7-51
Wireless Security Configuration
Configuring MAC Address Authentication
CLI: Configuring MAC Lockout
CLI Commands Used in This Section
Locking out a device from the access point.
The following example
shows how to add a device’s MAC address to the MAC Lockout list.
Restoring a device’s access to the access point.
You can remove a
device’s MAC address from the MAC Lockout List using either the
no lockout-
mac
command or the
lockout-mac clear
command. The following example
shows how to remove a MAC address from the MAC Lockout list using the
no
lockout-mac
command.
Displaying the MAC Lockout list.
The following example shows how to
display the current MAC Lockout list.
Command Syntax
CLI Reference Page
[no] lockout-mac
<
mac_address
>
9-75
show lockout-mac
9-76
lockout-mac clear
<
mac_address
>
| all
9-76
ProCurve Access Point 530#
configure
ProCurve Access Point 530(config)#
lockout-mac
00:14:C2:A5:09:8D
ProCurve Access Point 530(config)#
ProCurve Access Point 530#
configure
ProCurve Access Point 530(config)#
no lockout-mac
00:14:C2:A5:09:8D
ProCurve Access Point 530(config)#
ProCurve Access Point 530#
show lockout-mac
Locked out addresses
00:14:C2:A5:09:8D
0A:16:D2:5A:23:78
Number of locked out MAC addresses = 2
ProCurve Access Point 530#
Содержание 530 - Notebook PC
Страница 1: ...Management and Configuration Guide www procurve com ProCurve Wireless Access Point 530 ...
Страница 2: ......
Страница 3: ...ProCurve Wireless Access Point 530 Management and Configuration Guide ...
Страница 21: ...1 1 1 Getting Started ...
Страница 29: ...2 1 2 Selecting a Management Interface ...
Страница 35: ...3 1 3 Using the Command Line Interface CLI ...
Страница 50: ...3 16 Using the Command Line Interface CLI CLI Control and Editing This page is intentionally unused ...
Страница 51: ...4 1 4 Using the ProCurve Web Browser Interface ...
Страница 85: ...5 1 5 General System Configuration ...
Страница 152: ...5 68 General System Configuration Managing Group Configuration ...
Страница 193: ...6 41 Wireless Interface Configuration Managing Multiple WLAN BSS SSID Interfaces This page is intentionally unused ...
Страница 194: ...6 42 Wireless Interface Configuration Managing Multiple WLAN BSS SSID Interfaces ...
Страница 195: ...7 1 7 Wireless Security Configuration ...
Страница 270: ...7 76 Wireless Security Configuration Web Authentication for Mobile Users ...
Страница 271: ...8 1 8 Special Features ...
Страница 308: ...8 38 Special Features Identity Driven Management This page is intentionally unused ...
Страница 309: ...9 1 9 Command Line Reference ...
Страница 476: ...9 168 Command Line Reference Spanning Tree Protocol STP This page is intentionally unused ...
Страница 477: ...A 1 A File Uploads Downloads and Resets ...
Страница 497: ...A 21 File Uploads Downloads and Resets Disabling the Access Point Push Buttons This page is intentionally unused ...
Страница 498: ...A 22 File Uploads Downloads and Resets Disabling the Access Point Push Buttons ...
Страница 499: ...B 1 B Defaults ...
Страница 512: ...B 14 Defaults Wireless Distribution System WDS This page is intentionally unused ...
Страница 513: ...C 1 C Adaptive Tx Power Control Use Cases ...
Страница 523: ...D 1 D Open Source Licenses ...
Страница 525: ...D 3 Open Source Licenses Overview This appendix includes the following information Open Source licenses ...
Страница 556: ...D 34 Open Source Licenses ...
Страница 561: ......