Reviews & Opinions
Independent and trusted. Read before buy TP-link TL-WR841ND!

TP-link TL-WR841ND

Manual

Preview of first few manual pages (at low quality). Check before download. Click to enlarge.
Manual - 1 page  Manual - 2 page  Manual - 3 page 

Download (English)
TP-link TL-WR841ND, size: 2.8 MB
Instruction: After click Download and complete offer, you will get access to list of direct links to websites where you can download this manual.

About

TP-link TL-WR841NDTP-Link TL-WR841ND 4 Port 10/100 300Mbps Wireless N Router 802.11b/g
TL-WR841ND by TP-LINK (Factory New) The TL-WR841ND Wireless N Router is a combined wired/wireless network connection device designed specifically for small business, office and home networking requirements. It provides a simple, very fast, pleasing way to access internet or Ethernet without cables for work or fun. It complies with the IEEE 802.11n (Draft 2.0) standard with wireless transmission speeds of up to 300Mbps. The router features 4 10/100M switch ports to achieve the most effective data... Read more

Details
Brand: ASI Drop Ship
Part Numbers: TL-WR841ND, TLWR841ND
UPC: 0845973051280, 845973051280
EAN: 6935364051280

 

[ Report abuse or wrong photo | Share your TP-link TL-WR841ND photo ]

Video review

TP LINK TL WR841ND Introduction

 

User reviews and opinions

<== Click here to post a new opinion, comment, review, etc.

Comments to date: 1. Page 1 of 1. Average Rating:
CaisaP 6:05pm on Saturday, April 10th, 2010 
Nice router. Nice range - I can receive "good" or "very good" signal strength on 2nd floor with this router on 1st floor. Inexpensive full-featured wireless router I bought this wireless router yesterday to replace my old Netgear WGR614. Great Product at Great Price and perfect router This wireless router is easy to use i used it for over 8 months its simple to use i havent had any pro...

Comments posted on www.ps2netdrivers.net are solely the views and opinions of the people posting them and do not necessarily reflect the views or opinions of us.

 

Documents

doc0

TL-WR841N TL-WR841ND Wireless N Router

Rev: 3.0.2 1910010228

COPYRIGHT & TRADEMARKS
Specifications are subject to change without notice. registered trademarks of their respective holders. No part of the specifications may be reproduced in any form or by any means or used to make any derivative such as translation, transformation, or adaptation without permission from TP-LINK TECHNOLOGIES CO., LTD. Copyright 2009 TP-LINK TECHNOLOGIES CO., LTD. All rights reserved. http://www.tp-link.com is a registered trademark of TP-LINK TECHNOLOGIES CO., LTD. Other brands and product names are trademarks or

FCC STATEMENT

This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures: Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/ TV technician for help.
This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions: 1) This device may not cause harmful interference.
2) This device must accept any interference received, including interference that may cause undesired operation. Any changes or modifications not expressly approved by the party responsible for compliance could void the users authority to operate the equipment.
FCC RF Radiation Exposure Statement
This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled environment. This device and its antenna must not be co-located or operating in conjunction with any other antenna or transmitter. To comply with FCC RF exposure compliance requirements, this grant is applicable to only Mobile Configurations. The antennas used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter.

CE Mark Warning

This is a class B product. In a domestic environment, this product may cause radio interference, in which case the user may be required to take adequate measures.

National restrictions

This device is intended for home and office use in all EU countries (and other countries following the EU directive 1999/5/EC) without any limitation except for the countries mentioned below: Country Restriction Reason/remark
General authorization required for outdoor use and public service Military Radiolocation use. Refarming of the 2.4 GHz band has been ongoing in recent years to allow current relaxed regulation. Full implementation planned 2012 If used outside of own premises, general authorization is required General authorization required for network and service supply(not for spectrum) This subsection does not apply for the geographical area within a radius of 20 km from the centre of Ny-lesund Only for indoor applications

4.6.5 4.7

Wireless Statistics... 45
DHCP.... 46 4.7.1 4.7.2 4.7.3 DHCP Settings.... 46 DHCP Clients List... 47 Address Reservation... 48
Forwarding.... 49 4.8.1 4.8.2 4.8.3 4.8.4 Virtual Servers.... 49 Port Triggering.... 51 DMZ.... 53 UPnP.... 53
Security.... 54 4.9.1 4.9.2 4.9.3 4.9.4 Basic Security.... 54 Advanced Security.... 56 Local Management.... 57 Remote Management... 58
4.10 Parental Control.... 59 4.11 Access Control..... 62 4.11.1 Rule.... 62 4.11.2 Host.... 65 4.11.3 Target.... 67 4.11.4 Schedule.... 69 4.12 Static Routing.... 70 4.13 Bandwidth Control... 72 4.13.1 Control Settings.... 72 4.13.2 Rules List.... 72 4.14 IP & MAC Binding Setting... 74 4.14.1 Binding Settings.... 74 4.14.2 ARP List.... 75 4.15 Dynamic DNS.... 76 4.15.1 Comexe.cn DDNS.... 77
4.15.2 Dyndns.org DDNS.... 78 4.15.3 No-ip.com DDNS.... 78 4.16 System Tools.... 79 4.16.1 Time Settings... 80 4.16.2 Diagnostic... 81 4.16.3 Firmware Upgrade.... 82 4.16.4 Factory Defaults.... 83 4.16.5 Backup & Restore... 84 4.16.6 Reboot..... 84 4.16.7 Password.... 85 4.16.8 System Log.... 85 4.16.9 Statistics.... 88 Appendix A: FAQ..... 90 Appendix B: Configuring the PC.... 95 Appendix C: Specifications.... 99 Appendix D: Glossary..... 100

