TP-Link EAP225-Wall Omada Controller Software 3.1.13 User Guide - Page 37

Manage the Untrusted Rogue APs List, Untrusted Rogue APs, Action

Page 37 highlights

all nearby EAPs. If rogue APs are detected, they will be shown on the Untrusted Rogue APs list. Besides, you can move the untrusted rogue APs to the Trusted Rogue APs list. By default, the Rogue AP Detection feature is disabled. To allow your EAP to detect nearby APs, you need to enable this feature for this EAP. You can refer to Rogue AP Detection. 2.6.1 Manage the Untrusted Rogue APs List The Untrusted Rogue APs page displays the detailed information of untrusted rogue APs. You can execute the corresponding operation to the EAP in the Action column: Move the untrusted rogue AP to the Trusted Rogue APs list. Delete this record. Delete all records. 2.6.2 Manage the Trusted Rogue APs List The Trusted Rogue APs page displays the detailed information of trusted rogue APs. You can execute the corresponding operation to the EAP by clicking an icon in the Action column: Move the trusted rogue AP to the Untrusted Rogue APs list. Export and download the current Trusted Rogue APs list and save it on your PC. 31

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165

31
all nearby EAPs. If rogue APs are detected, they will be shown on the
Untrusted Rogue APs
list.
Besides, you can move the untrusted rogue APs to the
Trusted Rogue APs
list.
By default, the Rogue AP Detection feature is disabled. To allow your EAP to detect nearby APs, you
need to enable this feature for this EAP. You can refer to
Rogue AP Detection
.
2.6.1
Manage the Untrusted Rogue APs List
The
Untrusted Rogue APs
page displays the detailed information of untrusted rogue APs.
You can execute the corresponding operation to the EAP in the
Action
column:
Move the untrusted rogue AP to the Trusted Rogue APs list.
Delete this record.
Delete all records.
2.6.2
Manage the Trusted Rogue APs List
The Trusted Rogue APs page displays the detailed information of trusted rogue APs.
You can execute the corresponding operation to the EAP by clicking an icon in the
Action
column:
Move the trusted rogue AP to the Untrusted Rogue APs list.
Export and download the current Trusted Rogue APs list and save it on your PC.