D-Link DBA-2820P Nuclias Wireless AC2600 Cloud-Managed Access Point

User Manual - Page 47

For DBA-2820P.

PDF File Manual, 155 pages, Read Online | Download pdf file

DBA-2820P photo
Loading ...
Loading ...
Loading ...
Configure-Access Points
From the Configure-Access Points section, users can manage Profiles and devices for the organization.
The following sections provide more detailed information about Profile and device management respectively.
Profiles
From the Profiles section, users can create new and edit existing profiles, add a single device or bulk
import a group of devices, and apply profile configuration settings to associated devices.
Devices
From the Devices section, users can add a single device, or bulk import a group of devices, and
configure individual device settings.
IP ACLs
From the IP ACL section, users can create, manage, and delete IP access control lists used to manage
user network access based on their IP address.
MAC ACLs
From the MAC ACL section, users can create, manage, and delete MAC access control lists used to
manage user network access based on their device’s MAC address or through remote RADIUS server
authentication.
Local
Authentication
From the Local Authentication section, users can create, manage, and delete local user account
databases that are used as a user authentication method in Wi-Fi captive portal pages.
Splash Page
Editor
From the Splash Page Editor window, users can configure and customize splash pages to use with the
SSID. This can be configured to have users click through or enter credentials to access the network.
Users can either customize any of the default splash pages or create their own unique splash pages.
LDAP Servers
From the LDAP Servers page, users can create, manage, and delete LDAP servers that allow for access and
maintenance of information services over an IP network, often to used to store, access and share
information within an organization.
RADIUS
Server
From the RADIUS server page, users can create, edit and delete RADIUS servers that help to maintain and
manage a central database to authenticate all users/clients, giving you control over who accesses the
network.
Walled
Garden
From the Walled Garden page, users can create, edit or delete walled gardens that can either restrict or
redirect clients to certain web addresses
Loading ...
Loading ...
Loading ...