![HP ProCurve 530 NA Management And Configuration Manual Download Page 240](http://html.mh-extra.com/html/hp/procurve-530-na/procurve-530-na_management-and-configuration-manual_166483240.webp)
7-46
Wireless Security Configuration
Configuring MAC Address Authentication
To Add a MAC Address to an Access Control List:
1.
Select the ACL from the ACL List drop-down.
2.
Enter the MAC address in the MAC Entry field.
3.
Click
[Add]
to add the new address to the ACL address list.
To Remove a MAC Address from an Access Control List:
1.
Select the ACL from the ACL List drop-down.
2.
Select the MAC address by clicking on it in the ACL address list.
3.
Click
[Remove]
to remove the address from the ACL address list.
Web: Configuring MAC Address Authentication
The MAC Authentication tab shown in Figure 7-10 enables the WLAN (BSS/
SSID) interface to be configured to use MAC authentication.
You can modify these parameters:
■
MAC Authentication
: Configures either the local or remote MAC
authentication on this access point. Selecting the Enabled option enables
access to the Local or Remote parameters.
■
Access Control List
:
Selects among preconfigured ACLs.
■
Policy
: Allows or prohibits specified station addresses.
■
[Update]
: Updates the WLAN (BSS/SSID) interface with the selected
MAC configuration.
N o t e
Before activating MAC Authentication, you should create the related ACL. If
you have not created the ACL, see
“To Configure the Access Control List:” on page 7-45
.
Summary of Contents for ProCurve 530 NA
Page 1: ...Management and Configuration Guide www procurve com ProCurve Wireless Access Point 530 ...
Page 2: ......
Page 3: ...ProCurve Wireless Access Point 530 Management and Configuration Guide ...
Page 21: ...1 1 1 Getting Started ...
Page 28: ...1 8 Getting Started Need Just a Quick Start This page is intentionally unused ...
Page 29: ...2 1 2 Selecting a Management Interface ...
Page 35: ...3 1 3 Using the Command Line Interface CLI ...
Page 51: ...4 1 4 Using the ProCurve Web Browser Interface ...
Page 85: ...5 1 5 General System Configuration ...
Page 195: ...7 1 7 Wireless Security Configuration ...
Page 271: ...8 1 8 Special Features ...
Page 308: ...8 38 Special Features Identity Driven Management This page is intentionally unused ...
Page 309: ...9 1 9 Command Line Reference ...
Page 474: ...9 166 Command Line Reference Spanning Tree Protocol STP This page is intentionally unused ...
Page 475: ...A 1 A File Uploads Downloads and Resets ...
Page 495: ...B 1 B Defaults ...
Page 507: ...C 1 C Adaptive Tx Power Control Use Cases ...
Page 517: ...D 1 D Open Source Licenses ...
Page 550: ...D 34 Open Source Licenses This page is intentionally unused ...
Page 555: ......