TP-Link EAP110 EAP Controller Software V1 User Guide - Page 4
Application Example
View all TP-Link EAP110 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 4 highlights
EAP Controller User Guide Contents 5.4 Configuration ...47 5.4.1 Basic Config ...47 5.4.2 IP Setting ...48 5.4.3 Radio ...49 5.4.4 Load Balance ...51 5.4.5 SSID Override...51 5.4.6 Rogue AP Detection ...52 5.4.7 Forget this AP...53 Chapter 6 Application Example 54 6.1 Map Monitor ...54 6.2 Portal Authentication ...54 III
EAP Controller
User Guide
Contents
III
5.4
Configuration
..................................................................................................................................................
47
5.4.1
Basic Config
............................................................................................................................................
47
5.4.2
IP Setting
.................................................................................................................................................
48
5.4.3
Radio
.........................................................................................................................................................
49
5.4.4
Load Balance
..........................................................................................................................................
51
5.4.5
SSID Override
.........................................................................................................................................
51
5.4.6
Rogue AP Detection
............................................................................................................................
52
5.4.7
Forget this AP
.........................................................................................................................................
53
Chapter 6
Application Example
..............................................................
54
6.1
Map Monitor
....................................................................................................................................................
54
6.2
Portal Authentication
...................................................................................................................................
54