THOMSON Gateway Configuration Manual

THOMSON Gateway Configuration Manual

Wireless configuration guide
Hide thumbs Also See for Gateway:

Advertisement

Thomson Gateway

Wireless Configuration Guide

Advertisement

Table of Contents
loading

Summary of Contents for THOMSON Gateway

  • Page 1: Thomson Gateway

    Thomson Gateway Wireless Configuration Guide...
  • Page 3 Thomson Gateway Wireless Configuration Guide...
  • Page 4 Distribution and copying of this document, use and communication of its contents is not permitted without written authorization from THOMSON. The content of this document is furnished for informational use only, may be subject to change without notice, and should not be construed as a commitment by THOMSON. THOMSON assumes no responsibility or liability for any errors or inaccuracies that may appear in this document.
  • Page 5: Table Of Contents

    4 Wi-Fi Multi Media (WMM)............37 5 Wireless Distribution System (WDS)........39 6 Virtual Access Points..............41 What is a Virtual Access Point? ..............42 Multiple SSIDs ....................44 Architectural Elements ................. 46 7 Thomson Gateway Wireless Configuration ......47 E-DOC-CTC-20060609-0001 v2.0...
  • Page 6 7.1.1 Connecting Wireless Stations for the First Time ................49 7.1.2 Configuring Wireless Stations......................51 7.1.3 Configuring the Thomson Gateway Access Point ................54 7.1.4 Connecting Additional Wireless Stations ................... 61 7.1.5 Configuring your Thomson Gateway with WDS ................63 7.1.6...
  • Page 7: About This Wireless Configuration Guide

    Output Comments Documentation and software updates THOMSON continuously develops new solutions, but is also committed to improving its existing products. For suggestions regarding this document, please contact documentation.speedtouch@thomson.net. For more information on THOMSON's latest technological innovations, documents and software releases, visit us at http://www.thomson-broadband.com.
  • Page 8 About this Wireless Configuration Guide E-DOC-CTC-20060609-0001 v2.0...
  • Page 9: Introducing Wireless Networking

    Chapter 1 Introducing Wireless Networking Introducing Wireless Networking Introduction IEEE 802.11 In the early ‘90s a lot of wireless systems were developed because people wanted to connect their laptop computers to the network (and Internet) when entering the office. The problem was that none of these systems was compatible with the other.
  • Page 10 Chapter 1 Introducing Wireless Networking > IS-95: IS-95 is a digital cellular standard from the United States that uses a Code Division Multiple Access (CDMA) scheme. In a CDMA system, users share time and frequency resources simultaneously. This occurs through assigning a distinct digital code to each user. This code is added to the information data and modulated onto the carrier, using spread spectrum techniques.
  • Page 11: Wlan Components And Terminology

    Chapter 1 Introducing Wireless Networking WLAN Components and Terminology Access point A WLAN base station or Access Point (AP) behaves as a networking hub, allowing to interconnect several devices wirelessly to the local WLAN. WLAN topologies A WLAN consists of several devices. The logical grouping of devices belonging to a particular WLAN is called service set.
  • Page 12 Chapter 1 Introducing Wireless Networking Basic Service Set (BSS) or infrastructure network This WLAN topology requires a specialized station, called an AP. Wireless stations do not communicate directly with one another, but all communication is passed to the destination via this central AP. APs can be connected to a wired network via an uplink port.
  • Page 13 Chapter 1 Introducing Wireless Networking Basic Service Set Identifier (BSSID) The Basic Service Set Identifier (BSSID) uniquely identifies each BSS. The BSSID is a 48-bit address with the same format as an IEEE 802 MAC address. The value of all 1s is used to indicate the broadcast BSSID. The station that starts the BSS determines the BSSID of that BSS, depending on the topology: >...
  • Page 14 Chapter 1 Introducing Wireless Networking Beacon frame Beacon frames are transmitted periodically by APs to let wireless stations identify the wireless APs nearby. They inform the wireless stations in the BSSs (and thus a possible ESS) about the existence of a wireless network.
  • Page 15 Chapter 1 Introducing Wireless Networking Standard Description 802.11g Further Higher-Speed Physical Layer Extension in the 2.4 GHz Band: 54 Mbps, 2.4 GHz standard (backwards compatible with b) (2003). 802.11h Spectrum and Transmit Power Management Extensions in the 5 GHz band in Europe: Spectrum Managed 802.11a for European compatibility (2004).
  • Page 16 Chapter 1 Introducing Wireless Networking IEEE 802.11b/g wireless Ethernet operates on the 2.4 GHz band, IEEE 802.11a operates on the 5 GHz band. The following illustration shows the different ISM bands. f (MHz) U-NII band U-NII stands for the Unlicensed National Information Infrastructure. The FCC has made 300 MHz of spectrum available for U-NII devices that will provide short-range, high speed wireless digital communications.
  • Page 17: 802.11 Standards

