Page 36 / 79 Scroll up to view Page 31 - 35
32
4 The TG589vn v3 Wireless Access Point
DMS-CTC-20130614-0000 v2.0
4.4 Securing Your Wireless Connection
Introduction
You can protect the wireless communication between the wireless clients and your TG589vn v3 with a wireless key. This
means that:
Only clients which use the correct Network Name (SSID) and wireless key can connect to your network.
All data passing through your wireless access point is secured and encrypted.
Encryption types
Over the years a number of encryption types have been developed. The list below gives you an overview of the supported
encryption types ordered by descending security level; you will find the highest level of security at the top of the list:
WPA-PSK Encryption:
The wireless connection is secured with a pre-shared key that has been defined by the user. Wireless clients must be
configured with this key before they can connect to the TG589vn v3. The TG589vn v3 supports the following WPA-PSK
versions (ordered by descending security):
WPA2-PSK:
The most recent and most secure version of WPA-PSK. Choose this version if you are sure that all your wireless clients
support WPA2-PSK.
WPA-PSK + WPA2-PSK
:
This is a mixed mode. In this mode WPA2-PSK, is the preferred encryption type but wireless clients do not support
WPA2-PSK, can still use WPA-PSK as encryption type. Choose this option if not all of your wireless clients support
WPA2-PSK or if you are not sure. Wireless clients that support WPA2-PSK will use WPA2-PSK, the others will use
WPA-PSK.
WPA-PSK
:
The first version of
WPA-PSK.
Choose this option if you are sure that none of your wireless clients support
WPA2-PSK.
WEP Encryption:
The least safe encryption type used for wireless connections. Like WPA-PSK it uses a user-defined key, but WEP has
been proven to have security issues.
Configuration
Proceed as follows:
1
Browse to the
TG589vn v3 GUI
.
For more information, see
“Accessing the TG589vn v3 GUI” on page 23
.
2
Under
Home Network
, click
Wireless
.
3
The
Wireless Access Point
page appears. In the upper-right corner, click
Configure
.
4
In the
Security Mode
list, select one of the following modes:
WPA-PSK
WPA2-PSK
If you want to configure WPA2-PSK on the built-in wireless utility of Windows XP Service Pack 2 (SP2), you first
have to:
Upgrade your Windows XP to Service Pack 3.
- or -
Install the following update:
http:/
/
support.micr
osoft.
com/
kb/
917
021
.
Although the TG589vn v3 allows you to use WEP or no security, we strongly advise against using one of them!
Use
WPA(2)-PSK
instead.
Page 37 / 79
33
4 The TG589vn v3 Wireless Access Point
DMS-CTC-20130614-0000 v2.0
WPA-PSK + WPA2-PSK
For more information, see
“Encryption types” on page 32
.
5
In the
WPA-PSK Encryption Key
box, type a the key of your choice. The key must be in one of the following formats:
8 to 63 alphanumeric characters. For example: MyKey123
8 to 64 hexadecimal characters (characters from 0 to 9 and from A to F). For example: C54F48A5.
6
Click
Apply
.
7
Reconnect your wireless client(s) to the TG589vn v3 using these new security settings.
For more information, see
“4.1 Connecting Your Wireless Client via WPS” on page 28
or
“4.2 Connecting Your Wireless
Client without WPS” on page 30
.
Page 38 / 79
34
5 Saving Energy
DMS-CTC-20130614-0000 v2.0
5 Saving Energy
Code of Conduct
To prove its commitment to protect the environment, Technicolor has signed the Code of Conduct, a global agreement to
reduce the power consumption of broadband access devices.
For more information, see
“5.1 Code of Conduct” on page 35
.
Technicolor power saving innovations
To further reduce the power consumption, Technicolor has developed the
ECO Manager
. This system constantly monitors
the services provided by the TG589vn v3 and automatically switches unused services to an ECO-friendly state. For more
information, see
“5.2 ECO Manager” on page 36
.
Next to this automated tool, you can also choose to manually disable services that you will not be using. For more
information,
“5.3 Manually Switching Off Services to Reduce Power” on page 37
.
Page 39 / 79
35
5 Saving Energy
DMS-CTC-20130614-0000 v2.0
5.1 Code of Conduct
Power states
Code of Conduct provides rules for the power consumption in:
Full power state:
This is the normal operation mode of the device, where all functionality is enabled.
Low power state:
When there is no user traffic on the device, the device should switch to low power mode. This is a state in which devices
are only allowed to use a limited amount of energy to be able to power its components and respond to user activity.
Example
Take the following example:
The user switches off his computer at 20:00.
There are no other devices connected to the TG589vn v3.
The TG589vn v3 switches to low power mode. This results in a considerable drop in the overall power consumption of the
TG589vn v3.
No user traffic
User traffic
Time
Power
Consumption
Full power limit
Low power limit
20:00
Page 40 / 79
36
5 Saving Energy
DMS-CTC-20130614-0000 v2.0
5.2 ECO Manager
Introduction
The TG589vn v3 constantly monitors the user activity and uses this information to optimise the power consumption:
For example:
The TG589vn v3
reduces the clock frequency of the central processor
when there is no or low user activity. This lowered
clock frequency will result in a lower power consumption of the TG589vn v3.
Disable the USB port(s)
when they are not used
Switch the wireless interface to power reduction mode
.
Wireless access point power reduction mode
When the TG589vn v3 access point switches to power reduction mode, the access point is switched off and is only power on
periodically to be able to detect new clients. If new clients are detected the wireless access point is fully powered again. This
is only possible if there are no devices connected to the TG589vn v3.
Power reduction is enabled by default, but it is possible to disable it via the TG589vn v3 GUI. To configure power reduction:
1
Browse to the TG589vn v3 GUI.
For more information, see
“Accessing the TG589vn v3 GUI” on page 23
.
2
Under
Home Network
, click
Wireless
.
3
In the
Navigation bar
, click
Configure
.
4
Under
Configuration
:
Select
Power Reduction Enabled
to enable power reduction.
Clear
Power Reduction Enabled
to disable power reduction.
5
Click
Apply
.
Example
If we use the same example as in the previous section, you can see that the TG589vn v3 is now able to further reduce the
power consumption in periods where less action is required from the TG589vn v3.
No User Traffic
User Traffic
Time
20:00
Time
Power
Consumption
Full power limit
Low power limit

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top