Chapter 3: Advanced Configuration

Setting

Description

 

Value List or Range

Default

 

 

 

 

 

 

Network

Sets the network authentication method.

 

Disabled, 802.1x, WPA,

Disabled

Authentication

802.1X and WPA require that valid RADIUS

 

WPA-PSK

 

 

parameters be set. WPA-PSK requires a valid

 

 

 

 

WPA Pre-Shared Key to be set.

 

 

 

 

 

 

 

 

WPA Pre-

Sets the WPA Pre-Shared Key (PSK).

 

Depends on Network

<NULL>

Shared Key

 

 

Authentication setting. See Table 3.

 

WPA Group

Sets the WPA Group Rekey Interval in

 

Depends on Network

0

Rekey Interval

seconds. Set to zero to disable periodic

 

Authentication setting.

 

 

rekeying.

 

See Table 3.

 

 

 

 

 

 

RADIUS

Sets the IP address of the RADIUS server

 

Depends on Network

<NULL>

Server

to use for authentication and dynamic key

 

Authentication setting.

 

 

derivation.

 

See Table 3.

 

RADIUS Port

Sets the UDP port number of the RADIUS

 

Depends on Network

1812

 

server. The port number is usually 1812 or

 

Authentication setting.

 

 

1645 and depends upon the server.

 

See Table 3.

 

 

 

 

 

 

RADIUS KEY

Sets the shared secret for the RADIUS

 

Depends on Network Authentication

<NULL>

 

connection.

 

setting. See Table 3.

 

 

 

 

 

 

Data

Selecting Off disables data encryption.

 

Depends on Network

Off (Disabled,

Encryption

Selecting WEP enables WEP data

 

Authentication setting.

802.1x); TKIP

 

encryption and requires that a valid

 

See Table 3.

(WPA, WP-

 

network key be set and selected unless

 

 

PSK)

 

802.1X is enabled.

 

 

 

Shared Key

Sets whether shared key authentication is

 

Depends on Network

Optional

Authentication

required to associate. A valid network key

 

Authentication setting.

 

 

must be set and selected if required.

 

See Table 3.

 

 

 

 

 

 

PassPhrase1

Sets the text to use for WEP keys

 

Depends on Network Authentication

<NULL>

 

generation.

 

and Data Encryption settings. See

 

 

 

 

Table 3 and Table 4.

 

 

 

 

 

 

Network Key 1

Enter 5 ASCII characters or 10

 

Depends on Network Authentication

<NULL>

thru Network

hexadecimal digits for a 64-bit key. Enter

 

and Data Encryption settings. See

 

Key 4

13 ASCII characters or 26 hexadecimal

 

Table 3 and Table 4.

 

 

digits for a 128-bit key.

 

 

 

 

 

 

 

 

Current

Selects which network key is used for

 

Depends on Network Authentication

1

Network Key

encrypting outbound data and/or

 

and Data Encryption settings. See

 

 

authenticating clients.

 

Table 3 and Table 4

 

 

 

 

 

 

Table 2. Privacy Settings Definitions

50

Chapter 3

Page 52
Image 52
Technicolor - Thomson Network Router manual Privacy Settings Definitions, Setting Description Value List or Range Default

Network Router specifications

Technicolor, a name synonymous with innovative technology, has made significant strides in the realm of networking solutions, particularly with its Thomson Network Router series. These routers are engineered to meet the growing demands of high-speed internet access, catering to both residential and business environments.

One of the main features of the Technicolor Thomson Network Router is its robust performance. Equipped with advanced processing capabilities, these routers are designed to facilitate seamless browsing, streaming, and gaming experiences across multiple devices simultaneously. With support for high-definition content and online gaming, users can enjoy a smooth internet experience without interruptions.

In terms of wireless technology, Technicolor routers often come with dual-band capabilities. This means they operate on both the 2.4 GHz and 5 GHz frequency bands, allowing users to optimize their connectivity based on their needs. The 2.4 GHz band offers a wider range, ideal for general browsing and connecting IoT devices, while the 5 GHz band supports higher speeds, perfect for bandwidth-intensive activities.

Security is another critical aspect of the Technicolor Thomson Network Router. The routers feature advanced security protocols such as WPA3, ensuring that users' data is encrypted and safe from unauthorized access. Furthermore, they may include built-in firewall protection and parental control features, allowing for a safer online environment for families.

Technicolor routers also support the latest networking technologies, including IPv6, which facilitates a greater number of devices to connect seamlessly and enhances overall network efficiency. The routers often come with Quality of Service (QoS) settings, allowing users to prioritize bandwidth for certain applications, ensuring a better experience for critical tasks like video conferencing or online gaming.

Additionally, the Technicolor Thomson Network Router series may incorporate easy setup and management features. Many models offer intuitive web interfaces or mobile applications, enabling users to monitor their network performance, manage connected devices, and configure settings with ease.

In summary, the Technicolor Thomson Network Router series stands out for its powerful performance, advanced security features, and user-friendly management options. With support for contemporary technologies and dual-band connectivity, these routers are well-equipped to handle the needs of modern households and businesses alike, making them a reliable choice for anyone looking to enhance their internet experience.