    Chapter 2 802.11 Standards 802.11 Standards 802.11 protocol stack The 802.11 protocol stack is very similar to the other 802 variants (such as Ethernet). The physical layer corresponds to the OSI physical layer and the data link layer is split into two sublayers: >...
  • Page 18 Chapter 2 802.11 Standards Overview The MAC sublayer and the three contemporary transmission techniques are described in the following chapter: Topic Page “2.1 MAC Sublayer” “2.2 802.11a” “2.3 802.11b” “2.4 802.11g” E-DOC-CTC-20060609-0001 v2.0...
  • Page 19: Mac Sublayer

    Chapter 2 802.11 Standards MAC Sublayer MAC architecture The MAC architecture uses the following two access methods: > Distributed Coordination Function (DCF): this is the fundamental access method of the MAC sublayer. The DCF is also known as Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA). This access method is implemented in all wireless stations, for use within both ad-hoc network and infrastructure network configurations.
  • Page 20 Chapter 2 802.11 Standards Distributed Coordination Function (DCF) The following components are important to understand the operation of the DCF: > Interframe space: in the DCF, a wireless station that wants to transmit a data frame must wait a specific amount of time after the station senses that the medium is not in use.
  • Page 21 Chapter 2 802.11 Standards Random backoff algorithm Backoff is a well known method to avoid collisions between several stations that want to access the medium. Each station must select a random number between 0 and a given value, called the Contention Window (CW). This random number is the number of 802.11 slot times that the station must wait before it is allowed to transmit.
  • Page 22 Chapter 2 802.11 Standards 802.11a Technical specifications The 802.11a standard operates in the U-NII band and applies Orthogonal Frequency Division Multiplexing (OFDM) as modulation technique. The data transfer rate can be up to 54 Mbps, but will be scaled back to 48, 36, 24, 18, 12, 9 or 6 Mbps (this is known as Adaptive Rate Selection) when the signal quality becomes an issue.
  • Page 23 Chapter 2 802.11 Standards Channel Centre Regulatory Domain Identifier Frequency America ETSI Japan Taiwan Singapore (GHz) 5.640 5.660 5.680 5.700 5.745 5.765 5.785 5.805 Users are responsible for ensuring that the channel set configuration is in compliance with the regulatory standards of the country they are residing. Spectral mask The spectral mask or Power Spectral Density (PSD) mask for the 802.11a standard is shown in the following figure:...
  • Page 24 Chapter 2 802.11 Standards Maximum power output The U-NII band is split into three working domains, with different power outputs allowed: > U-NII 1 band: maximum power output of 50 mW. > U-NII 2 band: maximum power output of 250 mW. >...
  • Page 25 Chapter 2 802.11 Standards 802.11b Technical specifications The 802.1b standard operates in the 2.4 GHz band and applies HR-DSSS with Complementary Code Keying (CCK), or optionally Packet Binary Convolutional Coding (PBCC) as modulation technique. The data transfer rate can be up to 11 Mbps, but will be scaled back to 5.5, 2 or 1 Mbps when the signal quality becomes an issue.
  • Page 26 Chapter 2 802.11 Standards Spectral mask The spectral mask for the 802.11b standard is shown in the following figure: 0 dBr -30 dBr -50 dBr Available channels An important concept regarding channel assignments is that the channel actually represents the centre frequency that the transceiver within the radio and access point uses (for example 2.412 GHz for channel 1 and 2.417 GHz for channel 2).
  • Page 27 Chapter 2 802.11 Standards Regulatory Domain Antenna Gain (dBi) Maximum Power Level (mW) EMEA (100 mW EIRP maximum) 13.5 Japan (10 mW/MHz EIRP maximum) 13.5 Israel (100 mW EIRP maximum) 13.5 Range 802.11b is usually used in a point-to-multipoint configuration, in which an access point communicates via an omni-directional antenna with one or more wireless stations that are located in a coverage area around the access point.
  • Page 28 Chapter 2 802.11 Standards 802.11g Technical specifications The 802.11g standard operates in the 2.4 GHz band and applies OFDM (Orthogonal Frequency Division Multiplexing) with CCK (Complementary Code Keying) or optionally PBCC (Packet Binary Convolutional Coding) as modulation technique. The data transfer can be up to 54 Mbps, but will be scaled back to 48, 36, 24, 18, 12, 9 or 6 Mbps (this is known as Adaptive Rate Selection), when the signal quality becomes an issue.
  • Page 29 Chapter 2 802.11 Standards Spectral mask The spectral mask for the 802.11g standard is shown in the following figure: 0 dBr -30 dBr Available channels An important concept regarding channel assignments is that the channel actually represents the centre frequency that the transceiver within the radio and access point uses (for example 2.412 GHz for channel 1 and 2.417 GHz for channel 2).
  • Page 30 Chapter 2 802.11 Standards Regulatory domain Antenna Gain (dBi) Maximum Power Level (mW) OFDM EMEA (100 mW EIRP maximum) Japan (10 mW/MHz EIRP maximum) Israel (100 mW EIRP maximum) Range 802.11g is usually used in a point-to-multipoint configuration, in which an access point communicates via an omni-directional antenna with one or more wireless stations that are located in a coverage area around the access point.
  • Page 31: Security

