
C
HAPTER
8
| Wireless Settings
Authentication
– 80 –
◆
Link Port Priority
— Defines the priority used for this port in the
Spanning Tree Protocol. If the path cost for all ports on a switch are the
same, the port with the highest priority (i.e., lowest value) will be
configured as an active link in the spanning tree. This makes a port
with higher priority less likely to be blocked if the Spanning Tree
Protocol is detecting network loops. Where more than one port is
assigned the highest priority, the port with lowest numeric identifier will
be enabled. (Default: 128; Range: 0-240, in steps of 16)
A
UTHENTICATION
Wireless clients can be authenticated for network access by checking their
MAC address against the local database configured on the access point, or
by using a database configured on a central RADIUS server. Alternatively,
authentication can be implemented using the IEEE 802.1X network access
control protocol.
You can configure a list of the MAC addresses for wireless clients that are
authorized to access the network. This provides a basic level of
authentication for wireless clients attempting to gain access to the
network. A database of authorized MAC addresses can be stored locally on
the access point or remotely on a central RADIUS server. (Default: Local
MAC)
L
OCAL
MAC
A
UTHENTICATION
Configures the local MAC authentication database. The MAC database
provides a mechanism to take certain actions based on a wireless client’s
MAC address. The MAC list can be configured to allow or deny network
access to specific clients.
Summary of Contents for EAP8518
Page 1: ...User Guide www edge core com EAP8518 802 11n Access Point...
Page 2: ...USER GUIDE EAP8518 IEEE 802 11n Access Point EAP8518 E092009 DT R01 149100000037A...
Page 19: ...TABLES 19 Table 32 1000BASE T MDI and MDI X Port Pinouts 253 Table 33 Console Port Pinouts 254...
Page 20: ...TABLES 20...
Page 23: ...INDEX OF CLI COMMANDS 23...
Page 107: ...CHAPTER 10 Status Information Event Logs 107...
Page 109: ...SECTION Command Line Interface 109 VLAN Commands on page 226 WMM Commands on page 229...
Page 145: ...CHAPTER 16 DHCP Relay Commands 145 RELATED COMMANDS show interface wireless...
Page 233: ...CHAPTER 30 WMM Commands 233...