- III -

TL-WR841N/TL-WR841ND

Wireless N Router

Package Contents
The following items should be found in your package: TL-WR841N/TL-WR841ND Wireless N Router DC Power Adapter for TL-WR841N/TL-WR841ND Wireless N Router Quick Installation Guide Resource CD for TL-WR841N/TL-WR841ND Wireless N Router, including:
This Guide Other Helpful Information
Note: Make sure that the package contains the above items. If any of the listed items are damaged or missing, please contact with your distributor.

Chapter 1. Introduction

Thank you for choosing the TL-WR841N/TL-WR841ND Wireless N Router.
1.1 Overview of the Router
The TL-WR841N/TL-WR841ND Wireless N Router integrates 4-port Switch, Firewall, NAT-Router and Wireless AP. Powered by 2x2 MIMO technology, the Wireless N Router delivers exceptional range and speed, which can fully meet the need of Small Office/Home Office (SOHO) networks and the users demanding higher networking performance. Incredible Speed The TL-WR841N/TL-WR841ND Wireless N Router provides up to 300Mbps wireless connection with other 802.11n wireless clients. The incredible speed makes it ideal for handling multiple data streams at the same time, which ensures your network stable and smooth. The performance of this 802.11n wireless Router will give you the unexpected networking experience at speed 650% faster than 802.11g. It is also compatible with all IEEE 802.11g and IEEE 802.11b products. Multiple Security Protections With multiple protection measures, including SSID broadcast control and wireless LAN 64/128/152-bit WEP encryption, WiFi protected Access (WPA2- PSK, WPA- PSK), as well as advanced Firewall protections, the TL-WR841N/841ND Wireless N Router provides complete data privacy. Flexible Access Control The TL-WR841N/TL-WR841ND Wireless N Router provides flexible access control, so that parents or network administrators can establish restricted access policies for children or staff. It also supports Virtual Server and DMZ host for Port Triggering, and then the network administrators can manage and monitor the network in real time with the remote management function. Simple Installation Since the Router is compatible with virtually all the major operating systems, it is very easy to manage. Quick Setup Wizard is supported and detailed instructions are provided step by step in this user guide. Before installing the Router, please look through this guide to know all the Routers functions.

Figure 4-7

WAN - Static IP

- 25 -

IP Address - Enter the IP address in dotted-decimal notation provided by your ISP. Subnet Mask - Enter the subnet Mask in dotted-decimal notation provided by your ISP, usually is 255.255.255.0. Default Gateway - (Optional) Enter the gateway IP address in dotted-decimal notation provided by your ISP. MTU Size - The normal MTU (Maximum Transmission Unit) value for most Ethernet networks is 1500 Bytes. It is not recommended that you change the default MTU Size unless required by your ISP. Primary/Secondary DNS - (Optional) Enter one or two DNS addresses in dotted-decimal notation provided by your ISP. Click the Save button to save your settings.
If your ISP provides a PPPoE connection, select PPPoE option. And you should enter the following parameters (Figure 4-8):

Figure 4-8

WAN - PPPoE
User Name/Password - Enter the User Name and Password provided by your ISP. These fields are case-sensitive.

- 26 -

Secondary Connection - Its available only for PPPoE Connection. If your ISP provides an extra Connection type such as Dynamic/Static IP to connect to a local area network, then you can check the radio button of Dynamic/Static IP to activate this secondary connection. Disabled - The Secondary Connection is disabled by default, so there is PPPoE connection only. This is recommended. Dynamic IP - You can check this radio button to use Dynamic IP as the secondary connection to connect to the local area network provided by ISP. Static IP - You can check this radio button to use Static IP as the secondary connection to connect to the local area network provided by ISP. Connect on Demand - In this mode, the Internet connection can be terminated automatically after a specified inactivity period (Max Idle Time) and be re-established when you attempt to access the Internet again. If you want your Internet connection keeps active all the time, please enter 0 in the Max Idle Time field. Otherwise, enter the number of minutes you want to have elapsed before your Internet access disconnects. Connect Automatically - The connection can be re-established automatically when it was down. Time-based Connecting - The connection will only be established in the period from the start time to the end time (both are in HH:MM format). Note: Only when you have configured the system time on System Tools Time page, will the Time-based Connecting function can take effect. Connect Manually - You can click the Connect/Disconnect button to connect/disconnect immediately. This mode also supports the Max Idle Time function as Connect on Demand mode. The Internet connection can be disconnected automatically after a specified inactivity period and re-established when you attempt to access the Internet again. Click the Connect button to connect immediately. Click the Disconnect button to disconnect immediately. Caution: Sometimes the connection cannot be terminated although you specify a time to Max Idle Time because some applications are visiting the Internet continually in the background. If you want to do some advanced configurations, please click the Advanced button, and the page shown in Figure 4-9 will then appear:

To add or modify a MAC Address Filtering entry, follow these instructions: 1. Enter the appropriate MAC Address into the MAC Address field. The format of the MAC Address is XX-XX-XX-XX-XX-XX (X is any hexadecimal digit). For example: 00-0A-EB-B0-00-0B.

