Netgear WNHD3004 User's Guide Page 35

  • Download
  • Add to my manuals
  • Print
  • Page
    / 64
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 34
3DHD Home Theater Adapter WNHD3004 User Manual
Wireless Security 4-11
v1.0, November 2010
To restrict access based on MAC addresses:
1. In the main menu under Advanced, select MAC Address Filter, and select the option to turn
MAC Address Filtering on.
2. The Add MAC Filtering Rule screen opens and displays a list of currently active wireless
cards and their Ethernet MAC addresses.
3. If the device you want appears in the Available Wireless Cards list, you can select the radio
button of that device to capture its MAC address; otherwise, you can manually enter a name
and the MAC address of the authorized computer. You can usually find the MAC address on
the bottom label of the wireless device.
4. Click Add to add this wireless device to the Wireless Station Access List.
5. Repeat step 3 and step 4 for each additional device you want to add to the list..
6. Click Apply to save your Wireless Station Access List settings.
Now, only devices on this list can wirelessly connect to the home theater adapter.
Tip: You can copy and paste the MAC addresses from the routers Attached Devices
screen into the MAC Address field of this screen. To do this, configure each
wireless computer to obtain a wireless link to the router. The computer should
then appear in the Attached Devices screen.
Note: When configuring the unit from a wireless computer whose MAC address is
not in the Trusted PC list, if you select Turn Access Control On, you lose
your wireless connection when you click Apply. You must then access the unit
from a wired computer or from a wireless computer that is on the access
control list to make any further changes.
Warning: MAC address filtering adds an obstacle against unwanted access to your
network by the general public. However, your trusted MAC addresses appear
in your wireless transmissions, so an intruder can read them and impersonate
them. Do not rely on MAC address filtering alone to secure your network.
Page view 34
1 2 ... 30 31 32 33 34 35 36 37 38 39 40 ... 63 64

Comments to this Manuals

No comments