User manual

82
4. Use Access Control described in Section 2-7-4 so those who are
not on your list will not be able to connect to your network.