Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Info

Available with the module Octopus Business, in addition to Octopus Guest

Functionality designed for validation in the service through sessions in which MACs of devices that will have free access to the WiFi network without the need for validation through the captive portal are entered. Depending on the configuration in Locations > Access Methods, several options will appear for the creation of a MAC entry. The steps for generating MAC Entries are listed below.

Table of Contents
minLevel1
maxLevel3

MAC Input creation

To create MAC Inputs go to the submenu Access > MAC Inputs > Create MAC Input and fill in the following fields:

  • MAC: MAC address of the device to which you want to give access to the network.

  • Name: Name of the MAC entry.

  • Description: Description of the MAC entry.

Image RemovedImage Added

MAC Inputs issued

In the submenu Access > MAC Inputs > MAC Inputs issued, you can see the list of issued inputs, together with the MACs cached with other access methods that have the functionality enabled. You can also perform operations on the entries. The content of each column is:

Image Added
  • MAC: MAC address of the device.

  • Type: Defines if it is a MAC Input or if it is a cached MAC with another access method.

  • ID: Name of the MAC entry that we have configured in the creation.

  • Login method: Defines the access method with which the MAC has been stored.

  • Creation: Creation date of the MAC Input or date on which the MAC was cached.

  • Lease: Expiration date of the cached MAC.

  • Individual Operations:

    • Add to blacklist: The MAC can be sent to the blacklist, therefore it will not have access to the network.

    • Change expiration date: Possibility to change the MAC expiration date.

    • Delete: Deletes the contents of the database.

Image Removed
There is a possibility that the MAC entry may be deleted because an inactivity timeout has been set in the Access method > MAC Inputs.
Info

It is possible to filter the

data displayed in the different contents of each column: Image Removed

list by MAC, type, access method, Session, ID, creation and lease (expiration date).

Blacklist

The MACs added in this section will not have access to the network. A MAC can be In the Accesses > MAC Entries > Blacklist submenu, you can see the list of MACs added to the blacklist in 2 ways:1- .

Image Added
Info

It is possible to filter the data by the content of each column.

From the submenu Access > MAC Inputs > Blacklist:

  • By clicking on the "Add MAC" button:

  • Finally, we fill in the data with the MAC we want to add to the blacklist and a description:

2- From the submenu Accesses > MAC entries > Issued entries:

  • By clicking on the button "add to blacklist".

Image RemovedImage Added
  • Then it will be necessary to confirm the action:

In the submenu Access > MAC Inputs > Blacklist, you can see the list of MACs added to the blacklist:

Image Removed

It is possible to filter the data displayed in the different contents of each column:

Image Removed