- 42 -

TL-WR841N/TL-WR841ND 2.
Give a simple description for the wireless station in the Description field. For example: Wireless station A.
Select Enabled or Disabled for this entry on the Status pull-down list. Click the Save button to save this entry.
To modify or delete an existing entry: 1. Click the Modify in the entry you want to modify. If you want to delete the entry, click the Delete. 2. 3. Modify the information. Click the Save button.
Click the Enable All button to make all entries enabled Click the Disabled All button to make all entries disabled. Click the Delete All button to delete all entries. Click the Next button to go to the next page. Click the Previous button to return to the previous page. For example: If you desire that the wireless station A with MAC address 00-0A-EB-B0-00-0B and the wireless station B with MAC address 00-0A-EB-00-07-5F are able to access the Router, but all the other wireless stations cannot access the Router, you can configure the Wireless MAC Address Filtering list by following these steps: 1. Click the Enable button to enable this function. 2. Select the radio button Deny the stations not specified by any enabled entries in the list to access for Filtering Rules. 3. Delete all or disable all entries if there are any entries already. 4. Click the Add New. button. 1) 2) 3) 4) 5) Enter the MAC address 00-0A-EB-B0-00-0B/00-0A-EB-00-07-5F in the MAC Address field. Enter wireless station A/B in the Description field. Select Enabled in the Status pull-down list. Click the Save button. Click the Back button.
The filtering rules that configured should be similar to the following list:

- 43 -

4.6.4 Wireless Advanced
Choose menu Wireless Wireless Advanced, you can configure the advanced settings of your wireless network.
Figure 4-23 Wireless Advanced Transmit Power - Here you can specify the transmit power of Router. You can select High, Middle or Low which you would like. High is the default setting and is recommended. Beacon Interval - Enter a value between 20-1000 milliseconds for Beacon Interval here. The beacons are the packets sent by the Router to synchronize a wireless network. Beacon Interval value determines the time interval of the beacons. The default value is 100. RTS Threshold - Here you can specify the RTS (Request to Send) Threshold. If the packet is larger than the specified RTS Threshold size, the Router will send RTS frames to a particular receiving station and negotiate the sending of a data frame. The default value is 2346. Fragmentation Threshold - This value is the maximum size determining whether packets will be fragmented. Setting the Fragmentation Threshold too low may result in poor network performance because of excessive packets. 2346 is the default setting and is recommended.

Figure 4-37 The Security menu
There are four submenus under the Security menu as shown in Figure 4-37: Basic Security, Advanced Security, Local Management and Remote Management. Click any of them, and you will be able to configure the corresponding function.

4.9.1 Basic Security

Choose menu Security Basic Security, you can configure the basic security in the screen as shown in Figure 4-38.

- 54 -

Figure 4-38 Basic Security
Firewall - A firewall protects your network from the outside world. Here you can enable or disable the Routers firewall. SPI Firewall - SPI (Stateful Packet Inspection, also known as dynamic packet filtering) helps to prevent cyber attacks by tracking more state per session. It validates that the traffic passing through the session conforms to the protocol. SPI Firewall is enabled by factory default. If you want all the computers on the LAN exposed to the outside world, you can disable it. VPN - VPN Passthrough must be enabled if you want to allow VPN tunnels using IPSec, PPTP, or L2TP protocols to pass through the Routers firewall. PPTP Passthrough - Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to be tunneled through an IP network. To allow PPTP tunnels to pass through the Router, keep the default, Enabled. L2TP Passthrough - Layer 2 Tunneling Protocol (L2TP) is the method used to enable Point-to-Point sessions via the Internet on the Layer 2 level. To allow L2TP tunnels to pass through the Router, keep the default, Enabled. IPSec Passthrough - Internet Protocol Security (IPSec) is a suite of protocols for ensuring private, secure communications over Internet Protocol (IP) networks, through the use of cryptographic security services. To allow IPSec tunnels to pass through the Router, keep the default, Enabled. ALG - It is recommended to enable Application Layer Gateway (ALG) because ALG allows customized Network Address Translation (NAT) traversal filters to be plugged into the

- 55 -

gateway to support address and port translation for certain application layer "control/data" protocols such as FTP, TFTP, H323 etc. FTP ALG - To allow FTP clients and servers to transfer data across NAT, keep the default Enable. TFTP ALG - To allow TFTP clients and servers to transfer data across NAT, keep the default Enable. H323 ALG - To allow Microsoft NetMeeting clients to communicate across NAT, keep the default Enable. Click the Save button to save your settings.

4.9.2 Advanced Security

Choose menu Security Advanced Security, you can protect the Router from being attacked by TCP-SYN Flood, UDP Flood and ICMP-Flood in the screen as shown in Figure 4-39.

