Chapter 4
Advanced Configuration
15
Wireless-G ADSL Home Gateway
Wireless > Wireless Access
Wireless access can be filtered by using the MAC addresses
of the wireless devices transmitting within your network’s
radius.
Wireless > Wireless Access
Wireless Network Access
Allow All/Restrict Access
To filter wireless users by MAC
address, either permitting or blocking access, select
Restrict
Access
. If you do not wish to filter users by MAC address,
keep the default,
Allow All
.
Prevent listed computers from accessing the wireless
network
Select this to block wireless access by MAC
address. This setting is selected by default.
Permit only listed computers to access the wireless
network
Select this to allow wireless access by MAC
address.
Edit MAC Address Access List
Click this to open the
MAC
Address Filter List
screen.
MAC Address Filter List
MAC Address Filter List
MAC 01-20
Enter the MAC addresses of the devices
whose wireless access you want to block or allow.
Wireless Client MAC List
Click this to open the
Wireless Client List
screen.
Wireless Client List
Wireless Client List
This screen lists the MAC addresses of the wireless
devices. Select
Enable MAC Filter
for any device you
want to add to the MAC Address Filter List. Then click
Update Filter List
.
To retrieve the most up-to-date information, click
Refresh
. To exit this screen and return to the
Wireless
MAC Filter List
screen, click
Close
.
Click
Save Settings
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Wireless > Advanced Wireless Settings
The
Advanced Wireless Settings
screen is used to set up the
Gateway’s advanced wireless functions. These settings
should only be adjusted by an expert administrator as
incorrect settings can reduce wireless performance.
Wireless > Advanced Wireless Settings
Advanced Wireless
Wireless-G Settings
Authentication Type
The default is
Auto
, which allows
either Open System or Shared Key authentication to be
used. With Open System authentication, the sender and
the recipient do NOT use a WEP key for authentication.
With Shared Key authentication, the sender and recipient