37
˙
Security against unauthorized configuration:
this is to prevent people from changing the settings of the Access
Point.
˙
Firewall:
this allows you to block unwanted traffic from the network.
5.6.1 Security against unauthorized network access
This allows you to control access to the network. There are two ways to
do this:
˙
MAC Address based: This will only allow the clients you specify to
access the network.
˙
Port based: In order for a client to access the network, it must be
authenticated by a RADIUS server on your network.
To configure this, open the
Unauthorized network access
page.
To select a security method, select its radio button. Select None for no
authorization (anyone will have access to your network).
5.6.1.1 MAC Address based authorization
With this option you can create a list of clients (an ‘Access Control List’
that have access to the network. All other clients will be denied access.
The client is identified by the MAC address of his network card. The
MAC address consists of six groups of two digits each (e.g.
00:10:91:00:00:00).
If you have multiple Access Points, you will need to create this list for
every Access Point through which a network card may access your
network.
Follow these steps to add a client to the list:
1. Click on the button Add client...: a new dialog opens.
2. In the field MAC Address, enter the MAC address of the client that
you want to allow access to.
3. Click OK. The client is now added to the list.
To delete a client from the list:
1. Click Delete: a new dialog opens in which the list is displayed.
2. Select the MAC address(es) of the client(s) that you want to remove
from the list.
3. Click OK. The list is updated.
5.6.1.2 Port based authorization
With this option you use a RADIUS server to handle access control.