THOMSON Gateway Configuration Manual page 32

Wireless configuration guide
Hide thumbs Also See for Gateway:
Table of Contents

Advertisement

Securing your WLAN
Securing a WLAN has evolved over the years. In this chapter you will find an overview of the techniques used
to secure your WLAN:
"3.1 Disabling SSID Broadcasting"
"3.2 MAC Address Filtering"
"3.3 Wired Equivalent Privacy (WEP)"
"3.4 Wi-Fi Protected Access (WPA)"
"3.5 WPA2"
26
Topic
Chapter 3
Security
Page
27
28
29
31
35
E-DOC-CTC-20060609-0001 v2.0

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents