84CHAPTER 3: CONFIGURING WIRELESS SERVICES
Configure Access You can control access using security access control lists (ACLs). Security Control Lists ACLs permit or deny traffic based on IP protocol, IP addresses and,
optionally, TCP or UDP port. They also can be used to set
Suggested uses for ACLs include restricting guest access from your intranet, or restricting guests from communicating with each other (using an IP access control entry).
You create an ACL by defining a series of access control entries (ACEs).
ACEs are processed in the order in which they are added to the ACL.
Generally, more specific checks are performed before general checks.
Because of this, the order of the ACE is important within the ACL.
You can add the following types of ACEs to an ACL:
Layer 4
After creating an ACL, you can assign it to users created in the local WX user database or users who are authenticated and authorized by a RADIUS server. You assign the name of the ACL by using the