TP-Link Auranet EAP120 EAP Controller Software V2 User Guide - Page 4

Layer-3 Management, Application Example

Page 4 highlights

5.2 User ...54 5.3 Guest...54 5.4 Configuration ...54 5.4.1 Basic Config ...55 5.4.2 IP Setting ...55 5.4.3 Radio ...57 5.4.4 Load Balance ...58 5.4.5 SSID Override...59 5.4.6 Rogue AP Detection ...60 5.4.7 Forget this AP...60 Chapter 6 Layer-3 Management 61 Chapter 7 Application Example 63 7.1 Map Monitor ...63 7.2 Portal Authentication ...63 III

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72

5.2
User
.....................................................................................................................................................................
54
5.3
Guest
...................................................................................................................................................................
54
5.4
Configuration
..................................................................................................................................................
54
5.4.1
Basic Config
............................................................................................................................................
55
5.4.2
IP Setting
.................................................................................................................................................
55
5.4.3
Radio
.........................................................................................................................................................
57
5.4.4
Load Balance
..........................................................................................................................................
58
5.4.5
SSID Override
.........................................................................................................................................
59
5.4.6
Rogue AP Detection
............................................................................................................................
60
5.4.7
Forget this AP
.........................................................................................................................................
60
Chapter 6
Layer-3 Management
.............................................................
61
Chapter 7
Application Example
..............................................................
63
7.1
Map Monitor
....................................................................................................................................................
63
7.2
Portal Authentication
...................................................................................................................................
63
III