Info |
---|
Modules to contract: Octopus Guest, Octopus Enterprise.Available with the module Octopus Business, in addition to Octopus Guest |
Functionality designed for validation in the service through sessions in which MACs of devices that will have free access to the WiFi network without the need for validation through the captive portal are entered. Depending on the configuration in Locations > Access Methods, several options will appear for the creation of a MAC entry. The steps for generating MAC Entries are listed below.
Table of Contents |
---|
MAC Input creation
To create MAC Inputs go to the submenu Access > MAC Inputs > Create MAC Input and fill in the following fields:
MAC: MAC address of the device to which you want to give access to the network.
Name: Name of the MAC entry.
Description: Description of the MAC entry.
MAC Inputs issued
In the submenu Access > MAC Inputs > MAC Inputs issued, you can see the list of issued inputs, together with the MACs cached with other access methods that have the functionality enabled. You can also perform operations on the entries. The content of each column is:
MAC: MAC address of the device.
Type: Defines if it is a MAC Input or if it is a cached MAC with another access method.
ID: Name of the MAC entry that we have configured in the creation.
Login method: Defines the access method with which the MAC has been stored.
Creation: Creation date of the MAC Input or date on which the MAC was cached.
Lease: Expiration date of the cached MAC.
Individual Operations:
Add to blacklist: The MAC can be sent to the blacklist, therefore it will not have access to the network.
Change expiration date: Possibility to change the MAC expiration date.
Delete: Deletes the contents of the database.
There is a possibility that the MAC entry may be deleted because an inactivity timeout has been set in the Access method > MAC Inputs.
It is possible to filter the data displayed in the different contents of each column:
Blacklist
MACs added in this section will not have access to the network. A MAC can be added to the blacklist in 2 ways:
1- From the submenu Access > MAC Inputs > Blacklist:
By clicking on the "Add MAC" button:
Finally, we fill in the data with the MAC we want to add to the blacklist and a description:
2- From the submenu Accesses > MAC entries > Issued entries:
By clicking on the button "add to blacklist".
Then it will be necessary to confirm the action:
In the submenu Access > MAC Inputs > Blacklist, you can see the list of MACs added to the blacklist:
It is possible to filter the data displayed in the different contents of each column: