D-Link UWS User Manual
IP ACL Configuration ............................................................................................................................357
IP ACL Rule Configuration ....................................................................................................................358
IP ACL Summary ...................................................................................................................................363
IP ACL Rule Summary ...........................................................................................................................364
MAC Access Control Lists ...........................................................................................................................364
MAC ACL Configuration .......................................................................................................................365
MAC ACL Rule Configuration ........................................................................................................366
MAC ACL Summary ..............................................................................................................................370
MAC ACL Rule Summary ......................................................................................................................370
ACL Interface Configuration .......................................................................................................................371
Configuring Port Security ...........................................................................................................................373
Port Security Administration................................................................................................................374
Port Security Static...............................................................................................................................376
Port Security Dynamic..........................................................................................................................377
SSL/Secure HTTP Configuration .................................................................................................................379
Generating Certificates .........................................................................................................380
Secure Shell Configuration...................................................................................................................382
Downloading SSH Host Keys .........................................................................................................383
Captive Portal Configuration......................................................................................................................384
CP Configuration ..................................................................................................................................386
D-Link
July 2012
Unified Wired and Wireless Access System
Page 13