User's Manual

38
3. Specify the MAC address of a wireless client to be denied access, and then click Add.
4. Repeat Steps 3 for other wireless clients.
To delete an entry in the access control table:
Click Delete next to the entry.
NOTE: The size of the access control table is 64.
Fig. 50. MAC ACL download settings.
Instead of manually entering MAC addresses to the access control table one by one, you can prepare a
text file that contains all the MAC addresses and put it on a TFTP server, and then command the AP
to download the MAC ACL (Access Control List) file from the TFTP server. Fig. 51 shows the con-
tents of a sample ACL file.
Fig. 51. Sample MAC ACL file.
To download a MAC ACL file from a TFTP server:
1. Specify the IP address of the TFTP server in the TFTP server IP address text box.
2. Specify the name of the MAC ACL file on the TFTP server in the MAC ACL file name text
box.
3. Click Download.
3.5.3. IEEE 802.1x/RADIUS
IEEE 802.1x Port-Based Network Access Control is a new standard for solving some security issues
associated with IEEE 802.11, such as lack of user-based authentication and dynamic encryption key
distribution. With IEEE 802.1x and the help of a RADIUS (Remote Authentication Dial-In User Ser-
vice) server and a user account database, an enterprise or ISP (Internet Service Provider) can manage
its mobile users’ access to its wireless LANs. Before granted access to a wireless LAN supporting