected Setup ...37 CHAPTER 4 PC AND SERVER CONFIGURATION 38 Overview ...38 Using WEP ...38 Using WPA-PSK/WPA2-PSK 39 Using WPA-Enterprise...40 802.1x Server Setup (Windows 2000 Server 41 802.1x Client Setup on Windows XP 51 Using 802.1x Mode (without... WPA 57 CHAPTER 5 OPERATION AND STATUS 58 Operation ...58 Status Screen...58 CHAPTER 6 ACCESS POINT MANAGEMENT 65 Overview ...65 Admin Login Screen ...65 Config File ...67 ...
User's Guide
Page 5
... only your Web Browser. ent sources to perform common configuration changes. • Radius Accounting Support. WPA is included. Both TKIP and AES encryption methods are supported. • WPA support. You can connect to your LAN. • WEP support. protected Configuration. If you have...Combined with different security settings. • Virtual APs Isolation. Advanced Features • Command Line Interface. If you can be used for WPA is more secure than WEP, and should be segmented. Firmware is included. Support for 802.1x mode is included, providing for WEP...
... only your Web Browser. ent sources to perform common configuration changes. • Radius Accounting Support. WPA is included. Both TKIP and AES encryption methods are supported. • WPA support. You can connect to your LAN. • WEP support. protected Configuration. If you have...Combined with different security settings. • Virtual APs Isolation. Advanced Features • Command Line Interface. If you can be used for WPA is more secure than WEP, and should be segmented. Firmware is included. Support for 802.1x mode is included, providing for WEP...
User's Guide
Page 20
... currently disabled. • VAP Name The current VAP name is displayed. • [SSID] The current SSID associated with this indicates the VAP is currently enabled. WPA-PSK ) is displayed. Isolation Isolate all Virtual APs from each other. Wireless Access Point User Guide Virtual AP Settings Clicking the Virtual APs link on...
... currently disabled. • VAP Name The current VAP name is displayed. • [SSID] The current SSID associated with this indicates the VAP is currently enabled. WPA-PSK ) is displayed. Isolation Isolate all Virtual APs from each other. Wireless Access Point User Guide Virtual AP Settings Clicking the Virtual APs link on...
User's Guide
Page 22
...the 802.1x standard. Data transmissions are encrypted using the WPA2 standard. Data transmissions are encrypted using EITHER WPA or WPA2 standard. WPA is a further development of encryption. • WPA-PSK and WPA2-PSK - If this option is required. • WPA2 with Radius - Keys are... when required. • All data transmission is encrypted using the AES (Advanced Encryption Standard) method of WPA-PSK, and offers even greater security, using EITHER WPA or WPA2 standard. This is usually done using digital certificates. • Each user's wireless client must ...
...the 802.1x standard. Data transmissions are encrypted using the WPA2 standard. Data transmissions are encrypted using EITHER WPA or WPA2 standard. WPA is a further development of encryption. • WPA-PSK and WPA2-PSK - If this option is required. • WPA2 with Radius - Keys are... when required. • All data transmission is encrypted using the AES (Advanced Encryption Standard) method of WPA-PSK, and offers even greater security, using EITHER WPA or WPA2 standard. This is usually done using digital certificates. • Each user's wireless client must ...
User's Guide
Page 26
.... Other Wireless Stations must also use the same key. Group Key Update This refers to be entered on each Wireless station. terminates 24 WPA-PSK Like WEP, data is encrypted using a 256Bit key derived from this if you want the keys to the key used if possible.... The 256Bit encryption key is TKIP. Figure 13: WPA-PSK Wireless Security Screen Data - WPA Encryption The encryption method is derived from the Access Point. WPA-PSK Screen WPA-PSK Network Key Enter the key value. WPA is dynamically updated. Enter the desired value. Update Group key If ...
.... Other Wireless Stations must also use the same key. Group Key Update This refers to be entered on each Wireless station. terminates 24 WPA-PSK Like WEP, data is encrypted using a 256Bit key derived from this if you want the keys to the key used if possible.... The 256Bit encryption key is TKIP. Figure 13: WPA-PSK Wireless Security Screen Data - WPA Encryption The encryption method is derived from the Access Point. WPA-PSK Screen WPA-PSK Network Key Enter the key value. WPA is dynamically updated. Enter the desired value. Update Group key If ...
User's Guide
Page 27
WPA2-PSK This is AES. WPA Encryption The encryption method is a further development of encryption. Enable this key. Update Group key If enabled, the Group key will be updated regularly. Data ... Key Enter the key value. Key Lifetime This field determines how often the Group key is encrypted using the AES (Advanced Encryption Standard) method of WPA-PSK, and offers even greater security, using a 256Bit key derived from the Access Point.
WPA2-PSK This is AES. WPA Encryption The encryption method is a further development of encryption. Enable this key. Update Group key If enabled, the Group key will be updated regularly. Data ... Key Enter the key value. Key Lifetime This field determines how often the Group key is encrypted using the AES (Advanced Encryption Standard) method of WPA-PSK, and offers even greater security, using a 256Bit key derived from the Access Point.
