Authentication; Local Mac Authentication - SMC Networks E21011 User Manual

802.11 a/b/g/n access point
Table of Contents

Advertisement

| Wireless Settings
C
8
HAPTER

Authentication

A
UTHENTICATION
L
MAC
OCAL
A
UTHENTICATION
Link Port Priority — Defines the priority used for this port in the
Spanning Tree Protocol. If the path cost for all ports on a switch are the
same, the port with the highest priority (i.e., lowest value) will be
configured as an active link in the spanning tree. This makes a port
with higher priority less likely to be blocked if the Spanning Tree
Protocol is detecting network loops. Where more than one port is
assigned the highest priority, the port with lowest numeric identifier will
be enabled. (Default: 128; Range: 0-240, in steps of 16)
Wireless clients can be authenticated for network access by checking their
MAC address against the local database configured on the access point, or
by using a database configured on a central RADIUS server. Alternatively,
authentication can be implemented using the IEEE 802.1X network access
control protocol.
You can configure a list of the MAC addresses for wireless clients that are
authorized to access the network. This provides a basic level of
authentication for wireless clients attempting to gain access to the
network. A database of authorized MAC addresses can be stored locally on
the access point or remotely on a central RADIUS server. (Default: Local
MAC)
Configures the local MAC authentication database. The MAC database
provides a mechanism to take certain actions based on a wireless client's
MAC address. The MAC list can be configured to allow or deny network
access to specific clients.
– 82 –

Advertisement

Table of Contents
loading

This manual is also suitable for:

Eliteconnect smce21011

Table of Contents