The access to private wireless networks must be restricted through user credentials and authorized MAC addresses.
When the restriction access through user credentials and MAC addresses is applied, it helps to protect against various Wi-Fi attacks, such as unauthorized access, on-path and rogue devices within the wireless range. By allowing only specific MAC addresses and access with proper credentials, the network administrator can control which devices are permitted to connect.
This requirement is verified in following services
Plan | Supported |
---|---|
Essential | 🔴 |
Advanced | 🟢 |