Chapter 3: advanced configuration – Technicolor - Thomson TCW710 User Manual
Page 65
Chapter 3: Advanced Configuration
Illustrations contained in this document are for representation only.
57
Setting
Description
Value List or Range
Default
Network
Authentication
Sets the network authentication
method. 802.1X and WPA require that
valid RADIUS parameters be set.
WPA-PSK requires a valid WPA
Pre-Shared Key to be set.
Disabled, 802.1x, WPA, WPA-PSK Disabled
WPA Pre-Shared
Key
Sets the WPA Pre-Shared Key (PSK).
Depends on Network
Authentication setting. See Table
3.
WPA Group Rekey
Interval
Sets the WPA Group Rekey Interval in
seconds. Set to zero to disable
periodic rekeying.
Depends on Network
Authentication setting. See Table
3.
0
RADIUS Server
Sets the IP address of the RADIUS
server to use for authentication and
dynamic key derivation.
Depends on Network
Authentication setting. See Table
3.
RADIUS Port
Sets the UDP port number of the
RADIUS server. The port number is
usually 1812 or 1645 and depends
upon the server.
Depends on Network
Authentication setting. See Table
3.
1812
RADIUS KEY
Sets the shared secret for the RADIUS
connection.
Depends on Network
Authentication setting. See Table
3.
Data Encryption
Selecting Off disables data encryption.
Selecting WEP enables WEP data
encryption and requires that a valid
network key be set and selected
unless 802.1X is enabled.
Depends on Network
Authentication setting. See Table
3.
Off (Disabled, 802.1x);
TKIP (WPA, WP-PSK)
Shared Key
Authentication
Sets whether shared key
authentication is required to
associate. A valid network key must be
set and selected if required.
Depends on Network
Authentication setting. See Table
3.
Optional
PassPhrase1
Sets the text to use for WEP keys
generation.
Depends on Network
Authentication and Data
Encryption settings. See Table 3
and Table 4.
Network Key 1 thru
Network Key 4
Enter 5 ASCII characters or 10
hexadecimal digits for a 64-bit key.
Enter 13 ASCII characters or 26
hexadecimal digits for a 128-bit key.
Depends on Network
Authentication and Data
Encryption settings. See Table 3
and Table 4.
Current Network
Key
Selects which network key is used for
encrypting outbound data and/or
authenticating clients.
Depends on Network
Authentication and Data
Encryption settings. See Table 3
and Table 4
1
Table 2. Privacy Settings Definitions