Wireless > Wireless Access; Wireless > Advanced Wireless Settings - Cisco Linksys WAG200G User Manual

Linksys wireless-g adsl home gateway
Table of Contents

Advertisement

Chapter4
Wireless > Wireless Access
Wireless access can be filtered by using the MAC addresses
of the wireless devices transmitting within your network's
radius.
Wireless > Wireless Access
Wireless Network Access
Allow All/Restrct Access
To filter wireless users by MAC
address, either permitting or blocking access, select Restrct
Access. If you do not wish to filter users by MAC address,
keep the default, Allow All.
Prevent lsted computers from accessng the wreless
network
Select this to block wireless access by MAC
address. This setting is selected by default.
Permt only lsted computers to access the wreless
network
Select this to allow wireless access by MAC
address.
Edt MAC Address Access Lst
Address Filter List screen.
MAC Address Filter List
MAC Address Filter List
Wreless-G ADSL Home Gateway
Click this to open the MAC 
Advanced Configuration
MAC 01-20
Enter the MAC addresses of the devices
whose wireless access you want to block or allow.
Wreless Clent MAC Lst
Wireless Client List screen.
Wireless Client List
Wireless Client List
This screen lists the MAC addresses of the wireless
devices. Select Enable MAC Flter for any device you
want to add to the MAC Address Filter List. Then click
Update Flter Lst.
To retrieve the most up-to-date information, click
Refresh. To exit this screen and return to the Wireless 
MAC Filter List screen, click Close.
Click Save Settngs to apply your changes, or click Cancel
Changes to cancel your changes.
Wireless > Advanced Wireless Settings
The Advanced Wireless Settings screen is used to set up the
Gateway's advanced wireless functions. These settings
should only be adjusted by an expert administrator as
incorrect settings can reduce wireless performance.
Wireless > Advanced Wireless Settings
Advanced Wireless
Wireless-G Settings
Authentcaton Type
The default is Auto, which allows
either Open System or Shared Key authentication to be
used. With Open System authentication, the sender and
the recipient do NOT use a WEP key for authentication.
With Shared Key authentication, the sender and recipient
Click this to open the
1

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents