
Note that MAC address spoofing can bypass your access controls. An ACL isn't foolproof, but adds yet
another layer of control.
fig 7: Access Control List
Client List
The client list, shown on the AP as the client display list (see fig 8) shows details of all clients as well
as the state of the AP itself.
Commentaires sur ces manuels