9-72
Command Line Reference
MAC Address Authentication
MAC Address Authentication
Use these commands to define MAC authentication on the access point. For
local MAC authentication, first create the MAC authorization lists, enter the
MAC addresses to be filtered and then define the default filtering policy using
the address filter default command.
mac-auth-local
This command adds or removes entries in the local MAC address authentica-
tion control lists on the device.
Syntax
mac-auth-local <
listname
> mac <
macaddress
> | <
accept-list
> | <
deny-list
>
no mac-auth-local
<listname>
mac
<macaddress>
•
listname
- Specifies the name of an entire MAC address authentication
control list. The no version of the command removes the MAC address
authentication list and all entries in the entire list.
•
macaddress
- Specifies an entry in the authentication control list by
MAC address. The no version of the command removes the specific
MAC address entry from the specific MAC address authentication
control list. Valid format is 00:00:00:00:00:00 ~FF:FF:FF:FF:FF:FF.
•
accept-list
-The wireless stations whose MAC address is on the list will
be allowed access to the device.
•
deny-list
-The wireless stations whose MAC address is on the access
list will be prevented from having access to the device.
Command
Function
Mode
Page
[no] mac-auth-local
<
listname>
mac
<mac address>
Sets [removes] the MAC addresses to be filtered.
GC
9-72
[no] mac-auth-local
<
listname>
<accept list| deny
list>
Sets [removes] filtering to allow or deny listed addresses. IC-R-WLAN
9-72
[no] mac-auth-remote
Enables [disables] remote MAC authentication.
IC-R-WLAN
9-72
show mac-auth-local
[<name>]
Shows the MAC entries on the specified device.
MC
9-74
Summary of Contents for ProCurve 530 NA
Page 1: ...Management and Configuration Guide www procurve com ProCurve Wireless Access Point 530 ...
Page 2: ......
Page 3: ...ProCurve Wireless Access Point 530 Management and Configuration Guide ...
Page 21: ...1 1 1 Getting Started ...
Page 28: ...1 8 Getting Started Need Just a Quick Start This page is intentionally unused ...
Page 29: ...2 1 2 Selecting a Management Interface ...
Page 35: ...3 1 3 Using the Command Line Interface CLI ...
Page 51: ...4 1 4 Using the ProCurve Web Browser Interface ...
Page 85: ...5 1 5 General System Configuration ...
Page 195: ...7 1 7 Wireless Security Configuration ...
Page 271: ...8 1 8 Special Features ...
Page 308: ...8 38 Special Features Identity Driven Management This page is intentionally unused ...
Page 309: ...9 1 9 Command Line Reference ...
Page 474: ...9 166 Command Line Reference Spanning Tree Protocol STP This page is intentionally unused ...
Page 475: ...A 1 A File Uploads Downloads and Resets ...
Page 495: ...B 1 B Defaults ...
Page 507: ...C 1 C Adaptive Tx Power Control Use Cases ...
Page 517: ...D 1 D Open Source Licenses ...
Page 550: ...D 34 Open Source Licenses This page is intentionally unused ...
Page 555: ......