TP-Link EAP245 EAP Controller V2.4.7 User Guide - Page 27

View Past Guest Authorization, 2.8 View Logs

Page 27 highlights

Import a saved Trusted Rogue APs list. If the MAC address of an AP appears in list, it will not be detected as a rogue AP. Please follow the steps below: 1. Select Replace (replace the current Trusted Rogue APs list with the one you import) or Merge (add the APs in the file to the current Trusted Rogue APs list). 2. Click Browse to locate the file and choose it. 3. Click Import to import the Trusted Rogue APs list. 2.7 View Past Guest Authorization The Past Guest Authorization page displays the details about all the clients that accessed the network during a certain time period. You can select a period in the drop-down list. 2.8 View Logs The logs of the EAP Controller can effectively record, classify and manage the system information of the managed EAPs, providing powerful support for network administrator to monitor network operation and diagnose malfunctions. The Logs page displays EAP's MAC address, level, occurred time and content. 22

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78

22
Import a saved Trusted Rogue APs list. If the MAC address of an AP appears in list, it will
not be detected as a rogue AP.
Please follow the steps below:
1.
Select
Replace
(replace the current Trusted Rogue APs list with the one you import) or
Merge
(add the APs in the file to the current Trusted Rogue APs list).
2.
Click
Browse
to locate the file and choose it.
3.
Click
Import
to import the Trusted Rogue APs list.
2.7
View Past Guest Authorization
The Past Guest Authorization page displays the details about all the clients that accessed the
network during a certain time period. You can select a period in the drop-down list.
2.8
View Logs
The logs of the EAP Controller can effectively record, classify and manage the system information
of the managed EAPs, providing powerful support for network administrator to monitor network
operation and diagnose malfunctions. The Logs page displays EAP's MAC address, level, occurred
time and content.