User's Manual

User Manual
deliberant Page47
Personal – preshared key encryption with WPA/WPA2 using AES or TKIP.
Enterprise – RADIUS server based authentication with WPA/WPA2 encryption using AES
or TKIP (requires configured RADIUS server).
UAM – Web browser based user authentication method. UAM authentication is available
only if Access Point is working in router mode. For UAM configuration details refer at the
respective chapter Universal Access Method (UAM).
Wireless clients must be able to process the WPA or WPA2 information element and
respond with a specific security configuration.
WirelessACL
Wireless ACL is active only in Access Point (auto WDS) and iPoll Access Point wireless
mode.
Access Control provides the ability to limit associations wirelessly based on MAC address to an AP by
creating an Access Control List (ACL) on each wireless interface (including VAPs).
Figure 48 – Wireless ACL Configuration
Policy – define the policy:
Open – no rules applied
Allow MAC in the list – only listed MAC clients can connect to the AP (white list).
Deny MAC in the list – only listed MAC clients can NOT connect to the AP (black list).
To add new rule, press the “+” button.
To remove the rule, first select the rule then press the “” button.
To edit the rule double click on the field.
TrafficShaping
Use Traffic Shaping to control download or upload bandwidth in order to optimize or guarantee
performance. There are two methods to control network traffic:
Limit all traffic – limits overall APC upload and download traffic.
Limit per IP traffic – limits upload and download traffic for a specified IP addresses.