Figure 4-39

Advanced Security
Packets Statistics Interval (5~60) - The default value is 10. Select a value between 5 and 60 seconds from the drop-down list. The Packets Statistics Interval value indicates the time

- 56 -

section of the packets statistics. The result of the statistics is used for analysis by SYN Flood, UDP Flood and ICMP-Flood. DoS Protection - Denial of Service protection. Check the Enable or Disable button to enable or disable the DoS protection function. Only when it is enabled, will the flood filters be enabled. Note: Dos Protection will take effect only when the Traffic Statistics in System Tool Traffic Statistics is enabled. Enable ICMP-FLOOD Attack Filtering - Enable or Disable the ICMP-FLOOD Attack Filtering. ICMP-FLOOD Packets Threshold (5~3600) - The default value is 50. Enter a value between 5 ~ 3600. When the current ICMP-FLOOD Packets number is beyond the set value, the Router will startup the blocking function immediately. Enable UDP-FLOOD Filtering - Enable or Disable the UDP-FLOOD Filtering. UDP-FLOOD Packets Threshold (5~3600) - The default value is 500. Enter a value between 5 ~ 3600. When the current UPD-FLOOD Packets number is beyond the set value, the Router will startup the blocking function immediately. Enable TCP-SYN-FLOOD Attack Filtering - Enable or Disable the TCP-SYN-FLOOD Attack Filtering. TCP-SYN-FLOOD Packets Threshold (5~3600) - The default value is 50. Enter a value between 5 ~ 3600. When the current TCP-SYN-FLOOD Packets numbers is beyond the set value, the Router will startup the blocking function immediately. Ignore Ping Packet From WAN Port - Enable or Disable Ignore Ping Packet From WAN Port. The default setting is disabled. If enabled, the ping packet from the Internet cannot access the Router. Forbid Ping Packet From LAN Port - Enable or Disable Forbid Ping Packet From LAN Port. The default setting is disabled. If enabled, the ping packet from LAN cannot access the Router. This function can be used to defend against some viruses. Click the Save button to save the settings. Click the Blocked DoS Host List button to display the DoS host table by blocking.

4.10 Parental Control

Choose menu Parental Control, and you can configure the parental control in the screen as shown in Figure 4-42. The Parental Control function can be used to control the internet activities of the child, limit the child to access certain websites and restrict the time of surfing.

- 59 -

Figure 4-42 Parental Control Settings
Parental Control - Check Enable if you want this function to take effect, otherwise check Disable. MAC Address of Parental PC - In this field, enter the MAC address of the controlling PC, or you can make use of the Copy To Above button below. MAC Address of Your PC - This field displays the MAC address of the PC that is managing this Router. If the MAC Address of your adapter is registered, you can click the Copy To Above button to fill this address to the MAC Address of Parental PC field above. Website Description - Description of the allowed website for the PC controlled. Schedule - The time period allowed for the PC controlled to access the Internet. For detailed information, please go to Access Control Schedule. Modify - Here you can edit or delete an existing entry. To add a new entry, please follow the steps below. 1. 2. Click the Add New button and the next screen will pop-up as shown in Figure 4-43. Enter the MAC address of the PC (e.g. 00-11-22-33-44-AA) youd like to control in the MAC Address of Child PC field. Or you can choose the MAC address from the All Address in Current LAN drop-down list. Give a description (e.g. Allow Google) for the website allowed to be accessed in the Website Description field. Enter the allowed domain name of the website, either the full name or the keywords (e.g. tp-link) in the Allowed Domain Name field. Any domain name with keywords in it (www.tp-link.com, www.tp-link.com.cn) will be allowed.

- 60 -

TL-WR841N/TL-WR841ND 5.
Select from the Effective Time drop-down list the schedule (e.g. Schedule_1) you want the entry to take effect. If there are not suitable schedules for you, click the Schedule in red below to go to the Advance Schedule Settings page and create the schedule you need.

In the Status field, you can select Enabled or Disabled to enable or disable your entry. Click the Save button.
Click the Enable All button to enable all the rules in the list. Click the Disable All button to disable all the rules in the list. Click the Delete All button to delete all the entries in the table. Click the Next button to go to the next page, or click the Previous button return to the previous page.
Figure 4-43 Add or Modify Parental Control Entry
For example: If you desire that the child PC with MAC address 00-11-22-33-44-AA can access www.google.com on Saturday only while the parent PC with MAC address 00-11-22-33-44-BB is without any restriction, you should follow the settings below.

- 61 -

1. Click Parental Control menu on the left to enter the Parental Control Settings page. Check Enable and enter the MAC address 00-11-22-33-44-BB in the MAC Address of Parental PC field. 2. Click Access Control Schedule on the left to enter the Schedule Settings page. Click Add New. button to create a new schedule with Schedule Description is Schedule_1, Day is Sat and Time is all day-24 hours. 3. Click Parental Control menu on the left to go back to the Add or Modify Parental Control Entry page: Click Add New. button. Enter 00-11-22-33-44-AA in the MAC Address of Child PC field. Enter Allow Google in the Website Description field. Enter www.google.com in the Allowed Domain Name field. Select Schedule_1 you create just now from the Effective Time drop-down list. In Status field, select Enable. 4. Click Save to complete the settings. Then you will go back to the Parental Control Settings page and see the following list, as shown in Figure 4-44.
Figure 4-44 Parental Control Settings

4.11 Access Control

Figure 4-45 Access Control
There are four submenus under the Access Control menu as shown in Figure 4-45: Rule, Host, Target and Schedule. Click any of them, and you will be able to configure the corresponding function.

