SlideShare a Scribd company logo
• Access Restriction using Password
Login to the ADSL Router on http://192.168.1.1
The username and password by default are ‘admin’ and ‘admin’.
Click on ‘advanced’
Click on ‘wireless security’
Select the WEP security.
Enable WEP security.
Key in the desired security password.
Click on Apply.
• Access List (MAC based)
• To add the clients to the access list, find
out the MAC id of the clients (wireless
interface card) where the connectivity is
required, using the command ipconfig –all.
• To find out the MAC id from already active
clients, follow the following method.
•Click on ‘lan clients’ under the ‘advanced’ menu
Copy the MAC ids for the clients whom access has to be permitted.
• To add the clients to the access list find
the following method.
•Click on ‘wireless management’ under ‘advanced’ menu.
Select the check box ‘enable access list’
Select ‘allow’
Enter the MAC id in the space provided.
Click on add.
Click on ‘apply’
• Save the entire configuration by following
the method given below.
Secure wireless modem
Secure wireless modem
Secure wireless modem

More Related Content

What's hot

Quick installation Guide EAP1200H English
Quick installation Guide EAP1200H EnglishQuick installation Guide EAP1200H English
Quick installation Guide EAP1200H English
EnGenius Europe
 
Wndr4000 igpm 08_nov2010
Wndr4000 igpm 08_nov2010Wndr4000 igpm 08_nov2010
Wndr4000 igpm 08_nov2010
Sant2009
 
Op Manager
Op ManagerOp Manager
Op Manager
ahawkins
 
How to control laptop using smartphone
How to control laptop using smartphoneHow to control laptop using smartphone
How to control laptop using smartphone
Jabez Winston
 
How to upgrade tp link adsl modem router (trend chip solution)
How to upgrade tp link adsl modem router (trend chip solution)How to upgrade tp link adsl modem router (trend chip solution)
How to upgrade tp link adsl modem router (trend chip solution)
trunghieu151185
 
3 g and wifi operation manual
3 g and wifi operation manual3 g and wifi operation manual
3 g and wifi operation manual
DishHD Asia
 
How to change Login User Name and Password?
How to change Login User Name and Password?How to change Login User Name and Password?
How to change Login User Name and Password?
taiwan_totolink
 

What's hot (7)

Quick installation Guide EAP1200H English
Quick installation Guide EAP1200H EnglishQuick installation Guide EAP1200H English
Quick installation Guide EAP1200H English
 
Wndr4000 igpm 08_nov2010
Wndr4000 igpm 08_nov2010Wndr4000 igpm 08_nov2010
Wndr4000 igpm 08_nov2010
 
Op Manager
Op ManagerOp Manager
Op Manager
 
How to control laptop using smartphone
How to control laptop using smartphoneHow to control laptop using smartphone
How to control laptop using smartphone
 
How to upgrade tp link adsl modem router (trend chip solution)
How to upgrade tp link adsl modem router (trend chip solution)How to upgrade tp link adsl modem router (trend chip solution)
How to upgrade tp link adsl modem router (trend chip solution)
 
3 g and wifi operation manual
3 g and wifi operation manual3 g and wifi operation manual
3 g and wifi operation manual
 
How to change Login User Name and Password?
How to change Login User Name and Password?How to change Login User Name and Password?
How to change Login User Name and Password?
 

Viewers also liked

Secure wireless modem
Secure wireless modemSecure wireless modem
Secure wireless modem
creativelakshu
 
Chatelier proj2
Chatelier   proj2Chatelier   proj2
Chatelier proj2
creativelakshu
 
Exposición a radiacion uv
Exposición a radiacion uvExposición a radiacion uv
Exposición a radiacion uv
Eric Ibacache
 
Company Profile
Company ProfileCompany Profile
Company Profile
creativelakshu
 
Danfoss Campus Update
Danfoss Campus UpdateDanfoss Campus Update
Danfoss Campus Update
creativelakshu
 
Erosion of Pondicherry beaches
Erosion of Pondicherry beachesErosion of Pondicherry beaches
Erosion of Pondicherry beaches
equitywatch
 
CRZ Coastal and Marine Areas Notifications
CRZ Coastal and Marine Areas NotificationsCRZ Coastal and Marine Areas Notifications
CRZ Coastal and Marine Areas Notifications
GAURAV. H .TANDON
 
OVERVIEW OF TOURISM PLANNING AND DEVELOPMENT
OVERVIEW OF TOURISM PLANNING AND DEVELOPMENTOVERVIEW OF TOURISM PLANNING AND DEVELOPMENT
OVERVIEW OF TOURISM PLANNING AND DEVELOPMENT
Reymarie Oohlala
 

Viewers also liked (8)

Secure wireless modem
Secure wireless modemSecure wireless modem
Secure wireless modem
 
Chatelier proj2
Chatelier   proj2Chatelier   proj2
Chatelier proj2
 
Exposición a radiacion uv
Exposición a radiacion uvExposición a radiacion uv
Exposición a radiacion uv
 
