Chapter 4 Wireless LAN
P-320W v3 User’s Guide
57
4.3.2 MAC Address Filter
Every wireless client has a unique identification number, called a MAC address.
1
A
MAC address is usually written using twelve hexadecimal characters
2
; for
example, 00A0C5000002 or 00:A0:C5:00:00:02. To get the MAC address for each
wireless client, see the appropriate User’s Guide or other documentation.
You can use the MAC address filter to tell the AP which wireless clients are allowed
or not allowed to use the wireless network. If a wireless client is allowed to use the
wireless network, it still has to have the correct settings (SSID, channel, and
security). If a wireless client is not allowed to use the wireless network, it does not
matter if it has the correct settings.
This type of security does not protect the information that is sent in the wireless
network. Furthermore, there are ways for unauthorized devices to get the MAC
address of an authorized wireless client. Then, they can use that MAC address to
use the wireless network.
4.3.3 User Authentication
You can make every user log in to the wireless network before they can use it.
This is called user authentication. However, every wireless client in the wireless
network has to support IEEE 802.1x to do this.
For wireless networks, there are two typical places to store the user names and
passwords for each user.
• In the AP: this feature is called a local user database or a local database.
• In a RADIUS server: this is a server used in businesses more than in homes.
If your AP does not provide a local user database and if you do not have a RADIUS
server, you cannot set up user names and passwords for your users.
Unauthorized devices can still see the information that is sent in the wireless
network, even if they cannot use the wireless network. Furthermore, there are
ways for unauthorized wireless users to get a valid user name and password.
Then, they can use that user name and password to use the wireless network.
Local user databases also have an additional limitation that is explained in the
next section.
1.
Some wireless devices, such as scanners, can detect wireless networks but cannot use wireless networks.
These kinds of wireless devices might not have MAC addresses.
2.
Hexadecimal characters are 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, and F.
Summary of Contents for P-320W v3
Page 2: ......
Page 8: ...Safety Warnings P 320W v3 User s Guide 8 ...
Page 10: ...Contents Overview P 320W v3 User s Guide 10 ...
Page 18: ...Table of Contents P 320W v3 User s Guide 18 ...
Page 20: ...20 ...
Page 24: ...Chapter 1 Getting to Know Your P 320W v3 P 320W v3 User s Guide 24 ...
Page 36: ...Chapter 2 Introducing the Web Configurator P 320W v3 User s Guide 36 ...
Page 54: ...54 ...
Page 72: ...Chapter 4 Wireless LAN P 320W v3 User s Guide 72 ...
Page 76: ...Chapter 5 Wireless Client Mode P 320W v3 User s Guide 76 ...
Page 88: ...Chapter 7 LAN P 320W v3 User s Guide 88 ...
Page 104: ...Chapter 10 VLAN P 320W v3 User s Guide 104 ...
Page 105: ...105 PART III Security Firewall 117 Content Filtering 125 ...
Page 106: ...106 ...
Page 116: ...Chapter 11 WAN P 320W v3 User s Guide 116 ...
Page 124: ...Chapter 12 Firewall P 320W v3 User s Guide 124 ...
Page 130: ...130 ...
Page 134: ...Chapter 14 Static Route P 320W v3 User s Guide 134 ...
Page 140: ...Chapter 15 Remote Management P 320W v3 User s Guide 140 ...
Page 154: ...Chapter 16 Universal Plug and Play UPnP P 320W v3 User s Guide 154 ...
Page 155: ...155 PART V Maintenance and Troubleshooting System 157 Logs 163 Product Specifications 193 ...
Page 156: ...156 ...
Page 178: ...Chapter 18 Logs P 320W v3 User s Guide 178 ...
Page 184: ...Chapter 19 Tools P 320W v3 User s Guide 184 ...
Page 192: ...Chapter 20 Troubleshooting P 320W v3 User s Guide 192 ...
Page 196: ...Chapter 21 Product Specifications P 320W v3 User s Guide 196 ...
Page 198: ...198 ...
Page 260: ...Index P 320W v3 User s Guide 260 ...
Page 261: ......
Page 262: ......