Справочник Пользователя для Interepoch Technology Inc. IWE3302

Скачать
Страница из 51
 
 
36
3. 
Specify the MAC address of a wireless client to be denied access, and then click Add
4. 
Repeat Steps 3 for other wireless clients. 
To delete an entry in the access control table: 
Click Delete next to the entry. 
NOTE: 
The size of the access control table is 64. 
 
Fig. 47: MAC ACL download settings 
Instead of manually entering MAC addresses to the access control table one by one, you can prepare a 
text file that contains all the MAC addresses and put it on a TFTP server, and then command the IEEE 
802.11b/g to download the MAC ACL (Access Control List) file from the TFTP server. Fig. 48 shows 
the contents of a sample ACL file. 
 
Fig. 48: Sample MAC ACL file 
To download a MAC ACL file from a TFTP server: 
1. 
Specify the IP address of the TFTP server in the TFTP server IP address text box. 
2. 
Specify the name of the MAC ACL file on the TFTP server in the MAC ACL file name text 
box. 
3. 
Click Download
3.5.3. IEEE 802.1x/RADIUS 
IEEE 802.1x Port-Based Network Access Control is a new standard for solving some security issues 
associated with IEEE 802.11, such as lack of user-based authentication and dynamic encryption key 
distribution. With IEEE 802.1x and the help of a RADIUS (Remote Authentication Dial-In User Ser-
vice) server and a user account database, an enterprise or ISP (Internet Service Provider) can manage 
its mobile users’ access to its wireless LANs. Before granted access to a wireless LAN supporting