Technical data

142 Meru System Director Configuration Guide © 2012 Meru Networks, Inc.
Configure MAC Filtering
00:0c:e6:12:07:41
After creating the text file, transfer the file to the controller’s /images directory.
Use the CLI copy command to transfer the file to the controller. Check that the file
has been copied using the dir command. The following example shows the command
to import a text file named acl that adds the MAC addresses to the permit ACL list:
controller(config)# access-list permit import acl
00:04:23:87:89:71
00:06:25:a7:e9:11
00:07:e9:15:69:40
00:0c:30:be:f8:19
00:0c:e6:09:46:64
00:0c:e6:12:07:41
00:0c:e6:bd:01:05
Successfully Added : 7
Duplicate Entries : 0
Invalid Format : 0
Entries Processed : 7
Configure a Deny MAC Filtering List
To set up a Deny MAC Filtering List, enable the ACL deny state and then either
configure a Deny ACL or import a Deny ACL.
A Deny ACL takes precedence over Radius Server access, so you can use it to imme-
diately deny access to a station or black-list certain clients (for example, if they have
a virus or are attacking other devices).
By default, MAC filtering is disabled. To change the state of MAC filtering so that the
deny list is enabled, use the command
access-list state deny as follows:
controller(config)# access-list state deny
controller# show access-list state
MAC Filtering (ACL) Configuration
ACL Environment State : deny
Radius Profile Name :
Secondary Radius Profile Name :
controller#
Add client addresses to a deny ACL list by either specifying them as command argu-
ments, or by importing them from a prepared list. This command specifies them as
command arguments and enters a brief description:
controller(config)# access-list deny 00:40:96:51:eb:2b 00:40:96:51:eb:10
controller(config-acl-deny)# descr DenyStation
controller(config-acl-deny)# end
controller(config)#