4.11.1 Rule

Choose menu Access Control Rule, you can view and set Access Control rules in the screen as shown in Figure 4-46.

- 62 -

Figure 4-46 Access Control Rule Management
Enable Internet Access Control - Select the check box to enable the Internet Access Control function, so the Default Filter Policy can take effect. Rule Name - Here displays the name of the rule and this name is unique. Host - Here displays the host selected in the corresponding rule. Target - Here displays the target selected in the corresponding rule. Schedule - Here displays the schedule selected in the corresponding rule. Action - Here displays the action the Router takes to deal with the packets. It could be Allow or Deny. Allow means that the Router permits the packets to go through the Router. Deny means that the Router rejects the packets to go through the Router. Status - This field displays the status of the rule. Enabled means the rule will take effect, Disabled means the rule will not take effect. Modify - Here you can edit or delete an existing rule. To add a new rule, please follow the steps below. 1. Click the Add New button and the next screen will pop-up as shown in Figure 4-47. 2. Give a name (e.g. Rule_1) for the rule in the Rule Name field. 3. Select a host from the Host drop-down list or choose Click Here To Add New Host List. 4. Select a target from the Target drop-sown list or choose Click Here To Add New Target List. 5. Select a schedule from the Schedule drop-down list or choose Click Here To Add New Schedule.

- 63 -

TL-WR841N/TL-WR841ND 6. In the Action field, select Deny or Allow.
7. In the Status field, select Enabled or Disabled to enable or disable your entry. 8. Click the Save button.
Click the Enable All button to enable all the rules in the list. Click the Disable All button to disable all the rules in the list. Click the Delete All button to delete all the entries in the table. You can change the entrys order as desired. Fore entries are before hind entries. Enter the ID number in the first box you want to move and another ID number in second box you want to move to, and then click the Move button to change the entrys order. Click the Next button to go to the next page, or click the Previous button return to the previous page.
Figure 4-47 Add or Modify Internet Access Control Entry
For example: If you desire to allow the host with MAC address 00-11-22-33-44-AA to access www.google.com only from 18:00 to 20:00 on Saturday and Sunday, and forbid other hosts in the LAN to access the Internet, you should follow the settings below: 1. Click Access Control Host in the left to enter the Host Settings page. Add a new entry with the Host Description is Host_1 and MAC Address is 00-11-22-33-44-AA. 2. Click Access Control Target in the left to enter the Target Settings page. Add a new entry with the Target Description is Target_1 and Domain Name is www.google.com. 3. Click Access Control Schedule in the left to enter the Schedule Settings page. Add a new entry with the Schedule Description is Schedule_1, Day is Sat and Sun, Start Time is 1800 and Stop Time is 2000.

- 64 -

4. Click Access Control Rule in the left to return to the Access Control Rule Management page. Select Enable Internet Access Control and choose "Deny the packets not specified by any access control policy to pass through the Router". 5. Click Add New. button to add a new rule as follows: In Rule Name field, create a name for the rule. Note that this name should be unique, for example Rule_1. In Host field, select Host_1. In Target field, select Target_1. In Schedule field, select Schedule_1. In Action field, select Allow. In Status field, select Enable. Click Save to complete the settings. Then you will go back to the Access Control Rule Management page and see the following list.

4.11.2 Host

Choose menu Access Control Host, you can view and set a Host list in the screen as shown in Figure 4-48. The host list is necessary for the Access Control Rule.

Figure 4-48 Host Settings
Host Description - Here displays the description of the host and this description is unique. Information - Here displays the information about the host. It can be IP or MAC. Modify - To modify or delete an existing entry. To add a new entry, please follow the steps below. 1. 2. Click the Add New button. In the Mode field, select IP Address or MAC Address. If you select IP Address, the screen shown is Figure 4-49.

- 65 -

1) In Host Description field, create a unique description for the host (e.g. Host_1). 2) In LAN IP Address field, enter the IP address. If you select MAC Address, the screen shown is Figure 4-50. 1) In Host Description field, create a unique description for the host (e.g. Host_1). 2) In MAC Address field, enter the MAC address. 3. Click the Save button to complete the settings.
Click the Delete All button to delete all the entries in the table. Click the Next button to go to the next page, or click the Previous button return to the previous page.
Figure 4-49 Add or Modify a Host Entry
Figure 4-50 Add or Modify a Host Entry
For example: If you desire to restrict the internet activities of host with MAC address 00-11-22-33-44-AA, you should first follow the settings below: 1. Click Add New. button in Figure 4-48 to enter the Add or Modify a Host Entry page. 2. In Mode field, select MAC Address from the drop-down list. 3. In Host Description field, create a unique description for the host (e.g. Host_1). 4. In MAC Address field, enter 00-11-22-33-44-AA. 5. Click Save to complete the settings. Then you will go back to the Host Settings page and see the following list.