Company Profile
Company ProfileCompany Profile
Company Profile
 
Danfoss Campus Update
Danfoss Campus UpdateDanfoss Campus Update
Danfoss Campus Update
 
Erosion of Pondicherry beaches
Erosion of Pondicherry beachesErosion of Pondicherry beaches
Erosion of Pondicherry beaches
 
CRZ Coastal and Marine Areas Notifications
CRZ Coastal and Marine Areas NotificationsCRZ Coastal and Marine Areas Notifications
CRZ Coastal and Marine Areas Notifications
 
OVERVIEW OF TOURISM PLANNING AND DEVELOPMENT
OVERVIEW OF TOURISM PLANNING AND DEVELOPMENTOVERVIEW OF TOURISM PLANNING AND DEVELOPMENT
OVERVIEW OF TOURISM PLANNING AND DEVELOPMENT
 

Similar to Secure wireless modem

Cisco ASA Firepower
Cisco ASA FirepowerCisco ASA Firepower
Cisco ASA Firepower
Anwesh Dixit
 
Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2
Mohamed Loey
 
Chapter 3 overview
Chapter 3 overviewChapter 3 overview
Chapter 3 overview
ali raza
 
write a Review about Wired Network Security -Network Security Hardware.docx
write a Review about Wired Network Security -Network Security Hardware.docxwrite a Review about Wired Network Security -Network Security Hardware.docx
write a Review about Wired Network Security -Network Security Hardware.docx
lez31palka
 
Aruba instant iap setup rev3
Aruba instant iap setup rev3Aruba instant iap setup rev3
Aruba instant iap setup rev3
Aruba, a Hewlett Packard Enterprise company
 
Cisco umbrella youtube
Cisco umbrella youtubeCisco umbrella youtube
Cisco umbrella youtube
Dhruv Sharma
 
Network Design and Security Best Practices
Network Design and Security Best PracticesNetwork Design and Security Best Practices
Network Design and Security Best Practices
Mike Sherwood
 
Webinar NETGEAR - Nuovi AP Professionali Prosafe WAC720 e WAC730
Webinar NETGEAR - Nuovi AP Professionali Prosafe WAC720 e WAC730Webinar NETGEAR - Nuovi AP Professionali Prosafe WAC720 e WAC730
Webinar NETGEAR - Nuovi AP Professionali Prosafe WAC720 e WAC730
Netgear Italia
 
Securing management, control & data plane
Securing management, control & data planeSecuring management, control & data plane
Securing management, control & data plane
NetProtocol Xpert
 
Commissioning, Managing & Troubleshooting Industrial Networks
Commissioning, Managing & Troubleshooting Industrial NetworksCommissioning, Managing & Troubleshooting Industrial Networks
Commissioning, Managing & Troubleshooting Industrial Networks
Creekside Marketing Group, LLC
 
Quick installation guide
Quick installation guideQuick installation guide
Quick installation guide
georg_boemmelburg
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Security
amiable_indian
 
Sheetal - Wirelesss Hacking - ClubHack2008
Sheetal - Wirelesss Hacking - ClubHack2008Sheetal - Wirelesss Hacking - ClubHack2008
Sheetal - Wirelesss Hacking - ClubHack2008
ClubHack
 
Attacking and Securing WPA Enterprise Networks
Attacking and Securing WPA Enterprise NetworksAttacking and Securing WPA Enterprise Networks
Attacking and Securing WPA Enterprise Networks
Northeast Ohio Information Security Forum
 
Lesson 3- Remote Access
Lesson 3- Remote AccessLesson 3- Remote Access
Lesson 3- Remote Access
MLG College of Learning, Inc
 
How to -_deploy_cyberoam_in_gateway_mode
How to -_deploy_cyberoam_in_gateway_modeHow to -_deploy_cyberoam_in_gateway_mode
How to -_deploy_cyberoam_in_gateway_mode
fankrid
 
531: Controlling access to your IBM MQ system
531: Controlling access to your IBM MQ system531: Controlling access to your IBM MQ system
531: Controlling access to your IBM MQ system
Robert Parker
 
Aruba cppm 6_1_user_guide
Aruba cppm 6_1_user_guideAruba cppm 6_1_user_guide
presantion
presantionpresantion
presantion
ankush patel
 
W I F Iconfig
W I F IconfigW I F Iconfig
W I F Iconfig
Bharat V. Bhensla
 

Similar to Secure wireless modem (20)

Cisco ASA Firepower
Cisco ASA FirepowerCisco ASA Firepower
Cisco ASA Firepower
 
Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2
 
Chapter 3 overview
Chapter 3 overviewChapter 3 overview
Chapter 3 overview
 
write a Review about Wired Network Security -Network Security Hardware.docx
write a Review about Wired Network Security -Network Security Hardware.docxwrite a Review about Wired Network Security -Network Security Hardware.docx
write a Review about Wired Network Security -Network Security Hardware.docx
 
Aruba instant iap setup rev3
Aruba instant iap setup rev3Aruba instant iap setup rev3
Aruba instant iap setup rev3
 