    Chapter 3 Security Security Introduction One of the major drawbacks of implementing a WLAN is the security issue. Finding wireless networks is easy. It is a requirement for wireless access points to announce themselves to the world. 802.11 beacon frames, used to broadcast network parameters, are sent unencrypted.
  • Page 32 Chapter 3 Security Securing your WLAN Securing a WLAN has evolved over the years. In this chapter you will find an overview of the techniques used to secure your WLAN: Topic Page “3.1 Disabling SSID Broadcasting” “3.2 MAC Address Filtering” “3.3 Wired Equivalent Privacy (WEP)”...
  • Page 33: Disabling Ssid Broadcasting

    SSID broadcast option (SSID broadcasting is by default enabled by most vendors). How to disable SSID broadcasting? To disable the SSID broadcast on your Thomson Gateway, see “ Configure page” on page 57 for residential devices or “...
  • Page 34: Mac Address Filtering

    > Software to change the MAC address of WLAN cards is available on the Internet. How to configure MAC address filtering? To configure MAC address filtering on your Thomson Gateway, see “ Configure page” on page 57 residential devices or “...
  • Page 35: Wired Equivalent Privacy (Wep)

    Chapter 3 Security Wired Equivalent Privacy (WEP) What is WEP? WEP is the optional security feature specified by the 802.11 standard. WEP offers both authentication and encryption mechanisms. When 802.11 security is enabled, each station has a secret key shared with the access point.
  • Page 36 802.11i standard took several years an intermediate measure called Wi-Fi Protected Access (WPA), was released. How to configure WEP? To enable WEP on your Thomson Gateway, see “ Enabling WEP” on page 58 for residential devices or “...
  • Page 37: Wi-Fi Protected Access (Wpa)

    Chapter 3 Security Wi-Fi Protected Access (WPA) In response to the weaknesses described in the previous section, Wi-Fi Protected Access (WPA) was developed. It was intended as an intermediate measure to take the place of WEP while 802.11i was elaborated. WPA is designed to work with all wireless network interface cards, but not necessarily with first generation wireless access points.
  • Page 38 Chapter 3 Security RADIUS authentication RADIUS stands for Remote Authentication Dial-In User Service. This is a client-server authentication, authorization and accounting protocol (AAA) used for remote network access. In order to do this, the RADIUS protocol prompts end users for their credentials through a Network Access Server, or NAS. The NAS is actually a client of a RADIUS server, which centrally controls user access to its client’s (the NAS) services.
  • Page 39 Chapter 3 Security WPA Pre-Shared Key (WPA-PSK) WPA offers a special mode where there is no 802.1x authentication infrastructure, permitting the use of a passphrase as a pre-shared key. WPA capable access points can act as authenticators and authentication servers at the same time. This gives non-enterprise users the ability to reduce costs and complexity by eliminating the need for a separate authentication server.
  • Page 40 How to configure WPA with RADIUS authentication? To enable WPA with RADIUS Authentication on your Thomson Gateway see “ WPA” on page Configuring your Thomson Gateway with WPA with RADIUS authentication is only possible with business devices. How to configure WPA-PSK? To configure your Thomson Gateway with WPA-PSK see “...
  • Page 41: Wpa2

