User manual

A5 150Mbps Travel Wireless N Router User Manual
40
3WPA2-PSK
3.2 The later WPA2 protocol features compliance with the
full IEEE 802.11i standard and uses Advanced Encryption
Standard (AES) in addition to TKIP encryption protocol to
guarantee better security than that provided by WEP or WPA.
3.2.3 MAC-based Wireless Access Control
The MAC-based Wireless Access Control feature can be
used to allow or disallow clients to connect to your wireless
network.
¾ MAC Address Filter: “Permit” means to permit PCs at
specified MAC addresses to connect to your wireless network
while “Forbid” means to block PCs at specified MAC
addresses from connecting to your wireless network.
¾ MAC AddressEnter the MAC addresses of a wireless client
and click “Add”.
¾ MAC Address List: Displays the MAC addresses added by
you. You can delete any entry by clicking on the “Delete”
button next to it.
Example 1:
To allow only a PC at the MAC address of 00:e8:c8:a4:56:75 to
connect to your wireless network, do as follows: