User's Manual
Table Of Contents
- 1 Introduction
- 2 Getting to know the device
- 3 Computer configurations under different OS, to obtain IP address automatically
- 4 Utility CD execution
- 5 Getting Started with the Web pages
- 6 Overview
- 7 Status
- 8 Internet Access
- 9 Local Network Configuration
- 10 DHCP Settings
- 11 DHCP Static Configuration
- 12 LAN IPv6 Configuration
- 13 Wireless Network
- 14 Routing
- 15 DMZ
- 16 Virtual Server
- 17 NAT Forwarding
- 18 ALG
- 19 NAT Exclude IP
- 20 Port Trigger
- 21 FTP ALG Portl
- 22 Nat IP Mapping
- 23 IP QoS
- 24 CWMP Config
- 25 Port Mapping
- 26 Bridging
- 27 Client Limit
- 28 Tunnel Configuration
- 29 Others
- 30 IGMP Proxy
- 31 UPnP
- 32 SNMP
- 33 DNS Configuration
- 34 Dynamic DNS Configuration
- 35 MAC Filtering
- 36 IP/Port Filtering
- 37 URL Filter
- 38 ACL Configuration
- 39 DoS
- 40 Firmware Update
- 41 Backup/Restore
- 42 Password
- 43 Commit/Reboot
- 44 Time Zone
- 45 Log
- 46 Diagnostic
User’s Guide Configuring your Computers
Access Control
For security reason, using MAC ACL's (MAC Address Access
List) creates another level of difficulty to hacking a network. A
MAC ACL is created and distributed to AP so that only
authorized NIC's can connect to the network. While MAC
address spoofing is a proven means to hacking a network this
can be used in conjunction with additional security measures to
increase the level of complexity of the network security
decreasing the chance of a breach.
MAC addresses can be add/delete/edit from the ACL list
depending on the MAC Access Policy.
On this page you can allow or deny access to your wireless
network based off the clients MAC address. Choose "Allowed
Listed" and only the clients whose MAC addresses are in the
access control list will be able to connect. When "Deny Listed" is
selected, the wireless clients on this list will not be able to
connect to the access point. To access the Wireless Network
Access Control page:
From the left-hand WLAN menu, click on Access Control. The
following page is displayed:
82