NETGEAR ProSAFE WN203 Reference Manual page 48

Prosafe single band 802.11n wireless access point wn203
Hide thumbs Also See for ProSAFE WN203:
Table of Contents

Advertisement

ProSAFE Single Band 802.11n Wireless Access Point WN203
Depending on your network configuration, use one of the following three methods:
Select MAC addresses from the Available Wireless Stations table:
a. Select check boxes for individual MAC addresses or select the check box in the
heading to select all MAC addresses.
b. Click the Move button.
The MAC addresses are transferred from the Available Wireless Stations table to
the Trusted Wireless Stations table.
Enter MAC addresses manually:
a. Enter a MAC address directly in the Trusted Wireless Stations table.
b. Click the Add button.
Import MAC addresses from a file:
a. Click the Browse button.
b. Navigate to the file with MAC addresses.
This file needs to be a simple text file with one MAC address per line.
c. Select the file, and click the Open button.
d. Use one of the following methods:
Select the Replace radio button.
All MAC addresses that are in the Trusted Wireless Stations table are replaced
with the MAC addresses that are in the file.
Select the Merge radio button.
The MAC addresses from the file are added to the MAC addresses that are in
the Trusted Wireless Stations table.
6.
Click the Apply button.
Now, only devices in the Trusted Wireless Stations table are allowed to connect to the
wireless access point over a wireless connection.
WARNING:
When configuring the wireless access point from a wireless
computer whose MAC address is not on the access control list,
you lose your wireless connection when you click the Apply
button. You then need to access the wireless access point from a
wired computer or from a wireless computer that is on the access
control list to make any further changes.
To delete selected or all MAC address from the Trusted Wireless Stations table:
1.
Select check boxes for individual MAC addresses or select the check box in the heading to
select all MAC addresses.
2.
Click the Delete button.
Wireless Configuration and Security
48

Advertisement

Table of Contents
loading

Table of Contents