    How to configure WPA2 with RADIUS authentication? To enable WPA2 with RADIUS Authentication on your Thomson Gateway see “ WPA” on page Configuring your Thomson Gateway with WPA2 with RADIUS authentication is only possible with residential devices. E-DOC-CTC-20060609-0001 v2.0...
  • Page 42 Chapter 3 Security E-DOC-CTC-20060609-0001 v2.0...
  • Page 43: Wi-Fi Multi Media (Wmm)

    Chapter 4 Wi-Fi Multi Media (WMM) Wi-Fi Multi Media (WMM) Introduction Applications running on wireless devices have equal access rights to transmit data frames. That works well for data traffic from applications such as Web browsers, file transfers and e-mail. For multimedia applications, however, this is inadequate.
  • Page 44 Chapter 4 Wi-Fi Multi Media (WMM) Extension to the DCF mechanism WMM is an enhancement of the MAC sublayer to add QoS functionality to Wi-Fi networks. WMM is an extension to the legacy CSMA/CA-based DCF mechanism that gives all devices equal access rights and that is based on a best effort, “listen-before-talk”...
  • Page 45: Wireless Distribution System (Wds)

    Chapter 5 Wireless Distribution System (WDS) Wireless Distribution System (WDS) What is WDS? WDS is the acronym for Wireless Distribution System. WDS functionality enables the interconnection of several access points (AP) wirelessly and can thus be used to extend the range of wireless service coverage. WDS includes: >...
  • Page 46 Chapter 5 Wireless Distribution System (WDS) Disadvantages of WDS Despite the advantages, WDS also has some drawbacks: > Reduced performance. > Only WEP encryption is possible. E-DOC-CTC-20060609-0001 v2.0...
  • Page 47: Virtual Access Points

    Chapter 6 Virtual Access Points Virtual Access Points Introduction A virtual access point (AP) is a logical entity that exists within a physical AP. By the use of multiple virtual APs, a single physical AP can simultaneously offer access to multiple service networks by advertising multiple SSIDs.
  • Page 48: What Is A Virtual Access Point

    Chapter 6 Virtual Access Points What is a Virtual Access Point? Concept A virtual access point (AP) is a logical entity that exists within a physical AP. A single physical AP can support multiple virtual APs. Wireless stations cannot distinguish a situation with multiple physical APs from a situation with multiple virtual APs within a single physical AP.
  • Page 49 Chapter 6 Virtual Access Points Emulation of physical APs In order to provide wireless stations with the impression of multiple physical APs within the same area, a virtual AP must emulate the operation of a physical AP. A virtual AP implementation can approximate the behaviour of a physical AP to a greater or lesser degree.
  • Page 50: Multiple Ssids

    “secondary” SSIDs. > discovery: this approach does not allow the discovery of new SSIDs and capability sets, except by snooping of probe responses. This approach is used in R.6.2 of the Thomson Gateway. E-DOC-CTC-20060609-0001 v2.0...
  • Page 51 BSSID to which pre-authentication frames are directed. This allows virtual APs to distinguish their pre-authentication traffic. This approach will be used in R.7.2 of the Thomson Gateway. Each virtual AP operates with a different locally unique BSSID. This BSSID is derived from the Thomson Gateway unique MAC address, which is assigned at manufacturing time.
  • Page 52: Architectural Elements

    Chapter 6 Virtual Access Points Architectural Elements In order to support applications with multiple SSIDs, an AP may need the following additional architectural elements: > Multiple capability advertisements: since each virtual AP may wish to offer a different set of services, each virtual AP must advertise its own set of capabilities.
  • Page 53: Thomson Gateway Wireless Configuration

    “7.2 Expert Configuration” on page Virtual Access Point functionality (multiple SSIDs) can - if supported by the Thomson Gateway - be configured via the device’s Command Line Interface (CLI). For more information, see the “CLI Reference Guide” of your Thomson Gateway model.
  • Page 54: Basic Configuration

    Basic Configuration Overview This section describes the basic configuration for your Thomson Gateway Access Point (AP). The basic configuration is the same for all Thomson Gateway devices equipped with an AP. You will find detailed information about the following items:...
  • Page 55: Connecting Wireless Stations For The First Time