Cisco umbrella youtube
Cisco umbrella youtubeCisco umbrella youtube
Cisco umbrella youtube
 
Network Design and Security Best Practices
Network Design and Security Best PracticesNetwork Design and Security Best Practices
Network Design and Security Best Practices
 
Webinar NETGEAR - Nuovi AP Professionali Prosafe WAC720 e WAC730
Webinar NETGEAR - Nuovi AP Professionali Prosafe WAC720 e WAC730Webinar NETGEAR - Nuovi AP Professionali Prosafe WAC720 e WAC730
Webinar NETGEAR - Nuovi AP Professionali Prosafe WAC720 e WAC730
 
Securing management, control & data plane
Securing management, control & data planeSecuring management, control & data plane
Securing management, control & data plane
 
Commissioning, Managing & Troubleshooting Industrial Networks
Commissioning, Managing & Troubleshooting Industrial NetworksCommissioning, Managing & Troubleshooting Industrial Networks
Commissioning, Managing & Troubleshooting Industrial Networks
 
Quick installation guide
Quick installation guideQuick installation guide
Quick installation guide
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Security
 
Sheetal - Wirelesss Hacking - ClubHack2008
Sheetal - Wirelesss Hacking - ClubHack2008Sheetal - Wirelesss Hacking - ClubHack2008
Sheetal - Wirelesss Hacking - ClubHack2008
 
Attacking and Securing WPA Enterprise Networks
Attacking and Securing WPA Enterprise NetworksAttacking and Securing WPA Enterprise Networks
Attacking and Securing WPA Enterprise Networks
 
Lesson 3- Remote Access
Lesson 3- Remote AccessLesson 3- Remote Access
Lesson 3- Remote Access
 
How to -_deploy_cyberoam_in_gateway_mode
How to -_deploy_cyberoam_in_gateway_modeHow to -_deploy_cyberoam_in_gateway_mode
How to -_deploy_cyberoam_in_gateway_mode
 
531: Controlling access to your IBM MQ system
531: Controlling access to your IBM MQ system531: Controlling access to your IBM MQ system
531: Controlling access to your IBM MQ system
 
Aruba cppm 6_1_user_guide
Aruba cppm 6_1_user_guideAruba cppm 6_1_user_guide
Aruba cppm 6_1_user_guide
 
presantion
presantionpresantion
presantion
 
W I F Iconfig
W I F IconfigW I F Iconfig
W I F Iconfig
 

More from creativelakshu

Configure wifi
Configure wifiConfigure wifi
Configure wifi
creativelakshu
 
Dcp introduction1
Dcp introduction1Dcp introduction1
Dcp introduction1
creativelakshu
 
Lakshu profile
Lakshu profileLakshu profile
Lakshu profile
creativelakshu
 
Chatelier proj1
Chatelier   proj1Chatelier   proj1
Chatelier proj1
creativelakshu
 
Kittens and vaccinations_and_deworming
Kittens and vaccinations_and_dewormingKittens and vaccinations_and_deworming
Kittens and vaccinations_and_deworming
creativelakshu
 
Share&care meet 2012
Share&care meet 2012Share&care meet 2012
Share&care meet 2012
creativelakshu
 

More from creativelakshu (6)

Configure wifi
Configure wifiConfigure wifi
Configure wifi
 
Dcp introduction1
Dcp introduction1Dcp introduction1
Dcp introduction1
 
Lakshu profile
Lakshu profileLakshu profile
Lakshu profile
 
Chatelier proj1
Chatelier   proj1Chatelier   proj1
Chatelier proj1
 
Kittens and vaccinations_and_deworming
Kittens and vaccinations_and_dewormingKittens and vaccinations_and_deworming
Kittens and vaccinations_and_deworming
 
Share&care meet 2012
Share&care meet 2012Share&care meet 2012
Share&care meet 2012
 

Recently uploaded

UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 

Recently uploaded (20)

UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 

Secure wireless modem

  • 1. • Access Restriction using Password
  • 2. Login to the ADSL Router on http://192.168.1.1 The username and password by default are ‘admin’ and ‘admin’. Click on ‘advanced’
  • 3. Click on ‘wireless security’
  • 4. Select the WEP security. Enable WEP security. Key in the desired security password. Click on Apply.
  • 5. • Access List (MAC based)
  • 6. • To add the clients to the access list, find out the MAC id of the clients (wireless interface card) where the connectivity is required, using the command ipconfig –all. • To find out the MAC id from already active clients, follow the following method.
  • 7. •Click on ‘lan clients’ under the ‘advanced’ menu
  • 8. Copy the MAC ids for the clients whom access has to be permitted.
  • 9. • To add the clients to the access list find the following method.
  • 10. •Click on ‘wireless management’ under ‘advanced’ menu.
  • 11. Select the check box ‘enable access list’ Select ‘allow’ Enter the MAC id in the space provided. Click on add.
  • 13. • Save the entire configuration by following the method given below.

Editor's Notes

  1. Proceed to Wireless Security