User's Manual

CHAPTER 5
EXAMPLE CONFIGURATIONS
Revised: 23 Jan 08 5-16 EST P/N AA107G
7. Enter the WEP key values for your application that will be used by all devices on the wireless network. Reference Figure 26.
8. Enter the values for the Access Control List (ACL). This is a configurable MAC filter that can be set to allow or deny specific
wireless MAC address to the network. This feature is further explained in Appendix E – Security. In our example we will not
use the ACL. Reference Figure 27.
Figure 26: WEP Key Entry
Figure 27: ACL Configuration