
i
Contents
DMS3-CTC-25-282 v1.0
Contents
1.3.2 Local network connection ..............................................................................................................................................7
1.3.3 Broadband connection .................................................................................................................................................. 8
1.3.4 Voice connection ........................................................................................................................................................... 9
1.3.5 Buttons........................................................................................................................................................................... 10
1.3.6 Status LEDs ................................................................................................................................................................... 11
2.3.1 Setting up a wireless connection .................................................................................................................................21
2.3.2 Setting up a wired connection .................................................................................................................................... 22
2.5.1 Managing your mobile connection with the TG789vac v2 GUI............................................................................ 25
2.5.2 Inserting a mobile USB adapter.................................................................................................................................. 26
3.1.2 Components ................................................................................................................................................................. 30
3.1.3 Protecting access to the TG789vac v2.......................................................................................................................32
4.4.1 Configuring WPA encryption .....................................................................................................................................41
4.4.2 Configuring WPA-PSK encryption ........................................................................................................................... 42