Digital Watchdog Starlight D1363D Informations techniques Page 41

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 102
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 40
Note that MAC address spoofing can bypass your access controls. An ACL isn't foolproof, but adds yet
another layer of control.
fig 7: Access Control List
Client List
The client list, shown on the AP as the client display list (see fig 8) shows details of all clients as well
as the state of the AP itself.
Vue de la page 40
1 2 ... 36 37 38 39 40 41 42 43 44 45 46 ... 101 102

Commentaires sur ces manuels

Pas de commentaire