THOMSON TG585 v8 Setup And User Manual page 33

Wireless multi-user adsl2+ gateway
Hide thumbs Also See for TG585 v8:
Table of Contents

Advertisement

   
3
3
.3
.3
Se
Secu
Introduction
Introduction
By using encryption, you can protect the wireless communication between the wireless clients and your
By using encryption, you can protect the wireless
Thomson Gateway with a wireless key. This way, only clients which use the c
Thomson Gateway with a wireless key. This way, only clients which use the correct Network Name (SSID)
and wireless key can connect to your network.
and wireless key can
Encryption types
Encryption types
Over the years a number of encryption types have been developed. The list below gives
Over the years a number of encryption types
the supported encryption types ordered by descending security level, you will find the highest level of
the supported encryption types ordered by descending security level, you will
security at the top of the list:
security at the top of the list:
WPA-PSK Encryption:
WPA-PSK Encryption:
The wireless data is being encrypted with a user-defined key. Wireless clients must be configured with
The wireless data is being
this key before they can
this key before they can connect to the Thomson Gateway.
WEP Encryption:
WEP Encryption:
The first encryption type used for wireless
The first encryption type used for wireless connections. Like WPA-PS
has been proven to have some security issues.
has been proven to have some
 Which encryption type should I use?
 Which encryption typ
We strongly recommend you to
We strongly recommend you to WPA-PSK 
Although the Thomson Gateway allows you to use WEP or
Although the Thomson Gateway allows you to use WEP or no security, it is not recommended to use these
settings. Only use WEP if you have wireless clients that don't support a higher encryption level.
settings. Only use WEP if you
Configuring the wireless encryption
Configuring the wireless encryption
Proceed as follows:
Proceed as follows:
1
1
Open the
Open the Thomson Gateway GUI
2
2
On the left menu, click Home Network
On the left menu, click
3
3
Under
Under Wireless
Y Y our access point
our access point is listed in
example, WLAN: Thomson83C7C7 (54Mbps)
example,
4
4
The Wireless Access Point
The
Wireless Access Point  page appears.
5
5
In the Navigation bar
In the
6
6
Under Security
Under
WP
WPA-PSK encryption, continue
WEP encryption, continue with
WEP encryption, continue with "3.3.2
E-DOC-
E-DOC-CTC-2009
CTC-20090708-000
0708-0001
curi ring
ng
Y
Y
ou
our
r
Wi
Wire rele less
connect to your network.
encrypted with a user-defined key. Wireless clients must be configured with
connect to the Thomson Gateway.
security issues. We strongly recommend you to
e should I use?
WPA-PSK 
have wireless clients that don't support a higher encryption level.
Thomson Gateway
GUI. .
Home Network . .
Wireless , click your access point.
, click your access point.
is listed in the following format: "WLAN:<Network Name> (<Actual Speed>)". For
the following format: "WLAN:<Network Name> (<Actual Speed>)". For
WLAN: Thomson83C7C7 (54Mbps) . .
 page appears.
Navigation
bar, click
, click Configure
Configure . .
Security , you can change the
, you can change the Encryption
A-PSK encryption, continue with
1
v1.0
v1.0
ss
C
C
on
onne
nect ctio ion
n
communication between the wireless clients and your
have been developed. The list below gives you an overview of
connections. Like WPA-PSK it uses a
We strongly recommend you to
. .
no security, it is not recommended to use these
Encryption . If you want to use:
. If you want to use:
with "3.3.1
"3.3.1
Configuri
Confi
guring WPA
ng
WPA-PSK Encry
"3.3.2
Configur
Conf
iguring WEP Enc
ing WEP
Encrypt
3
3
 Wireless Access
 Wireless Access
orrect Network Name (SSID)
you an overview of
find the highest level of
K it uses a user-defined key
user-defined key, but WEP
use WPA-PSK instead.
use WPA-PSK instead.
-PSK
Encryption
ption" on
" on
page
page
ryption" on page
ion" on page
29. .
29
, but WEP
28. .
28
27
27

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents