Users Guide

134 | Authentication Dell PowerConnect W-Series Instant Access Point 6.2.0.0-3.2.0.0 | User Guide
of MAC addresses. Additionally, it is easy to change the MAC address of a station to match one on
the accepted list. This spoofing is trivial to perform with built-in driver tools, and it should not be
relied upon to provide security.
MAC authentication can be used alone, but typically it is combined with other forms of
authentication, such as WEP authentication. Because MAC addresses are easily observed during
transmission and easily changed on the client, this form of authentication should be considered
nothing more than a minor hurdle. It is recommended that you do not use the MAC-based
authentication.
Configuring MAC Authentication
To enable MAC Authentication for a wireless network:
1. In the Network tab, click the network for which you want to enable MAC authentication. The
edit link for the network appears.
2. Click the edit link and navigate to the Security tab.
3. For a network with Personal or Open security level, select Enabled from the MAC
authentication drop-down list.
4. Click OK to continue.
Figure 94 - Configuring MAC Authentication
5. Click Next and then click Finish to apply the changes.
Walled Garden Access
On the Internet, a walled garden typically controls a users access to web content and services. The
walled garden directs the user’s navigation within particular areas to allow access to a selection of
websites or prevent access to other websites.
Creating a Walled Garden Access
Walled garden access is needed when an external captive portal is used. A common example could
be a hotel environment where unauthenticated users are allowed to navigate to a designated login