Belkin F5D8230-4 User Manual - Page 58

Setting up a Deny Access List

Page 58 highlights

Using the Web-Based Advanced User Interface Setting up a Deny Access List The "Deny Access" list lets you specify computers that you DO NOT want to access the network. Any computer in the list will not be allowed access to the wireless network. All others will. 1. Select the "Deny" radio button (2) to begin setting up a list of computers to be denied access to the wireless network. 2. Next, in the "MAC Address" field that is blank (3), type in the MAC address of the wireless computer you want to deny access to the wireless network, then click "

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119

Using the Web-Based Advanced User Interface
56
Setting up a Deny Access List
The “Deny Access” list lets you specify computers that you DO NOT
want to access the network. Any computer in the list will not be
allowed access to the wireless network. All others will.
1.
Select the “Deny” radio button
(2)
to begin setting up a list of
computers to be denied access to the wireless network.
2.
Next, in the “MAC Address” field that is blank
(3)
, type in the MAC
address of the wireless computer you want to deny access to the
wireless network, then click “<<Add”
(4)
.
3.
Continue to do this until all of the computers you want to deny
access to have been entered.
4.
Click “Apply Changes”
(5)
to finish.