WEC8500/8050 Operation Manual Version 5.2Samsung Electronics America page 17 of 533Figure 151. 802.11a/n Admission Control Configuration Window .............................................313Figure 152. RADIUS server configuration .................................................................................317Figure 153. Wireless Intrusion General Configuration Window .................................................324Figure 154. Managed Rule Configuration Window....................................................................326Figure 155. Managed Addition Window ....................................................................................326Figure 156. Unmanaged Rule Configuration Window ...............................................................328Figure 157. Unmanaged Rule Addition Window .......................................................................328Figure 158. List Window to Manually Change Classification .....................................................330Figure 159. Classification Change Window in AP Detail Screen ...............................................330Figure 160. List Window to Manually Remove ..........................................................................331Figure 161. Manual Remove Change Window in AP Detail Screen ..........................................332Figure 162. Configuration Window for Unauthorized AP Detection Option ...............................333Figure 163. Configuration Window for Unauthorized Station Detection Option .........................335Figure 164. Configuration Window for Channel Validation ........................................................336Figure 165. AP blacklist Configuration Window.........................................................................338Figure 166. Managed AP Window .............................................................................................338Figure 167. Station blacklist Search/Configuration Window ......................................................339Figure 168. Managed Station Search Window ..........................................................................339Figure 169. Managed SSID Window .........................................................................................340Figure 170. Managed/Neighbor AP Search/Configuration Window ...........................................341Figure 171. Managed/Neighbor AP List Addition Window .........................................................341Figure 172. Station Allowed Limit Configuration Window ..........................................................342Figure 173. WLAN Guest Configuration Window ......................................................................344Figure 174. WLAN Web Policy Configuration Window ..............................................................344Figure 175. Guest User Configuration Window .........................................................................347Figure 176. Guest User List Window ........................................................................................347Figure 177. Guest Auth Configuration Window .........................................................................347Figure 178. Web Auth Configuration Window ...........................................................................348Figure 179. Web Pass-through Configuration Window .............................................................350Figure 180. Firewall configuration (1)........................................................................................351Figure 181. Firewall configuration (2)........................................................................................352Figure 182. Access-list configuration ........................................................................................353Figure 183. NAT configuration (1) .............................................................................................356Figure 184. NAT configuration (2) .............................................................................................356Figure 185. MAC configuration .................................................................................................358Figure 186. MAC entry configuration window(1) .......................................................................358Figure 187. MAC entry configuration(2) ....................................................................................359Figure 188. MAC entry configuration(3) ....................................................................................359Figure 189. TTACACS+ Server Configuration Window .............................................................362