4. 4. wireless mac filtering, I want to – TP-Link TL-WR902AC AC750 Wireless Dual-Band Travel Router User Manual

Page 93

Advertising
background image

86

Chapter 5

Configure the Router in Access Point Mode

Version

- Select

Auto

,

WPA

or

WPA2

.

Encryption

- Select

Auto

,

TKIP

or

AES

.

Radius Server IP

- Enter the IP address of the Radius server.

Radius Port

- Enter the port that Radius server used.

Radius Password

- Enter the password for the Radius server.

Group Key Update Period

- Specify the group key update interval in seconds.

The value should be 30 or above. Enter 0 to disable the update.

WEP

- It is based on the IEEE 802.11 standard.

Type

- The default setting is

Auto

, which can select Shared Key or Open System

authentication type automatically based on the wireless client’s capability and
request.

WEP Key Format

- Hexadecimal and ASCII formats are provided here.

Hexadecimal format stands for any combination of hexadecimal digits (0-9,
a-f, A-F) in the specified length. ASCII format stands for any combination of
keyboard characters in the specified length.

WEP Key (Password)

- Select which of the four keys will be used and enter the

matching WEP key. Make sure these values are identical on all wireless clients
in your network.

Key Type

- Select the WEP key length (64-bit, 128-bit or 152-bit) for encryption.

Disabled

means this WEP key entry is invalid.

64-bit

- Enter 10 hexadecimal digits (any combination of 0-9, a-f and A-F. Null

key is not permitted) or 5 ASCII characters.

128-bit

- Enter 26 hexadecimal digits (any combination of 0-9, a-f and A-F. Null

key is not permitted) or 13 ASCII characters.

152-bit

- Enter 32 hexadecimal digits (any combination of 0-9, a-f and A-F. Null

key is not permitted) or 16 ASCII characters.

5. 4. 4. Wireless MAC Filtering

Wireless MAC Filtering is used to deny or allow specific wireless client devices to access
your network by their MAC addresses.

I want to:

Deny or allow specific wireless client devices to access my network by their MAC
addresses.

For example

, you want the wireless client A with the MAC address 00:0A:EB:B0:00:0B

and the wireless client B with the MAC address 00:0A:EB:00:07:5F to access the router,
but other wireless clients cannot access the router.

Advertising