- 66 -

4.11.3 Target
Choose menu Access Control Target, you can view and set a Target list in the screen as shown in Figure 4-51. The target list is necessary for the Access Control Rule.
Figure 4-51 Target Settings
Target Description - Here displays the description about the target and this description is unique. Information - The target can be IP address, port, or domain name. Modify - To modify or delete an existing entry. To add a new entry, please follow the steps below. 1. 2. Click the Add New button. In Mode field, select IP Address or Domain Name. If you select IP Address, the screen shown is Figure 4-52. 1) In Target Description field, create a unique description for the target (e.g. Target_1). 2) In IP Address field, enter the IP address of the target. 3) Select a common service from Common Service Port drop-down list, so that the Target Port will be automatically filled. If the Common Service Port drop-down list doesnt have the service you want, specify the Target Port manually. 4) In Protocol field, select TCP, UDP, ICMP or ALL. If you select Domain Name, the screen shown is Figure 4-53. 1) In Target Description field, create a unique description for the target (e.g. Target_1). 2) In Domain Name field, enter the domain name, either the full name or the keywords (for example google) in the blank. Any domain name with keywords in it (www.google.com, www.google.cn) will be blocked or allowed. You can enter 4 domain names.

Click the Browse button to locate the update file for the Router, or enter the exact path to the Setting file in the text box. Click the Restore button.
Note: The current configuration will be covered by the uploading configuration file. The upgrade process lasts for 20 seconds and the Router will restart automatically. Keep the Router on during the upgrading process to prevent any damage.

4.16.6 Reboot

Choose menu System Tools Reboot, you can click the Reboot button to reboot the Router via the next screen.
Figure 4-77 Reboot the Router
Some settings of the Router will take effect only after rebooting, which include Change the LAN IP Address (system will reboot automatically). Change the DHCP Settings.

- 84 -

TL-WR841N/TL-WR841ND Change the Wireless configurations. Change the Web Management Port.
Upgrade the firmware of the Router (system will reboot automatically). Restore the Router's settings to factory defaults (system will reboot automatically). Update the configuration with the file (system will reboot automatically.

4.16.7 Password

Choose menu System Tools Password, you can change the factory default user name and password of the Router in the next screen as shown in Figure 4-78.

Figure 4-78 Password

It is strongly recommended that you should change the factory default user name and password of the Router, because all users who try to access the Router's Web-based utility or Quick Setup will be prompted for the Router's default user name and password. Note: The new user name and password must not exceed 14 characters in length and not include any spaces. Enter the new Password twice to confirm. Click the Save button when finished. Click the Clear All button to clear all.

4.16.8 System Log

Choose menu System Tools System Log, you can view the logs of the Router.

- 85 -

Figure 4-79 System Log
Auto Mail Feature - Indicates whether auto mail feature is enabled or not. Mail Settings - Set the receiving and sending mailbox address, server address, validation information as well as the timetable for Auto Mail Feature, as shown in Figure 4-80.

- 86 -

Figure 4-80

Mail Account Settings

From - Your mail box address. The Router would connect it to send logs. To - Recipients address. The destination mailbox where the logs would be received. SMTP Server - Your smtp server. It corresponds with the mailbox filled in the From field. You can log on the relevant website for Help if you are not clear with the address. Authentication - Most SMTP Server requires Authentication. It is required by most mailboxes that need User Name and Password to log in. Note: Only when you select Authentication, do you have to enter the User Name and Password in the following fields. User Name - Your mail account name filled in the From field. The part behind @ is excluded. Password - Your mail account password. Confirm The Password - Enter the password again to confirm. Enable Auto Mail Feature - Select it to mail logs automatically. You could mail the

Current

ICMP Tx

UDP Tx TCP SYN Tx

There would be 5 entries on each page. Click Previous to return to the previous page and Next to the next page.

- 89 -

Appendix A: FAQ
1. How do I configure the Router to access Internet by ADSL users? 1) 2) First, configure the ADSL Modem configured in RFC1483 bridge model. Connect the Ethernet cable from your ADSL Modem to the WAN port on the Router. The telephone cord plugs into the Line port of the ADSL Modem. 3) Log in to the Router, click the Network menu on the left of your browser, and click "WAN" submenu. On the WAN page, select PPPoE for WAN Connection Type. Type user name in the User Name field and password in the Password field, finish by clicking Connect.

Figure A-1 4)

PPPoE Connection Type
If your ADSL lease is in pay-according-time mode, select Connect on Demand or Connect Manually for Internet connection mode. Type an appropriate number for Max Idle Time to avoid wasting paid time. Otherwise, you can select Auto-connecting for Internet connection mode.

Figure A-2 Note: i.

PPPoE Connection Mode
Sometimes the connection cannot be disconnected although you specify a time to Max Idle Time, since some applications is visiting the Internet continually in the background. If you are a Cable user, please configure the Router following the above steps.

ii. 2.

How do I configure the Router to access Internet by Ethernet users?

