54 Mbps Wireless Router WGR614v8 User Manual
Safeguarding Your Network 2-19
v1.1, May 2008
4. If the computer you want appears in the Available Wireless Cards list, you can select the radio 
button of that computer to capture its MAC address; otherwise, you can manually enter a name 
and the MAC address of the authorized computer. You can usually find the MAC address on 
the bottom of the wireless device.
5. Click Add to add this wireless device to the Wireless Card Access List. The screen changes 
back to the list screen. 
6. Repeat step 3 through step 5 for each additional device you want to add to the list.
7. Select the Turn Access Control On check box.
8. Click Apply to save your Wireless Card Access List settings.
Now, only devices on this list can wirelessly connect to the Wireless-G Router.
Tip: You can copy and paste the MAC addresses from the router’s Attached Devices 
screen into the MAC Address field of this screen. To do this, configure each 
wireless computer to obtain a wireless link to the router. The computer should 
then appear in the Attached Devices screen.
Note: When configuring the router from a wireless computer whose MAC address is 
not in the Trusted PC list, if you select Turn Access Control On, you lose 
your wireless connection when you click Apply. You must then access the 
wireless router from a wired computer or from a wireless computer that is on 
the access control list to make any further changes.
Warning: MAC address filtering adds an obstacle against unwanted access to your 
network by the general public. However, because your trusted MAC 
addresses appear in your wireless transmissions, an intruder can read them 
and impersonate them. Do not rely on MAC address filtering alone to secure 
your network.