9
3.4 Wireless Security
To protect wireless intellectual property, it is important to secure the wireless
connection. This Access Point is equipped a sophisticated security algorithm to
protect against intruders entering your system or listening to conversations over
the network.
3.4.1 ACL
Different access rules may be assigned for each user by adding the MAC
address and the access rights.
Select
Enable Access Control List
to enable ACL. Enter Specific Clients by
clicking the
Add
button and entering the MAC address. Highlight each MAC
address and click the appropriate setting to either accept or reject the
connection. Click the
Apply
button to save the new configuration.