- 90 -

TL-WR841N/TL-WR841ND 1)
Log in to the Router, click the Network menu on the left of your browser, and click "WAN" submenu. On the WAN page, select Dynamic IP for "WAN Connection Type", finish by clicking Save.
Some ISPs require that you register the MAC Address of your adapter, which is connected to your cable/DSL Modem during installation. If your ISP requires MAC register, log in to the Router and click the "Network" menu link on the left of your browser, and then click "MAC Clone" submenu link. On the "MAC Clone" page, if your PCs MAC address is proper MAC address, click the Clone MAC Address button and your PCs MAC address will fill in the "WAN MAC Address" field. Or else, type the MAC Address into the "WAN MAC Address" field. The format for the MAC Address is XX-XX-XX-XX-XX-XX. Then click the Save button. It will take effect after rebooting.

Sensitivity @PER

RF Power Antenna Gain
Environmental and Physical Temperature. Operating : 0~40 (32~104) Storage: -40~70(-40~158) Operating: 10% - 90% RH, Non-condensing Storage: 5% - 90% RH, Non-condensing

- 99 -

Humidity

Appendix D: Glossary

802.11n - 802.11n builds upon previous 802.11 standards by adding MIMO (multiple-input multiple-output). MIMO uses multiple transmitter and receiver antennas to allow for increased data throughput via spatial multiplexing and increased range by exploiting the spatial diversity, perhaps through coding schemes like Alamouti coding. The Enhanced Wireless Consortium (EWC) [3] was formed to help accelerate the IEEE 802.11n development process and promote a technology specification for interoperability of next-generation wireless local area networking (WLAN) products. 802.11b - The 802.11b standard specifies a wireless networking at 11 Mbps using direct-sequence spread-spectrum (DSSS) technology and operating in the unlicensed radio spectrum at 2.4GHz, and WEP encryption for security. 802.11b networks are also referred to as Wi-Fi networks. 802.11g - specification for wireless networking at 54 Mbps using direct-sequence spread-spectrum (DSSS) technology, using OFDM modulation and operating in the unlicensed radio spectrum at 2.4GHz, and backward compatibility with IEEE 802.11b devices, and WEP encryption for security. DDNS (Dynamic Domain Name System) - The capability of assigning a fixed host and domain name to a dynamic Internet IP Address. DHCP (Dynamic Host Configuration Protocol) - A protocol that automatically configure the TCP/IP parameters for the all the PC(s) that are connected to a DHCP server. DMZ (Demilitarized Zone) - A Demilitarized Zone allows one local host to be exposed to the Internet for a special-purpose service such as Internet gaming or videoconferencing. DNS (Domain Name System) An Internet Service that translates the names of websites into IP addresses. Domain Name - A descriptive name for an address or group of addresses on the Internet. DSL (Digital Subscriber Line) - A technology that allows data to be sent or received over existing traditional phone lines. ISP (Internet Service Provider) - A company that provides access to the Internet. MTU (Maximum Transmission Unit) - The size in bytes of the largest packet that can be transmitted. NAT (Network Address Translation) - NAT technology translates IP addresses of a local area network to a different IP address for the Internet. PPPoE (Point to Point Protocol over Ethernet) - PPPoE is a protocol for connecting remote

doc1

300Mbps Wireless N Router
http://www.tp-link.com/products/print.asp?pmodel=TL-WR841ND

Print Spotlight:

300M wireless transmission rate, 4 10/100M LAN ports MIMO technology with stronger signal penetration strength, wider wireless coverage, providing better performance and stability CCA technology automatically avoids channel conflicts using its channel selection feature Compatible with 11g and 11b equipment, Intel Centrino Compatibility tested

Product Description:

The TL-WR841ND Wireless N Router is a combined wired/wireless network connection device designed specifically for small business, office, and home office networking requirements. It complies with the IEEE 802.11n standard with wireless transmission speeds of up to 300M. The router adopts 2*2 MIMO technology and has two external Antennas providing even better wireless performance, transmission rates, stability and coverage. At the same time, CCA technology automatically avoids channel conflicts using its channel selection feature. It also works well with other 11g and 11n protocol wireless products.
The TL-WR841ND provides multiple security measures; supporting SSID broadcast control, MAC address access control, WEP encryption, WPA/WPA2, and WPA-PSK/WPA2-PSK authentication. At the same time QSS(Quick Secure Setup)complies with WPS allowing for worry-free wireless security configuration. These combined security features will guard against intruders using stronger, safer protection.
The TL-WR841ND allows companies, offices, and homes to share one Internet connection with more computers. Apart from this products simple setup and more common broadband router functions, it also supports priority of service where applications using a lot of bandwidth that are sensitive to interruptions such as voice and video are given priority in order to assure quality. The router also supports on-demand dialing, online access management, Automatic virus isolation, UPnP, DDNS, advanced system security record, friendly user interface, and simple, easy configuration allowing all users to comfortably configure the router. This is a fashionable product with superior performance and should be your first choice when setting up a network.
The device comes with a CD with an Easy Setup Assistant that helps you step by step to complete your Internet connection, wireless network settings and security configurations. This feature allows even novice users to setup the router products without sacrificing any key features, just play the AUTO-RUN CD bundled to have your network set up quickly & hassle-free.
*Some official firmware of TP-LINK products can be replaced by the third party firmware such as DD-WRT. TP-LINK does not provide technical support and does not guarantee the performance and stability of third party firmware. Damage to the product as a result of using third party firmware will void the product's warranty.

