26
3 Wireless networking
DMS3-CTC-25-281 v2.0
3.3 Securing your wireless connection
Introduction
We strongly recommend you to protect all wireless communication between any wireless client and your TG788v v3 with a
wireless key. This ensures that:
• Only clients that use the correct Network Name (SSID) and wireless key can connect to access point of your TG788v v3.
• All data passing through the wireless access point of your TG788v v3 is secured by adequate encryption.
Configuration
To secure your wireless network with:
• WPA-PSK encryption, continue with
“3.3.1 Configuring WPA(2)-PSK encryption” on page 27
The wireless connection is secured with a pre-shared key that has been defined by the user. Wireless clients must be
configured with this key before they can connect to your TG788v v3. Your TG788v v3 supports the following WPA-PSK
versions (ordered by descending security).
• WPA encryption (via RADIUS), continue with
“3.3.2 Configuring WPA-Enterprise encryption” on page 28
.
This encryption is typically used for business networks. Wireless clients will authenticate to a specific Remote
Authentication Dial In User Service (RADIUS) server. This RADIUS server then provides the wireless key that must be
used to encrypt its data. The RADIUS server regularly updates this key at a specified interval.