Table 14 MAC Filter (continued)
LABEL | DESCRIPTION |
|
|
MAC Address | Enter the MAC addresses in a valid MAC address format, that is, six hexadecimal |
| character pairs, for example, 12:34:56:78:9a:bc of the wireless stations that are |
| allowed or denied access to the Prestige in these address fields. |
Back | Click Back to go to the main wireless LAN setup screen. |
|
|
Apply | Click Apply to save your changes back to the Prestige. |
|
|
Cancel | Click Cancel to begin configuring this screen afresh. |
|
|
5.6 Introduction to WPA
If you don’t have an external RADIUS server, you should use
Note: You can’t use the Local User Database for authentication when you select WPA.
5.6.1 WPA-PSK Application Example
A
1First enter identical passwords into the AP and all wireless clients. The
2The AP checks each client’s password and (only) allows it to join the network if the passwords match.
3The AP derives and distributes keys to the wireless clients.
4The AP and wireless clients use the TKIP encryption process to encrypt data exchanged between them.
77 | Chapter 5 Wireless LAN |