User's Manual
Table Of Contents
- Chapter 1 Introduction
- Chapter 2 Hardware Installation
- Chapter 3 Quick Installation Guide
- Chapter 4 Software Configuration
- Appendix A: Specifications
- Appendix B: Configuring the PC
- Appendix C: Troubleshooting
TD-W8961ND 300Mbps Wireless N ADSL2+ Modem Router User Guide
38
AES (Advanced Encryption Standard) - A security method that uses symmetric
128-bit block data encryption.
Pre-Shared Key: Enter the key shared by the modem router and your other network
devices. It must have 8-63 ASCII characters or 64 Hexadecimal digits.
4) WPA2-PSK
To configure WPA2-PSK settings, select the WPA2-PSK option from the drop-down list. The
menu will change to offer the appropriate settings. WPA2-PSK requires a shared key and
does not use a separate server for authentication. PSK keys can be ASCII or Hex type.
5) WPA-PSK/WPA2-PSK
To configure WPA-PSK/WPA2-PSK settings, select the WPA-PSK/WPA2-PSK option from
the drop-down list. The menu will change to offer the appropriate settings.
WPA-PSK/WPA2-PSK requires a shared key and does not use a separate server for
authentication. PSK keys can be ASCII or Hex type. WPA-PSK/WPA2-PSK is more flexible
than WPA-PSK or WPA2-PSK.
WDS Settings: With this function enabled, the modem router can bridge two or more
WLANs.
WDS Mode: Select On/Off to enable/disable WDS.
MAC Address: Enter the MAC Address you wish to bridge in the field.
Wireless MAC Address Filter: Wireless access can be filtered by using the MAC addresses
of the wireless devices transmitting within your network’s RADIUS.
Active: If you wish to filter users by MAC Address, select “Activated”, and “Deactived”
for don’t.
Action: To filter wireless users by MAC Address, select “Allow Association” or “Deny
Association” the follow Wireless LAN station(s) association.
MAC Address: Enter the MAC Address you wish to filter in the field.
Note:
For most users, it is recommended to use the default Wireless LAN Performance settings. Any
changes made to these settings may adversely affect your wireless network. Under certain
circumstances, changes may benefit performance. Carefully consider and evaluate any changes
to these wireless settings.
4.3.4 6RD
IPv6 tunnel is a kind of transition mechanism to enable IPv6-only hosts to reach IPv4 services and
to allow isolated IPv6 hosts and networks to reach each-other over IPv4-only infrastructure before
IPv6 completely supplants IPv4. It is a temporary solution for networks that do not support native
dual-stack, where both IPv6 and IPv4 run independently.
As a type of IPv6 tunnel, 6RD is used in the situation that your WAN connection is IPv4 while LAN
connection is IPv6. Choose “Interface Setup→6RD” menu.