TP-Link EAP225-Wall Omada Controller Software 3.0.5 Windows/Linux User Guide - Page 33

Manage Clients in the Action Column, 2.6 Manage the Rogue APs List

Page 33 highlights

All User Guest Blocked Rate Limited The page displays the history information of all the clients. The page displays the history information of Users. Users are the clients connected to the EAP wireless network without the Portal Authentication. The page displays the history information of Guests. Guests are the clients connected to the EAP wireless network with the Portal Authentication. The page displays the clients that have been blocked. The page displays the clients that have been limited upload or download rate. All The page displays the history information of all clients. Offline Only The page displays the history information of the off-line clients. 2.5.3 Manage Clients in the Action Column You can execute the corresponding operation to the EAP in the Action column: Block the client's access to the network. Resume the client's access. Configure the rate limit of the client and view the connection history. Remove the limit to the client's upload or download rates. 2.6 Manage the Rogue APs List A Rogue AP is an access point that has been installed on a secure network without explicit authorization from a system administrator. The Omada Controller can scan all channels to detect all nearby EAPs. If rogue APs are detected, they will be shown on the Untrusted Rogue APs list. Besides, you can move the untrusted rogue APs to the Trusted Rogue APs list. By default, the Rogue AP Detection feature is disabled. To allow your EAP to detect nearby APs, you need to enable this feature for this EAP. You can refer to Rogue AP Detection. 27

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146

27
All
The page displays the history information of all the clients.
User
The page displays the history information of Users.
Users are the clients connected to the EAP wireless network without the
Portal
Authentication
.
Guest
The page displays the history information of Guests.
Guests are the clients connected to the EAP wireless network with the
Portal
Authentication
.
Blocked
The page displays the clients that have been blocked.
Rate Limited
The page displays the clients that have been limited upload or download rate.
All
The page displays the history information of all clients.
Offline Only
The page displays the history information of the off-line clients.
2.5.3
Manage Clients in the Action Column
You can execute the corresponding operation to the EAP in the
Action
column:
Block the client's access to the network.
Resume the client's access.
Configure the rate limit of the client and view the connection history.
Remove the limit to the client’s upload or download rates.
2.6
Manage the Rogue APs List
A Rogue AP is an access point that has been installed on a secure network without explicit
authorization from a system administrator. The Omada Controller can scan all channels to detect
all nearby EAPs. If rogue APs are detected, they will be shown on the
Untrusted Rogue APs
list.
Besides, you can move the untrusted rogue APs to the
Trusted Rogue APs
list.
By default, the Rogue AP Detection feature is disabled. To allow your EAP to detect nearby APs, you
need to enable this feature for this EAP. You can refer to
Rogue AP Detection
.