User's Guide
Page 28
... membership leaves the group or disassociates from the Access Point. Update Group key If enabled, the Group key will be updated regularly. WPA-PSK and WPA2-PSK Screen WPA-PSK and WPA2-PSK Network Key Enter the key value. Group Key Update This refers to use the same key.... WPA-PSK and WPA2-PSK This method, sometimes called "Mixed Mode", allows clients to the key used for WPA2-PSK. terminates 26 WPA Encryption The encryption method is TKIP for WPA-PSK, and AES for broadcast transmissions. Wireless Access Point ...
... membership leaves the group or disassociates from the Access Point. Update Group key If enabled, the Group key will be updated regularly. WPA-PSK and WPA2-PSK Screen WPA-PSK and WPA2-PSK Network Key Enter the key value. Group Key Update This refers to use the same key.... WPA-PSK and WPA2-PSK This method, sometimes called "Mixed Mode", allows clients to the key used for WPA2-PSK. terminates 26 WPA Encryption The encryption method is TKIP for WPA-PSK, and AES for broadcast transmissions. Wireless Access Point ...
User's Guide
Page 29
... Radius This version of WPA requires a Radius Server on your LAN to provide the client authentication according to the 802.1x standard. Group Key Update This refers to be updated .... terminates 27 Access Point Setup Security Settings - Enable this if you want the keys to the key used for broadcast transmissions. Enter the desired value. WPA with Radius WPA Encryption The encryption method is dynamically updated. Wireless Stations must also use TKIP. Data transmissions are encrypted using the...
... Radius This version of WPA requires a Radius Server on your LAN to provide the client authentication according to the 802.1x standard. Group Key Update This refers to be updated .... terminates 27 Access Point Setup Security Settings - Enable this if you want the keys to the key used for broadcast transmissions. Enter the desired value. WPA with Radius WPA Encryption The encryption method is dynamically updated. Wireless Stations must also use TKIP. Data transmissions are encrypted using the...
User's Guide
Page 30
... often the Group key is AES. terminates 28 Data transmissions are encrypted using the WPA2 standard. Enter the desired value. Figure 17: WPA2 with Radius WPA Encryption The encryption method is dynamically updated. WPA2 with Radius This version of WPA2 requires a Radius Server on your LAN to provide the client authentication...
... often the Group key is AES. terminates 28 Data transmissions are encrypted using the WPA2 standard. Enter the desired value. Figure 17: WPA2 with Radius WPA Encryption The encryption method is dynamically updated. WPA2 with Radius This version of WPA2 requires a Radius Server on your LAN to provide the client authentication...
User's Guide
Page 31
... Point. Update Group key If enabled, the Group key will be updated regularly. WPA and WPA2 with Radius Wireless Security Screen Data - Figure 18: WPA and WPA2 with Radius EITHER WPA or WPA2 require a Radius Server on your LAN to provide the client authentication according...to the key used for WPA2. Enter the desired value. Data transmissions are encrypted using EITHER WPA or WPA2 standard. WPA and WPA2 with Radius Screen WPA and WPA2 with Radius WPA Encryption The encryption method is dynamically updated. terminates 29 Access Point Setup Security Settings - Key...
... Point. Update Group key If enabled, the Group key will be updated regularly. WPA and WPA2 with Radius Wireless Security Screen Data - Figure 18: WPA and WPA2 with Radius EITHER WPA or WPA2 require a Radius Server on your LAN to provide the client authentication according...to the key used for WPA2. Enter the desired value. Data transmissions are encrypted using EITHER WPA or WPA2 standard. WPA and WPA2 with Radius Screen WPA and WPA2 with Radius WPA Encryption The encryption method is dynamically updated. terminates 29 Access Point Setup Security Settings - Key...
User's Guide
Page 40
... Note! This difference arises because the key input by the user is 24 bits less than the key size used . • If using WEP or WPA-PSK, it is case sensitive. • Each Wireless station must be set to use WEP data encryption. • The Key size (64 bit, 128 bit...
... Note! This difference arises because the key input by the user is 24 bits less than the key size used . • If using WEP or WPA-PSK, it is case sensitive. • Each Wireless station must be set to use WEP data encryption. • The Key size (64 bit, 128 bit...
User's Guide
Page 41
... Station must also be entered on the Wireless Access Point. The default value is case sensitive. On each client, Wireless security must be set to WPA-PSK. • The Pre-shared Key entered on the Access Point must have the same settings as the Wireless Access Point. The SSID is wireless...
... Station must also be entered on the Wireless Access Point. The default value is case sensitive. On each client, Wireless security must be set to WPA-PSK. • The Pre-shared Key entered on the Access Point must have the same settings as the Wireless Access Point. The SSID is wireless...
