D-Link DWL-8600AP User Manual page 13

Dws-4000 series access points
Hide thumbs Also See for DWL-8600AP:
Table of Contents

Advertisement

D-Link UWS User Manual
Section 7: Configuring Access Control Lists .................................................................... 356
Configuring IP Access Control Lists ............................................................................................................356
IP ACL Configuration ............................................................................................................................357
IP ACL Rule Configuration ....................................................................................................................358
Modifying an IP-based Rule ..................................................................................................362
Adding a New Rule to an IP-based ACL.................................................................................363
Deleting a Rule from an IP-based ACL ..................................................................................363
IP ACL Summary ...................................................................................................................................363
IP ACL Rule Summary ...........................................................................................................................364
MAC Access Control Lists ...........................................................................................................................364
MAC ACL Configuration .......................................................................................................................365
MAC ACL Rule Configuration ........................................................................................................366
Adding a New Rule to a MAC-based ACL ..............................................................................369
Removing a Rule From a MAC-based ACL.............................................................................369
MAC ACL Summary ..............................................................................................................................370
MAC ACL Rule Summary ......................................................................................................................370
ACL Interface Configuration .......................................................................................................................371
Assigning an ACL to an Interface ..................................................................................................372
Removing an ACL from an Interface .............................................................................................372
Section 8: Managing Device Security ............................................................................. 373
Configuring Port Security ...........................................................................................................................373
Port Security Administration................................................................................................................374
Port Security Interface Configuration ..................................................................................................374
Port Security Static...............................................................................................................................376
Port Security Dynamic..........................................................................................................................377
Port Security Violation Status ..............................................................................................................378
SSL/Secure HTTP Configuration .................................................................................................................379
Generating Certificates .........................................................................................................380
Downloading SSL Certificates ...............................................................................................380
Secure Shell (SSH) Configuration ...............................................................................................................382
Secure Shell Configuration...................................................................................................................382
Downloading SSH Host Keys .........................................................................................................383
Captive Portal Configuration......................................................................................................................384
Captive Portal Global Configuration ....................................................................................................384
CP Configuration ..................................................................................................................................386
Changing the Captive Portal Settings ...........................................................................................387
D-Link
July 2012
Unified Wired and Wireless Access System
Page 13

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents