|
|
Linha 1: |
Linha 1: |
− | [[category=Configuração]] | + | [[category:Configuração]] |
− | Restricting Wireless Access by MAC Address
| + | |
− | When a Wireless Card Access List is configured and enabled, the router checks the MAC
| + | Para adicionar um Mac no roteador siga os passos adiante: |
− | address of any wireless device attempting a connection and allows only connections to
| + | |
− | computers identified on the trusted computers list.
| + | #Logue no roteador acessando o IP 192.168.1.1. |
− | The Wireless Card Access List displays a list of wireless computers that you allow to connect
| + | #Selecione Wireless Settings abaixo de Advanced no menu principal. |
− | to the router based on their MAC addresses. These wireless computers must also have the
| |
− | correct SSID and wireless security settings to access the wireless router.
| |
− | The MAC address is a network device’s unique 12-character physical address, containing
| |
− | the hexadecimal characters 0–9, a–f, or A–F only, and separated by colons (for example,
| |
− | 00:09:AB:CD:EF:01). It can usually be found on the bottom of the wireless card or network
| |
− | interface device. If you do not have access to the physical label, you can display the MAC
| |
− | address using the network configuration utilities of the computer. In WindowsXP, for example,
| |
− | typing the ipconfig/all command in an MSDOS command prompt window displays the
| |
− | MAC address as Physical Address. You might also find the MAC addresses in the router’s
| |
− | Attached Devices screen.
| |
− | To restrict access based on MAC addresses:
| |
− | Chapter 2: Safeguarding Your Network
| |
− | |
| |
− | 35
| |
− | N150 Wireless Router User Manual
| |
− | 1. Select Wireless Settings under Advanced in the main menu. | |
− | 2. In the Advanced Wireless Settings screen, click Setup Access List to display the Wireless
| |
− | Card Access List.
| |
− | Figure 11.
| |
− | 3. Click Add to add a wireless device to the wireless access control list. The Wireless Card
| |
− | Access Setup screen opens and displays a list of currently active wireless cards and their
| |
− | MAC addresses.
| |
− | Figure 12.
| |
− | 4. If the computer you want appears in the Available Wireless Cards list, you can select the
| |
− | radio button of that computer to capture its MAC address; otherwise, you can manually enter
| |
− | a name and the MAC address of the authorized computer. You can usually find the MAC
| |
− | address on the bottom of the wireless device.
| |
− | Tip: You can copy and paste the MAC addresses from the router’s Attached
| |
− | Devices screen into the MAC Address field of this screen. To do this,
| |
− | configure each wireless computer to obtain a wireless link to the router.
| |
− | The computer should then appear in the Attached Devices screen.
| |
− | 5. Click Add to add this wireless device to the Wireless Card Access List. The screen changes
| |
− | back to the list screen.
| |
− | 6. Repeat step 3 through step 5 for each additional device you want to add to the list.
| |
− | 7. Select the Turn Access Control On check box
| |
− | 36 | Chapter 2: Safeguarding Your Network
| |
− | N150 Wireless Router User Manual
| |
− | Note: When configuring the router from a wireless computer whose MAC
| |
− | address is not in the Trusted PC list, if you select Turn Access
| |
− | Control On, you lose your wireless connection when you click
| |
− | Apply. You must then access the wireless router from a wired
| |
− | computer or from a wireless computer that is on the access control
| |
− | list to make any further changes..
| |
− | 8. Click Apply to save your Wireless Card Access List settings.
| |
− | Now, only devices on this list can wirelessly connect to the WNR1000v3h2 router.
| |
− | WARNING!
| |
− | MAC address filtering adds an obstacle against unwanted access
| |
− | to your network by the general public. However, because your
| |
− | trusted MAC addresses appear in your wireless transmissions, an
| |
− | intruder can read them and impersonate them. Do not rely on MAC
| |
− | address filtering alone to secure your network.
| |