
C
HAPTER
7
| Advanced Settings
Access Control Lists
– 74 –
A
CCESS
C
ONTROL
L
ISTS
Access Control Lists allow you to configure a list of wireless client MAC
addresses that are not authorized to access the network. A database of
MAC addresses can be configured locally on the access point.
S
OURCE
A
DDRESS
S
ETTINGS
The ACL Source Address Settings page enables traffic filtering based on the
source MAC address in the data frame.
Figure 36: Source ACLs
The following items are displayed on this page:
◆
SA Status
— Enables network traffic with specific source MAC
addresses to be filtered (dropped) from the access point.
◆
MAC Address
— Specifies a source MAC address to filter, in the form
xx.xx.xx.xx.xx.xx, or xx-xx-xx-xx-xx-xx.
◆
Action
— Selecting “Add” adds a new MAC address to the filter list,
selecting delete removes the specified MAC address.
◆
Number
— Specifies the number associated with the MAC address.
◆
MAC Address
— Displays the configured source MAC address.
Summary of Contents for EAP8518
Page 1: ...User Guide www edge core com EAP8518 802 11n Access Point...
Page 2: ...USER GUIDE EAP8518 IEEE 802 11n Access Point EAP8518 E092009 DT R01 149100000037A...
Page 19: ...TABLES 19 Table 32 1000BASE T MDI and MDI X Port Pinouts 253 Table 33 Console Port Pinouts 254...
Page 20: ...TABLES 20...
Page 23: ...INDEX OF CLI COMMANDS 23...
Page 107: ...CHAPTER 10 Status Information Event Logs 107...
Page 109: ...SECTION Command Line Interface 109 VLAN Commands on page 226 WMM Commands on page 229...
Page 145: ...CHAPTER 16 DHCP Relay Commands 145 RELATED COMMANDS show interface wireless...
Page 233: ...CHAPTER 30 WMM Commands 233...