TP-Link EAP225-Wall Omada Controller Software 3.1.4 User Guide - Page 34

View the History Information of Clients, 2.5.3 Manage Clients in the Action Column

Page 34 highlights

2.5.2 View the History Information of Clients You can click the client's MAC address to get its connection history and configure the Rate Limit feature for this client. In addition, you can click the following tabs to view the information of different types of clients: All User Guest Blocked Rate Limited The page displays the history information of all the clients. The page displays the history information of Users. Users are the clients connected to the EAP wireless network without the Portal Authentication. The page displays the history information of Guests. Guests are the clients connected to the EAP wireless network with the Portal Authentication. The page displays the clients that have been blocked. The page displays the clients that have been limited upload or download rate. All The page displays the history information of all clients. Offline Only The page displays the history information of the off-line clients. 2.5.3 Manage Clients in the Action Column You can execute the corresponding operation to the EAP in the Action column: Block the client's access to the network. Resume the client's access. Configure the rate limit of the client and view the connection history. Remove the limit to the client's upload or download rates. 2.6 Manage the Rogue APs List A Rogue AP is an access point that has been installed on a secure network without explicit authorization from a system administrator. The Omada Controller can scan all channels to detect 28

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154

28
2.5.2
View the History Information of Clients
You can click the client's MAC address to get its connection history and configure the Rate Limit
feature for this client. In addition, you can click the following tabs to view the information of different
types of clients:
All
The page displays the history information of all the clients.
User
The page displays the history information of Users.
Users are the clients connected to the EAP wireless network without the
Portal
Authentication
.
Guest
The page displays the history information of Guests.
Guests are the clients connected to the EAP wireless network with the
Portal
Authentication
.
Blocked
The page displays the clients that have been blocked.
Rate Limited
The page displays the clients that have been limited upload or download rate.
All
The page displays the history information of all clients.
Offline Only
The page displays the history information of the off-line clients.
2.5.3
Manage Clients in the Action Column
You can execute the corresponding operation to the EAP in the
Action
column:
Block the client's access to the network.
Resume the client's access.
Configure the rate limit of the client and view the connection history.
Remove the limit to the client’s upload or download rates.
2.6
Manage the Rogue APs List
A Rogue AP is an access point that has been installed on a secure network without explicit
authorization from a system administrator. The Omada Controller can scan all channels to detect