    The default network name (SSID) is printed on the identification label located at the bottom of your Thomson Gateway and is unique for each device. It consists of the concatenation of the word “SpeedTouch” and 6 hexadecimal characters, without any spaces, for example SpeedTouch123456.
  • Page 56 Chapter 7 Thomson Gateway Wireless Configuration First-time association example The example below shows how the Thomson Gateway wireless network is presented by a Windows XP Service Pack 2 system. To associate your wireless station to the Thomson Gateway: Click the network icon in the notification area: The Wireless Network Connection window appears: In the Choose a wireless network list, select the Thomson Gateway wireless network and click Connect.
  • Page 57: Configuring Wireless Stations

    Accessing the wireless station settings page To view the basic settings for your wireless station: In the Thomson Gateway menu, click Home Network (residential) or Office Network (business) and click Devices to view the Detected Devices. In the Detected Device(s) list, click the name of the wireless station that you want to view and the Overview page appears.
  • Page 58 Status displays whether the station is currently connected to the Thomson Gateway network. Type displays the device type. Connected To displays the interface to which the wireless station is currently connected. Allowed on WLAN indicates whether the wireless station is allowed to connect to the Thomson Gateway WLAN or not. >...
  • Page 59 Chapter 7 Thomson Gateway Wireless Configuration Configure page On the Configure page you can: > Change the name of the wireless station. > Select the type of device you have connected to the WLAN. > Assign a static DHCP server lease to the wireless station by selecting the Always use the same address check box.
  • Page 60: Configuring The Thomson Gateway Access Point

    Accessing the access point settings page To view the basic settings for your Access Point (AP): In the Thomson Gateway menu, click Home Network (residential) or Office Network (business) and the overview of your Home Network appears. Under Wireless, click the AP that you want to view and the Overview page appears.
  • Page 61 Only stations that are configured in 802.11g mode can associate. Actual Speed displays the current transmission speed. Channel Selection displays whether you select a fixed channel yourself or the Thomson Gateway selects a channel for you. Region: displays your region.
  • Page 62 The Wired Equivalent Protocol (WEP) > WPA-Pre Shared Key (WPA-PSK) The default WEP key and the default WPA key are printed on the Thomson Gateway bottom label. Before configuring the Thomson Gateway encryption, make sure you have determined an encryption method that is common to ALL your wireless stations.
  • Page 63 Thomson Gateway Wireless Configuration Configuring your access point settings To configure the basic settings for your AP: In the Thomson Gateway menu click Home Network. Under Wireless, click the AP that you want to configure. Click Configure to display the Configure page.
  • Page 64 Select the access control mode: New stations are allowed (automatically): All new stations can access the Thomson Gateway WLAN. New stations are allowed (via registration): Only allowed stations in the Access Control List (ACL) have access. You can add new stations via registration.
  • Page 65 Thomson Gateway Wireless Configuration Configure your wireless station(s) with the same settings. Enabling WPA-PSK The Thomson Gateway supports WPA-PSK, which offers three advantages over WEP: > Authentication via a 4-way handshake to check whether the Pre-Shared Keys (PSKs) are the same.
  • Page 66 Chapter 7 Thomson Gateway Wireless Configuration In the WPA-PSK Version list, click the desired WPA-PSK version. Depending on the WPA-PSK version you choose, one of the following WPA-PSK encryption will be set automatically: > WPA: TKIP > WPA2: AES >...
  • Page 67: Connecting Additional Wireless Stations

    Depending on the personalised wireless settings: Make sure you use the same encryption or security level on the wireless station as on your Thomson Gateway. If, for instance, WPA-PSK is enabled on the Thomson Gateway, you must also configure the wireless station to use WPA-PSK and configure the same WPA-PSK passphrase.
  • Page 68 The Thomson Gateway searches for new wireless stations that use the encryption key of the Thomson Gateway AP. The Thomson Gateway takes you to the Home Network. The new station will be shown next to the name of the Thomson Gateway WLAN.
  • Page 69: Configuring Your Thomson Gateway With Wds

    The Thomson Gateway and the wireless repeater do not necessarily need to use the same SSID. Using different SSIDs allows you to force the wireless stations to use either the AP of the Thomson Gateway or the one of the wireless repeater.
  • Page 70 Thomson Gateway Wireless Configuration Click OK. The Thomson Gateway scans for access points on the same radio channel. Select your repeater in the List of Accessible Access Points, and then click Apply. The Thomson Gateway allows you to add up to four wireless repeaters.
  • Page 71: Reset To Factory Defaults

