PART ONE The resources in this learning block are examples of artifacts that have helped create new attitudes toward women and the LGBT community while at the same time being….
Limit Users Another important step in wireless security is to restrict the users who can access the wireless network.
Project 5-4: Limit Users Another important step in wireless security is to restrict the users who can access the wireless network. Access to the wireless network can be restricted by entering the MAC address of the approved wireless device into the wireless router through the MAC address filter. In this project you set up a wireless MAC address filter. A MAC address filter applies only to wireless devices of the network. It does not apply to wired desktop computers that do not use a wireless NIC adapter. 1. Identify the MAC address of a wireless laptop that will be part of this wireless network. On the laptop click Start (and then Run for Windows XP) and enter CMD. When the box opens enter ipconfig/all and scroll down to the details listed under the wireless NIC adapter. Record the Physical Address under the wireless NIC adapter. Do this for each wireless laptop that will be part of the network. 2. If Wireless Access Web: is set to Disable you must use a desktop computer that has a wired connection to the wireless router for these configurations;