NETGEAR ProSAFE WNDAP380R Reference Manual page 59

Prosafe dual band wireless-n access point with rfid support
Hide thumbs Also See for ProSAFE WNDAP380R:
Table of Contents

Advertisement

ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
Depending on your network configuration, use one of the following three methods:
Select MAC addresses from the Available Wireless Stations table:
a. Select check boxes for individual MAC addresses.
b. (Optional) Select the check box in the heading to select all MAC addresses,
c. Click Move.
The MAC addresses are transferred from the Available Wireless Stations table to
the Trusted Wireless Stations table.
Enter MAC addresses manually:
a. Enter a MAC address directly in the Trusted Wireless Stations table.
b. Click Add.
Import MAC addresses from a file:
a. Click Browse.
b. Navigate to the file with MAC addresses.
This file needs to be a simple text file with one MAC address per line.
c. Select the file, and click Open.
d. Use one of the following methods:
Click the Replace radio button.
All MAC addresses that are in the Trusted Wireless Stations table are replaced
with the MAC addresses that are in the file.
Click the Merge radio button.
The MAC addresses from the file are added to the MAC addresses that are in
the Trusted Wireless Stations table.
7.
Click Apply.
Now, only devices in the Trusted Wireless Stations table are allowed to connect to the
wireless access point over a wireless connection.
WARNING:
When configuring the wireless access point from a wireless
computer whose MAC address is not on the access control list,
you lose your wireless connection when you click Apply. You then
need to access the wireless access point from a wired computer
or from a wireless computer that is on the access control list to
make any further changes.
To delete selected or all MAC address from the Trusted Wireless Stations table:
1.
Select check boxes for individual MAC addresses.
2.
(Optional) Select the check box in the heading to select all MAC addresses.
3.
Click Delete.
Wireless Configuration and Security
59

Advertisement

Table of Contents
loading

Table of Contents