Manual

38
Security choose the wireless security and encryption method from the drop-down list (for detailed
security configuration, refer to the respective section Access Point (auto WDS) Security Settings).
Open no encryption.
WEP 64bit and 128bit key.
Personal preshared key encryption with WPA/WPA2 using AES or TKIP.
Enterprise RADIUS server based authentication with WPA/WPA2 encryption using AES or
TKIP (requires configured RADIUS server).
UAM Web browser based user authentication method. UAM authentication is available only if
Access Point is working in router mode. For UAM configuration details refer at the respective
chapter Universal Access Method (UAM).
Wireless clients must be able to process the WPA or WPA2 information element and
respond with a specific security configuration.
7.2.10 Wireless ACL
Wireless ACL is active only in Access Point (auto WDS) and iPoll Access Point wireless mode.
Access Control provides the ability to limit associations wirelessly based on MAC address to an AP by
creating an Access Control List (ACL).
Policy define the policy:
Open no rules applied
Allow MAC in the list only listed MAC clients can connect to the AP (white list).
Deny MAC in the list only listed MAC clients can NOT connect to the AP (black list).
To add new rule, press the + button.
To remove the rule, first select the rule then press the button.
To edit the rule double click on the field.
7.2.11 Traffic Shaping
Use Traffic Shaping to control download or upload bandwidth in order to optimize or guarantee
performance. There are two methods to control network traffic:
Limit all traffic limits overall APC upload and download traffic.
Limit per IP traffic limits upload and download traffic for a specified IP addresses.