Gateway - Wireless Web Page Group - THOMSON TWG870 User Manual

Wireless voice gateway
Hide thumbs Also See for TWG870:
Table of Contents

Advertisement

Chapter 2: WEB Configuration
Gateway – Wireless Web Page Group
The Wireless web pages group enables a variety of settings that can provide secure and reliable
wireless communications for even the most demanding tech-savvy user.
The Wireless Voice Gateway offers a choice of 802.1x, WPA and WPA-PSK authentication of your
PCs to the gateway, 64 and 128 bit WEP encryption of communication between the gateway and your
PCs to guaranty security, and an Access Control List function that enables you to restrict wireless
access to only your specific PCs.
Performance
Because your wireless communication travels through the air, the factory default wireless channel
setting may not provide optimum performance in your home if you or your neighbors have other
interfering 2.4GHz devices such as cordless phones. If your wireless PC is experiencing very sluggish
or dramatically slower communication compared with the speed you achieve on your PC that is wired
to the gateway, try changing the channel number. See the 802.11b/g Basic Web Page discussion below
for details.
Authentication
Authentication enables you to restrict your gateway from communicating with any remote wireless
PCs that aren't yours. The following minimum authentication-related changes to factory defaults are
recommended. See the 802.11b/g Basic and Access Control Web Page discussions below for details.
Network Name (SSID) – Set a unique name you choose
Network Type – Set to Open
Access Control List – Enter your wireless PCs' MAC addresses
Security
Security secures or scrambles messages traveling through the air between your wireless PCs and the
gateway, so they can't be observed by others. The following minimum security setting changes to
factory defaults are recommended. See the 802.11b/g Security Web Page discussion below for details.
Data Encryption – Set to WPA (64-bit)
PassPhrase – Use this feature to generate security keys
53
Illustrations contained in this document are for representation only.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents