D-Link DBS-2000-10 Nuclias Manual - Page 46

Con Access Point

Page 46 highlights

8 Configure - Access Point From the Configure section, users can manage Profiles and devices for the organization. The following sections provide more detailed information about Profile and device management respectively. Profiles Devices IP ACLs MAC ACLs Local Authentication From the Profiles section, users can create new and edit existing profiles, add a single device or bulk import a group of devices, and apply profile configuration settings to associated devices. Refer to the Profiles section on page 39 for more information. From the Devices section, users can add a single device, or bulk import a group of devices, and configure individual device settings. Refer to the Devices section on page 61 for more information. From the IP ACL section, users can create, manage, and delete IP access control lists used to manage user network access based on their IP address. Refer to the IP ACLs section on page 70 for more information. From the MAC ACL section, users can create, manage, and delete MAC access control lists used to manage user network access based on their device's MAC address or through remote RADIUS server authentication. Refer to the MAC ACLs section on page 73 for more information. From the Local Authentication section, users can create, manage, and delete local user account databases that are used as a user authentication method in Wi-Fi captive portal pages. Refer to the Local Authentication section on page 76 for more information. 38

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115

38
8 Configure – Access Point
From the Configure section, users can manage Profiles and devices for the organization.
The following sections provide more detailed information about Profile and device management
respectively.
Profiles
From the Profiles section, users can create new and edit
existing profiles, add a single device or bulk import a group of
devices, and apply profile configuration settings to associated
devices.
Refer to the
Profiles section on page 39
for more
information.
Devices
From the Devices section, users can add a single device, or
bulk import a group of devices, and configure individual device
settings.
Refer to the
Devices section on page 61
for more
information.
IP ACLs
From the IP ACL section, users can create, manage, and
delete IP access control lists used to manage user network
access based on their IP address.
Refer to the
IP ACLs section on page 70
for more
information.
MAC ACLs
From the MAC ACL section, users can create, manage, and
delete MAC access control lists used to manage user network
access based on their device’s MAC address or through
remote RADIUS server authentication.
Refer to the
MAC ACLs section on page 73
for more
information.
Local Authentication
From the Local Authentication section, users can create,
manage, and delete local user account databases that are
used as a user authentication method in Wi-Fi captive portal
pages.
Refer to the
Local Authentication section on page 76
for
more information.