?
Solved

MAC based filtering in Virtual Wirelessless controller

Posted on 2014-01-07
2
Medium Priority
?
271 Views
Last Modified: 2014-01-20
Hi,

We have installed Virtual WLC 7.4 version.

Our requirement is

Can we configure for Mac based access policies for the VLAN users...

Only configured MAC address users should access and Non-allowed users should
restrict

Regards
ram
0
Comment
Question by:RAMU CH
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 12

Accepted Solution

by:
David Paris Vicente earned 2000 total points
ID: 39764791
Hi ram.

I advise you to take a look on this guide for the Mac filtering you can find the guide here -> Cisco Wireless LAN Controller Configuration Guide,

The steps to achieve that are begining on pag 539.

I hope this can guide you.

Regards
0
 
LVL 1

Author Closing Comment

by:RAMU CH
ID: 39793960
Thaks
0

Featured Post

NFR key for Veeam Agent for Linux

Veeam is happy to provide a free NFR license for one year.  It allows for the non‑production use and valid for five workstations and two servers. Veeam Agent for Linux is a simple backup tool for your Linux installations, both on‑premises and in the public cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

MAC Filtering: MAC filtering is like handing a list of names to a doorman. If someone comes to the door and mentions a name, this name is checked by the doorman on his list and granted or denied access by this. This means that if someone menti…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

800 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question