134 | Authentication Dell PowerConnect W-Series Instant Access Point 6.2.0.0-3.2.0.0 | User Guideof MAC addresses. Additionally, it is easy to change the MAC address of a station to match one onthe accepted list. This spoofing is trivial to perform with built-in driver tools, and it should not berelied upon to provide security.MAC authentication can be used alone, but typically it is combined with other forms ofauthentication, such as WEP authentication. Because MAC addresses are easily observed duringtransmission and easily changed on the client, this form of authentication should be considerednothing more than a minor hurdle. It is recommended that you do not use the MAC-basedauthentication.Configuring MAC AuthenticationTo enable MAC Authentication for a wireless network:1. In the Network tab, click the network for which you want to enable MAC authentication. Theedit link for the network appears.2. Click the edit link and navigate to the Security tab.3. For a network with Personal or Open security level, select Enabled from the MACauthentication drop-down list.4. Click OK to continue.Figure 94 - Configuring MAC Authentication5. Click Next and then click Finish to apply the changes.Walled Garden AccessOn the Internet, a walled garden typically controls a user’s access to web content and services. Thewalled garden directs the user’s navigation within particular areas to allow access to a selection ofwebsites or prevent access to other websites.Creating a Walled Garden AccessWalled garden access is needed when an external captive portal is used. A common example couldbe a hotel environment where unauthenticated users are allowed to navigate to a designated login