User's Manual

Modulationtype: BPSK, QPSK, 16-QAM, 64-QAM
deliberant Page48
respective chapter Universal Access Method (UAM).
Wireless clients must be able to process the WPA or WPA2 information element and
respond with a specific security configuration.
WirelessACL
Wireless ACL is active only in Access Point (auto WDS) and iPoll Access Point wireless
mode.
Access Control provides the ability to limit associations wirelessly based on MAC address to an AP by
creating an Access Control List (ACL) on each wireless interface (including VAPs).
Figure 43 – Wireless ACL Configuration
Policy – define the policy:
Open – no rules applied
Allow MAC in the list – only listed MAC clients can connect to the AP (white list).
Deny MAC in the list – only listed MAC clients can NOT connect to the AP (black list).
To add new rule, press the “+” button.
To remove the rule, first select the rule then press the “” button.
To edit the rule double click on the field.
TrafficShaping
Use Traffic Shaping to control download or upload bandwidth in order to optimize or guarantee
performance. There are two methods to control network traffic:
Limit all traffic – limits overall APC upload and download traffic.
Limit per IP traffic – limits upload and download traffic for a specified IP addresses.