    Reset to Factory Defaults Introduction The Reset to Factory Defaults page allows you to reset the Thomson Gateway to return to the initial configuration of your Thomson Gateway. You can perform a software reset on both, residential and business devices. You can only perform a hardware reset on business device.
  • Page 72 Reset ciation 18VAC Console Release the reset button. The Thomson Gateway restarts. Your system administrator may have disabled the physical reset button of the Thomson Gateway. In this case, a hardware reset to default settings is not possible. E-DOC-CTC-20060609-0001 v2.0...
  • Page 73: Expert Configuration

    Networks: to scan for wireless stations in your neighbourhood and scan for, view, configure WDS connections with other wireless devices. Be aware that in case you are connected wirelessly to the Thomson Gateway and you change its wireless access point settings, wireless connectivity may be lost!
  • Page 74 Chapter 7 Thomson Gateway Wireless Configuration Overview You will find detailed information about the following items: Topic Page “7.2.1 Access Point Settings” “7.2.2 Security” “7.2.3 Associated Stations” “7.2.4 Networks” E-DOC-CTC-20060609-0001 v2.0...
  • Page 75: Access Point Settings

    Displays the current modulation rate in which the Thomson Gateway is operating. Take into consideration that if the distance between the Thomson Gateway and the wireless stations increases the throughput decreases. Walls, closets and big metal objects have a negative influence.
  • Page 76 Only stations that are configured in 802.11g mode can associate. Click Apply to immediately apply your changes. Channel By default the Thomson Gateway chooses its radio channel automatically at start-up of the AP on basis of the least interference with other APs. To update the channel: Click update to let the Thomson Gateway re-evaluate the aerial conditions to base the new channel selection on.
  • Page 77 Click Apply to immediately apply your changes. When you enable this option, the SSID will not be broadcast. The Thomson Gateway wireless network will no longer be visible in the list of available networks of your wireless station. Enable/disable the wireless interface To disable your wireless interface: Clear Wireless interface enabled.
  • Page 78: Security

    “ WPA” on page By default, the Thomson Gateway AP uses security level 0, implying that no encryption is used for wireless networking. In case security level 1 or 2 is active, select Security Level 0 - no encryption to return to security level 0.
  • Page 79 WEP relies on a secret key that is shared between the wireless station (e.g. a laptop with a wireless ethernet card) and the Thomson Gateway. The fixed secret key is used to encrypt packets before they are transmitted. I.e. during transmission between station and AP ("in the air"), the information in the packets is encrypted.
  • Page 80 Chapter 7 Thomson Gateway Wireless Configuration To enable level2 - WPA-PSK: Select Security Level 2 - WPA-PSK (WPA Personal). In the WPA passphrase box, type a passphrase (also known as Pre-shared key) of your choice. The passphrase must consist of 8 to 63 ASCII characters or 64 HEX digits.
  • Page 81 Chapter 7 Thomson Gateway Wireless Configuration WPA is the highest form of security available, but make sure that your wireless station and client manager are compatible with it. If you want to use this level of encryption you must have a RADIUS (Remote Authentication Dial-in User Service) server installed on your network.
  • Page 82 You can use the Association / Registration button to allow wireless stations to enter the access control list. This button can be found on the back panel of the Thomson Gateway, or on the Access Control tab. Pressing this button triggers the Thomson Gateway to unlock the access control list for a time frame of one minute, after which the access control list is locked again.
  • Page 83: Associated Stations

    Change the name of the station (optional but recommended). In the Allowed list, click: Yes to allow it to exchange data with other stations. No to explicitly deny the station to associate with the Thomson Gateway. Click Apply to immediately apply your changes. E-DOC-CTC-20060609-0001 v2.0...
  • Page 84: Networks

    The Thomson Gateway scans all channels for wireless networks. The Thomson Gateway lists the available networks in the table. The Wireless Distribution System (WDS) allows you to extend the range of your Thomson Gateway by means of one or more wireless repeater(s).
  • Page 86: Prins Boudewijnlaan

    THOMSON Telecom Belgium Prins Boudewijnlaan 47 2650 Edegem www.thomson-broadband.com © THOMSON 2007. All rights reserved. E-DOC-CTC-20060609-0001 v2.0.

Table of Contents