Loading ...
Loading ...
Loading ...
38
8 ConfigureAccess Point
From the Configure section, users can manage Profiles and devices for the organization.
The following sections provide more detailed information about Profile and device management
respectively.
Profiles
From the Profiles section, users can create new and edit
existing profiles, add a single device or bulk import a group of
devices, and apply profile configuration settings to associated
devices.
Refer to the Profiles section on page 39
for more
information.
Devices From the Devices section, users can add a single device, or
bulk import a group of devices, and configure individual device
settings.
Refer to the Devices section on page 61
for more
information.
IP ACLs F
rom the IP ACL section, users can create, manage, and
delete IP access control lists used to manage user network
access based on their IP address.
Refer to the IP ACLs section on page 70
for more
information.
MAC ACLs From the MAC ACL section, users can create, manage, and
delete MAC access control lists used to manage user network
access based on their devices MAC address
or through
remote RADIUS server authentication.
Refer to the MAC ACLs section on page 73
for more
information.
Local Authentication From the Local Authentication section, users can create,
manage, and delete local user account databases that are
used as a user authentication method in Wi-Fi captive portal
pages.
Refer to the Local Authentication section on page 76 for
more information.
Loading ...
Loading ...
Loading ...