71
User Manual ENGLISH
WHG-Series Wireless WLAN Controller
Copyright © 2017, 4ipnet, Inc. All rights reserved. All other trademarks mentioned are the property of their respective owners.
address. Devices specified in the list require NO authentication to access the network.
Add: IP Address in IPv6 format and User Group fields are required. MAC Address field can be an option for
the matching condition with the IP Address. Noted that the privileged clients are still able be applied the
user policy.
Delete: to delete the selected existed IP privilege entry
Backup List: to back up the whole entries in txt file for further application
Restore List: it is helpful to batch create the privilege entries by upload a .txt file with IP Address, Remark,
MAC Address, Group
MAC Privilege List
6.2.4
The Privilege function supports three types of privilege list based on IP address, MAC address and IPv6
address. Devices specified in the list require NO authentication to access the network.
Add: MAC Address field is required. Noted the privileged clients will NOT be applied any user policy.
Delete: to delete the selected existed IP privilege entry
Backup List: to back up the whole entries in txt file for further application
Restore List: it is helpful to batch create the privilege entries by upload a .txt file with MAC Address,
Reserved, Remark
MAC Access Control List
6.2.5
MAC ACL is a MAC Address Access Control List where specific MAC addresses may be listed for access
filtering, either allow, deny or disable.
MAC Access Control List: The administrator may configure restraining measures to MAC address, either
MAC allow or deny list. User authentication is still required for MAC ACL Allowed users.
Note
: The format of the MAC address is: xx:xx:xx:xx:xx:xx or xx-xx-xx-xx-xx-xx. Colon will be automatically
inserted by the system.
6.3
Additional Control
Additional configurations are in this section. They are User Session Control, Built-in RADIUS Server
Settings, Customization, Remaining Time Reminder, and MAC ACL.
User Session Control
Idle Timeout: Configure the time base without activity to deem as idle timeout.
Idle Detect Interval: The time interval for checking for whether the idle criteria are reached. Successive
accumulation of idle intervals exceeding the Idle time configure above, will induce an idle timeout action
where the user will be logged out.