Netgear WNDAP360 WNDAP360 Reference Manual - Page 53

Restrict Wireless Access by MAC Address, Apply, To restrict access based on MAC addresses

Page 53 highlights

ProSafe Dual Band Wireless-N Access Point WNDAP360 Table 14. RADIUS Server Settings (Continued) Field Descriptions Secondary Accounting Server IP Address Enter the IP address of the secondary RADIUS server for accounting. The secondary RADIUS server is used when the primary RADIUS server is not available. Authentication Enter the UDP port number of the wireless access point that is used Port to access the secondary RADIUS server for accounting. The default port number is 1813. Secret Enter the shared key that is used between the wireless access point and the secondary RADIUS server during the accounting process. Authentication Settings Reauthentication Time (Seconds) The interval in seconds after which the supplicant is reauthenticated with the RADIUS server. The default interval is 3600 seconds (1 hour). Enter 0 to disable reauthentication. Update Global Key Every (Seconds) Select the check box to allow the global key update, and enter the interval in seconds. The check box is selected by default, and the default interval is 1800 seconds (30 minutes). Clear the check box to prevent the global key update. 3. Click Apply to save your settings. Restrict Wireless Access by MAC Address For increased security, you can restrict access to an SSID by allowing access to only specific computers or wireless stations based on their MAC addresses. You can restrict access to only trusted computers so that unknown computers cannot wirelessly connect to the wireless access point. MAC address filtering adds an obstacle against unwanted access to your network, but the data broadcast over the wireless link is fully exposed. Note: For wireless adapters, you can usually find the MAC address printed on the wireless adapter.  To restrict access based on MAC addresses: 1. Select Configuration > Security > Advanced > MAC Authentication. The MAC Authentication screen displays. (The following figure shows one example.) Wireless Configuration and Security 53

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137

Wireless Configuration and Security
53
ProSafe Dual Band Wireless-N Access Point WNDAP360
3.
Click
Apply
to save your settings.
Restrict Wireless Access by MAC Address
For increased security, you can restrict access to an SSID by allowing access to only specific
computers or wireless stations based on their MAC addresses. You can restrict access to
only trusted computers so that unknown computers cannot wirelessly connect to the wireless
access point. MAC address filtering adds an obstacle against unwanted access to your
network, but the data broadcast over the wireless link is fully exposed.
Note:
For wireless adapters, you can usually find the MAC address printed
on the wireless adapter.
To restrict access based on MAC addresses:
1.
Select
Configuration > Security > Advanced > MAC Authentication
.
The MAC
Authentication screen displays. (The following figure shows one example.)
Secondary
Accounting Server
IP Address
Enter the IP address of the secondary RADIUS server for
accounting. The secondary RADIUS server is used when the
primary RADIUS server is not available.
Authentication
Port
Enter the UDP port number of the wireless access point that is used
to access the secondary RADIUS server for accounting. The default
port number is 1813.
Secret
Enter the shared key that is used between the wireless access point
and the secondary RADIUS server during the accounting process.
Authentication Settings
Reauthentication
Time (Seconds)
The interval in seconds after which the supplicant is reauthenticated with the
RADIUS server. The default interval is 3600 seconds (1 hour). Enter
0
to disable
reauthentication.
Update Global Key
Every (Seconds)
Select the check box to allow the global key update, and enter the interval in
seconds. The check box is selected by default, and the default interval is
1800 seconds (30 minutes). Clear the check box to prevent the global key update.
Table 14.
RADIUS Server Settings (Continued)
Field
Descriptions