Wireless acl, Traffic shaping, 10 wireless acl – GeoDesy GD-Geo20 User Manual

Page 38: 11 traffic shaping

Advertising
background image

38

Security

– choose the wireless security and encryption method from the drop-down list (for detailed

security configuration, refer to the respective section Access Point (auto WDS)

Security Settings)

.

Open

– no encryption.

WEP

– 64bit and 128bit key.

Personal

– preshared key encryption with WPA/WPA2 using AES or TKIP.

Enterprise

– RADIUS server based authentication with WPA/WPA2 encryption using AES or

TKIP (requires configured RADIUS server).

UAM

– Web browser based user authentication method. UAM authentication is available only if

Access Point is working in router mode. For UAM configuration details refer at the respective
chapter

Universal Access Method (UAM)

.

Wireless clients must be able to process the W PA or WPA2 information element and
respond with a specific security configuration.



7.2.10

Wireless ACL

Wireless ACL is active only in Access Point (auto WDS) and iPoll Access Point wireless mode.

Access Control provides the ability to limit associations wirelessly based on MAC address to an AP by
creating an Access Control List (ACL).

Policy

– define the policy:

Open

– no rules applied

Allow MAC in the list

– only listed MAC clients can connect to the AP (white list).

Deny MAC in the list

– only listed MAC clients can NOT connect to the AP (black list).

To add new rule, press the “+” button.
To remove the rule, first select the rule then press the “” button.

To edit the rule double click on the field.


7.2.11

Traffic Shaping

Use Traffic Shaping to control download or upload bandwidth in order to optimize or guarantee
performance. There are two methods to control network traffic:

Limit all traffic

– limits overall APC upload and download traffic.

Limit per IP traffic

– limits upload and download traffic for a specified IP addresses.

Advertising