MAC authentication settings
71
•
TXOP
: Transmit Opportunity. The maximum time an AC transmit queue has access to the
wireless medium. When an AC queue is granted a transmit opportunity, it can transmit
data for a time up to the TXOP. This data bursting greatly improves the efficiency for high
data-rate traffic. Specify a value in the range 0-8192 microseconds.
•
ACM
: The admission control mode for the access category. When enabled, clients are
blocked from using the access category.
•
AckPolicy
: Acknowledge Policy. By default, all wireless data transmission requires the
sender to wait for an acknowledge message from the receiver. WMM allows the
acknowledgment wait time to be turned off for each Access Category (AC). Although this
increases data throughput, it can also result in a high number of errors when traffic levels
are heavy.
MAC authentication settings
For a more secure wireless network, you can specify that only certain wireless computers can
connect to the router. Up to 20 MAC addresses can be added to the MAC Filtering Table.
When enabled, all registered MAC addresses are controlled by the access rule.
MAC Authentication is a powerful security feature that allows you to specify which wireless
computers are allowed on the network. By setting the access rule to
Allow only stations in
list
, any wireless computer attempting to access the network that is not specified in the filter list
is denied access. When you enable this feature, you must enter the MAC address of each client
in your network to allow network access, or copy the MAC address by selecting the name of
the computer from
Choose a PC
. By setting the access rule to
Block all stations in list
,
you can block specific wireless computers from accessing the network by adding them to the
filter list. A maximum of 20 rules can be defined.
This page includes the following settings.
Filter
Select
Allow only stations in list
to configure only known device MAC addresses that are
permitted to access the network. Select
Block all stations in list
to configure known MAC
addresses that are denied access to the network.
Summary of Contents for R100-Series
Page 6: ...6 ...
Page 10: ...10 Deploying the HP R110 R120 ...
Page 44: ...44 LAN configuration ...
Page 80: ...80 VPN configuration ...
Page 88: ...88 Routing configuration ...
Page 98: ...98 Firewall configuration ...
Page 130: ...130 Tools ...
Page 134: ...134 ...
Page 142: ...142 ...