Page 31 / 72 Scroll up to view Page 26 - 30
E-DOC-CTC-20080527-0004 v2.0
25
4
Wireless
4.3
Securing Your Wireless Connection
Introduction
By using encryption, communication between the wireless clients and your Thomson Gateway is protected
by a passphrase. Only clients which use the correct network name (SSID) and passphrase can connect to your
network.
Encryption methods
During the years a number of encryption types have been developed. The list below gives you an overview of
the supported encryption types ordered by security level, you will find the highest level of security at the top
of the list:
±
WPA-PSK Encryption:
The wireless data is being encrypted with a user-defined key. Wireless clients must be configured with
this key before they can connect to the Thomson Gateway.
±
WEP Encryption:
The first encryption type used for wireless connections. Like WPA-PSK it uses a user-defined key, but WEP
has been proven to have some security issues. We strongly recommend you to use WPA-PSK instead.
WPA-PSK versions
The Thomson Gateway supports the following WPA-PSK versions:
±
WPA2
(also referred to as WPA2-PSK):
WPA2 is the most secure version, but not all wireless clients already support it. Before you select this
version, make sure all of your wireless clients support it.
±
WPA+WPA2
:
If not all of your wireless clients support WPA2 or you are not sure if they support WPA2, we recommend
you to choose WPA+WPA2. Wireless clients that support WPA2 will use WPA2, the others will use WPA.
±
WPA
:
If none of your wireless clients support WPA2 choose this option.
Which encryption method should I use?
We strongly recommend you to
use the highest level
of encryption that is supported by all your wireless
clients.
Configuring the wireless encryption
Proceed as follows:
1
Open the
Thomson Gateway Web Interface
.
2
On the left menu, click
Home Network
.
To use WPA2 on Windows XP Service Pack 2 (SP2)you first have to install Wi-Fi Protected Access 2
(WPA2)/Wireless Provisioning Services Information Element (WPS IE) update or install SP3.
You can find the WPS IE update on
.
Page 32 / 72
E-DOC-CTC-20080527-0004 v2.0
26
4
Wireless
3
Under
Wireless
, click your access point.
4
The
Wireless Access Point
page appears.
5
In the
Location bar
, click
Configure
.
6
Under
Security
, you can change the
Encryption
. If you want to use:
²
WPA-PSK Encryption, continue with
“4.3.1 Configuring WPA-PSK Encryption” on page 27
.
²
WEP Encryption, continue with
“4.3.2 Configuring WEP Encryption” on page 28
.
Your access point will be listed in the following format: “WLAN:<Network Name> (<Actual
Speed>)”. For example,
WLAN: Thomson83C7C7 (54Mbps)
.
Page 33 / 72
E-DOC-CTC-20080527-0004 v2.0
27
4
Wireless
4.3.1
Configuring WPA-PSK Encryption
Procedure
Continuing from
“ Configuring the wireless encryption”
:
1
Select
Use WPA-PSK Encryption
.
2
In the
WPA-PSK Encryption Key
box, type a pass phrase (also known as Pre-shared key) of your choice.
The pass phrase must consist of 8 to 63 alphanumeric characters or 64 hexadecimal characters
(characters from 0 to 9 and from A to F).
3
In the
WPA-PSK Version
list, click the WPA-version of your choice. Following options are available:
²
WPA2:
WPA2 is the most secure version, but not all wireless clients already support it. Before you select this
version, make sure all of your wireless clients support it.
²
WPA+WPA2
:
If not all of your wireless clients support WPA2 or you are not sure if they support WPA2, we
recommend you to choose WPA+WPA2. Wireless clients that support WPA2 will use WPA2, the
others will use WPA.
²
WPA
:
If none of your wireless clients support WPA2 choose this option.
4
Click
Apply
.
5
Configure your wireless client(s) with the same settings.
To use WPA2 on Windows XP Service Pack 2 (SP2)you first have to install Wi-Fi Protected
Access 2 (WPA2)/Wireless Provisioning Services Information Element (WPS IE) update or install
SP3.
You can find the WPS IE update on
.
Page 34 / 72
E-DOC-CTC-20080527-0004 v2.0
28
4
Wireless
4.3.2
Configuring WEP Encryption
Procedure
Continuing from
“ Configuring the wireless encryption”
:
1
Select
Use WEP Encryption
2
In the
WEP Key Length
list, click the desired key length (a higher key length offers higher security).
3
In the
Encryption key
box, type a Network key of your choice. If you are using:
²
A 64-bit key:
Type 10 hexadecimal characters (characters from 0 to 9 and from A to F) or 5 alphanumeric
characters.
²
A 128-bit key:
Type 26 hexadecimal characters (characters from 0 to 9 and from A to F) or 13 alphanumeric
characters.
4
Click
Apply
.
5
Configure your wireless client(s) with the same settings.
Page 35 / 72
E-DOC-CTC-20080527-0004 v2.0
29
5
Telephony
5
Telephony
Voice over IP (VoIP)
VoIP is a technology in which telephone calls are made over the Internet. This allows you to save on
communication costs, especially for long-distance calls.
The old solution
To be able to make your phone calls over the Internet you could:
±
Buy an IP phone.
These IP phones are special phones that you can connect to your Internet Gateway.
±
Install VoIP software on your computer and make your phones calls via your computer.
The Thomson solution
With the Thomson Gateway you can make both Internet and regular telephone calls using:
±
A traditional analogue phone.
If the device is not powered, the Thomson Gateway will automatically select the analogue signal (if
connected). This way you are still able to make emergency calls.
In this chapter
This chapter covers following topics:
Topic
Page
Connecting a Regular Phone to Your Thomson Gateway
30
Configuring the Telephony Service
31
Address Book
33
Telephony services
34
Viewing Telephony Statistics
38

Rate

124.8 / 5 based on 304 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top