48
6 - 4 A c c e s s C o n t r o l
Authentication by username and password is only part of the story. Many times you want to
let people in based on something other than who they are. Something such as where they
are coming from. Restricting access based on something other than the identity of the
user is generally referred to as Access Control.
Figure: 6-8 Access Control
You can restrict access to only trusted STAs so that those unknown STAs cannot
wirelessly connect to the AP by turning Access Control on.
By entering the MAC Addresses of new stations, you can manually add the stations to
allow them to be connected to the radio.
6 - 5 W D S M o d e
In Wireless Distribution System (WDS) mode, multiple radios can be configured to
operate in the WDS mode to inter-connect wired LAN segments that are attached to the
radio. Up to four devices can be connected to the AP.