Product Features:

2 detachable omni directional antennas Supports PPPoE, Dynamic IP, and static IP broadband functions Automatic dialing, On-demand dialing, fixed time dialing, filling most dialing requirements Supports UPnP, DDNS, static routing, VPN Pass-through Supports virtual server, special application and DMZ host ideal for creating a website within your LAN Supports SSID broadcast control and MAC access control list

2010.12.14. 11:20

Supports 64/128/152-bit WEP, complies with 128 bit WPA standard(TKIP/AES), supports MIC, IV Expansion, Shared Key Authentication, IEEE 802.1X Built-in firewall features IP, MAC, URL filtering which flexibly controls online access and time Built-in DHCP server with automatic dynamic IP address distribution User interface supports free WEB software updates Supports configuration file backup and restore. Sleek exterior, can be mounted on a wall or placed horizontally on a table or desk

Product Specifications:

Software Specification IEEE 802.11n, IEEE 802.11g, IEEE 802.11b 11n: Up to 300Mbps(dynamic) 11g: Up to 54Mbps(dynamic) 11b: Up to 11Mbps(dynamic) 2.4-2.4835GHz 20dBm(Max. EIRP) DBPSK, DQPSK, CCK, OFDM, 16-QAM, 64-QAM 270M: -68dBm@10% PER 130M: -68dBm@10% PER 108M: -68dBm@10% PER Receiver Sensitivity 54M: -68dBm@10% PER 11M: -85dBm@8% PER 6M: -88dBm@10% PER 1M: -90dBm@8% PER

Standards

Wireless Signal Rates With Automatic Fallback
Frequency Range Wireless Transmit Power (MAX)

Modulation Technology

Hardware Specification 4 10/100M LAN Ports 1 10/100M WAN Port 5dBi Detachable Omni Directional Antenna X 2 Input: Localized to Country of Sale Output: 9VDC / 0.6A Switching PSU

Interface

Antenna

Power Supply Unit

Operating temperature Storage temperature Relative humidity Storage Humidity

0C~40C (32~104)

-40C~70C (-40~158)
10% ~ 90%, Non Condensation 5%~95% Non-Condensing

Dimensions

7.6 x 5.1 x 1.3 in.(192 x 130 x 33 mm)

 

Technical specifications

Full description

TL-WR841ND by TP-LINK (Factory New) The TL-WR841ND Wireless N Router is a combined wired/wireless network connection device designed specifically for small business, office and home networking requirements. It provides a simple, very fast, pleasing way to access internet or Ethernet without cables for work or fun. It complies with the IEEE 802.11n (Draft 2.0) standard with wireless transmission speeds of up to 300Mbps. The router features 4 10/100M switch ports to achieve the most effective data transmission. TL-WR841ND adopts MIMO technologies, has two external detachable Omni directional antennas providing even better wireless performance, transmission rates, stability and coverage. Modulation: DBPSK, DQPSK, CCK, OFDM, 16-QAM, 64-QAM. Security Features: PPPoE, MAC filtering, URL filtering, TKIP, AES. Wireless Security: 64/128/152-bit WEP encryption, WPA, WPA2, WPA-PSK, WPA2-PSK.

 

Tags

Roland R-5 DSP 244 Classic SC-AK240 Wireless N Router Series Carrera 124700 BCE1197 MW100 Kxtg7200FX FR-X9 WLI-CB-g54A SR2016 Astra 4500 BAR323HGN MR Slim Cordless 7 Pctv 400I BX-800 S8300 51 S DMR-E10 RR520U EL-733A Dell 540 DCR-DVD103 Pioneer A-X5 HP6517 Plus T Antenna LN55B650 GA-945GM-s2 FP720 Nuvi 5000 Mountaineer 2005 Carbon Arte Aqua Plus Subkick 8uhps VR730 SM940 Versatis 155 52xl2E DCR-DVD605 WS-32Z409P NP-R519-da04UA Pavilion 6700 VGN-T1xp-L MRP-T130 Travelmate-2000 QB516K KX-T7533NE H2200 Manual Office 45 Motorola H385 F1403TDS6 EM-S8588V Dista F700 T4502 VP-DX100H YP-T5H GBE211 RD-600 X-300 Cowon S9 Kaleo Black Comp Daisy DS2 MHC-GNV111D MRV-F407 TH-42PX8E Navisworks 2010 Cordless 1500 DAV-DZ555K Samsung K40 NAD 7125 DCR-TRV530 Beocom 5 Extensa-2900 CM-2600D Fostex 2412 MS8308D AX-530 Doro 615R KX-TGA551EX Dh65e S 16992751 Mark II AW-E560 SWR-1021D 145 S IT-C200 CF-VDW07 REV12 AWE 6515 F115HP-2005 CDJ-1000 Mk3 Firmware Speaker SAW305 2 0

 

manuel d'instructions, Guide de l'utilisateur | Manual de instrucciones, Instrucciones de uso | Bedienungsanleitung, Bedienungsanleitung | Manual de Instruções, guia do usuário | инструкция | návod na použitie, Užívateľská príručka, návod k použití | bruksanvisningen | instrukcja, podręcznik użytkownika | kullanım kılavuzu, Kullanım | kézikönyv, használati útmutató | manuale di istruzioni, istruzioni d'uso | handleiding, gebruikershandleiding

 

Sitemap

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101