ZyXEL Communications wireless active fiber router Benutzerhandbuch
Chapter 4 Wireless LAN
FSG1100HN User’s Guide
44
4.7
Wireless Access Control Screen
The Wireless Access Control window allows users to configure wireless access
control by creating a white list and a black list. This allows administrators to block
users or only allow approved users to make a connection.
control by creating a white list and a black list. This allows administrators to block
users or only allow approved users to make a connection.
Click Wireless > Access Control to open the Wireless Access Control screen.
Wireless > Access Control
The following table describes the wireless access control labels in this screen.
Wireless > Access Control
LABEL
DESCRIPTION
Access Control Settings
Wireless Access
Control Mode
Control Mode
Select Allow Listed, Deny Listed, or Disable.
MAC Address
Enter a MAC address.
Comment
Enter a user-specified comment to help identify this access
control rule.
control rule.
Apply
Click Apply to save your changes back to the FSG1100HN.
Refresh
Click Refresh to begin configuring this screen afresh.
Delete
Click button to delete the table entry.
4.8
Wi-Fi Protected Setup Screen
The Wi-Fi Protected Setup window allows users to quickly set up a wireless network
with strong security, without having to configure security settings manually. WiFi
Protected Setup (WPS) is an industry standard specification, defined by the WiFi
Alliance. Depending on the devices on the network, users can either press a button
(on the device itself, or in its configuration utility) or enter a PIN (Personal Identification
Number) in the devices. Then, they connect and set up a secure network by
themselves.
with strong security, without having to configure security settings manually. WiFi
Protected Setup (WPS) is an industry standard specification, defined by the WiFi
Alliance. Depending on the devices on the network, users can either press a button
(on the device itself, or in its configuration utility) or enter a PIN (Personal Identification
Number) in the devices. Then, they connect and set up a secure network by
themselves.