User's Guide
Page 42
...the following items, each PC, the mode must be a Client Login for the Radius Server. Radius Server Configuration If using WPA-Enterprise mode, the Radius Server on the Radius Server. • Encryption settings must match the value used . Wireless Station Configuration...SSID is the most secure and most complex system. Wireless Access Point User Guide Using WPA-Enterprise This is case sensitive. the Wireless Access Point supports both methods simultaneously. WPA-Enterprise mode provides greater security and centralized management, but it is more complex to Infrastructure...
...the following items, each PC, the mode must be a Client Login for the Radius Server. Radius Server Configuration If using WPA-Enterprise mode, the Radius Server on the Radius Server. • Encryption settings must match the value used . Wireless Station Configuration...SSID is the most secure and most complex system. Wireless Access Point User Guide Using WPA-Enterprise This is case sensitive. the Wireless Access Point supports both methods simultaneously. WPA-Enterprise mode provides greater security and centralized management, but it is more complex to Infrastructure...
User's Guide
Page 59
... Point. This difference arises because the key input by the user is provided for encryption. 57 PC and Server Configuration Using 802.1x Mode (without WPA) This is shown as "104 bit". Instead, you must enter the WEP key manually, ensuring it matches the WEP key used for me automatically. Figure... Note: On some systems, the "64 bit" WEP key is shown as "40 bit" and the "128 bit" WEP key is very similar to using WPA-Enterprise.
... Point. This difference arises because the key input by the user is provided for encryption. 57 PC and Server Configuration Using 802.1x Mode (without WPA) This is shown as "104 bit". Instead, you must enter the WEP key manually, ensuring it matches the WEP key used for me automatically. Figure... Note: On some systems, the "64 bit" WEP key is shown as "40 bit" and the "128 bit" WEP key is very similar to using WPA-Enterprise.
User's Guide
Page 77
...; Common AP • Peer-to-Peer Bridge, Point-to-Multi-Point Bridge Bridge mode can be used simultaneously with Common AP mode. • Open, shared, WPA, WPA-PSK, and WPA2-PSK authentication • 802.1x support • EAP-TLS, EAP-TTLS, PEAP • Block inter-wireless station communication • Block SSID broadcast...
...; Common AP • Peer-to-Peer Bridge, Point-to-Multi-Point Bridge Bridge mode can be used simultaneously with Common AP mode. • Open, shared, WPA, WPA-PSK, and WPA2-PSK authentication • 802.1x support • EAP-TLS, EAP-TTLS, PEAP • Block inter-wireless station communication • Block SSID broadcast...
User's Guide
Page 92
...But if the data is meaningless unless the receiver can select the Channel used . (This can join. If WEP is 5 Channels (e.g. WPA-Enterprise This version of encryption. If this option is derived from receiving any data which is an existing "Ad-hoc" group they will still... it is encrypted, then it . WEP WEP (Wired Equivalent Privacy) is more than WEP, and should be used for an Access Point. WPA is a standard for encrypting data before transmission. However, most Wireless stations will automatically change to reduce interference. For 802.11g, 13 channels are...
...But if the data is meaningless unless the receiver can select the Channel used . (This can join. If WEP is 5 Channels (e.g. WPA-Enterprise This version of encryption. If this option is derived from receiving any data which is an existing "Ad-hoc" group they will still... it is encrypted, then it . WEP WEP (Wired Equivalent Privacy) is more than WEP, and should be used for an Access Point. WPA is a standard for encrypting data before transmission. However, most Wireless stations will automatically change to reduce interference. For 802.11g, 13 channels are...
User's Guide
Page 93
....1x and provide the login data when required. • All data transmission is encrypted using the WEP standard. If possible, you should use WPA-Enterprise instead, because WPA encryption is automatically generated. 92 the WEP key is much stronger than WEP encryption. Wireless Access Point User Guide • Each user must have...
....1x and provide the login data when required. • All data transmission is encrypted using the WEP standard. If possible, you should use WPA-Enterprise instead, because WPA encryption is automatically generated. 92 the WEP key is much stronger than WEP encryption. Wireless Access Point User Guide • Each user must have...
Quick Installation Guide
Page 6
Click Wireless and then click Basic Settings. Click Virtual APs. Select a Virtual AP, click Enable and then click Configure. Repeat step 5 and 6 for WPA-PSK security. 4. Note: The example below is for each subsequent Virtual AP. 8. Enter a SSID, select the desired Security System, enter the Network Key, click Save and then click Back. 7. Click Management and then click Admin Login. 4 English Select the desired Wireless Mode, select Access Point for Operating mode and then click Save. 5. If your wireless adapters do not support WPA-PSK, then select WEP. 6.
Click Wireless and then click Basic Settings. Click Virtual APs. Select a Virtual AP, click Enable and then click Configure. Repeat step 5 and 6 for WPA-PSK security. 4. Note: The example below is for each subsequent Virtual AP. 8. Enter a SSID, select the desired Security System, enter the Network Key, click Save and then click Back. 7. Click Management and then click Admin Login. 4 English Select the desired Wireless Mode, select Access Point for Operating mode and then click Save. 5. If your wireless adapters do not support WPA-PSK, then select WEP. 6.