Access Control
This function filters users to use this device by designating MAC address. Please
refer to the following chart for introduction.
1. Access Policy
2. MAC Address
3. Access List
4. Delete
5. Remove All
6. Apply
Choose a method to process access control from the
drop list to determine the MAC addresses that you
designated are allowed to access the AP or not.
Add allowed (or denied) MAC addresses to the MAC
address list.
Display all Mac Addresses that you designated.
Delete Mac addresses that you selected.
Remove all Mac address in [Access List]
Apply changes.
36