- About This Document
- Configuration Notes
Web System Login
Client Configuration
Monitor
Configuration
Diagnosis
Maintenance
System Maintenance
- License (SRUH/SRUHA1/SRUHX1/SRUE Main Control Card)
- License (Non-SRUH/SRUHA1/SRUHX1/SRUE Main Control Card)
- Reboot (Standalone)
- Reboot (SVF)
- Upgrade (Standalone)
- Upgrade (SVF)
- Web File Management
- Patch (Standalone)
- Patch (SVF)
- Plug-in Management
- Log
- Alarm & Event
- Administrator
- System
- SNMP
- Electronic Label
- SMI (NETCONF Mode)
- AS Interface (SVF)
- Certificate Mgmt (NETCONF Mode)
- Controller Mgmt (NETCONF Mode)
- Device Working Mode
AP Maintenance
Network
Profile
Wireless Service
- VAP Profile
- SSID Profile
- Security Profile
- Traffic Profile
- 802.1X Profile
- Portal Profile
- MAC Authentication Profile
- Authentication-free Rule Profile
- URL Profile
- Authentication Scheme
- Authorization Scheme
- Accounting Scheme
- Service Scheme
- Authentication Profile
- STA Blacklist Profile
- STA Whitelist Profile
- SoftGRE Profile
- Cellular Network Profile
- Roaming Consortium Profile
- NAI Realm Profile
- Network Connection Capability Profile
- Operator Domain Profile
- Carrier Name Profile
- Venue Name Profile
- Operating Class Profile
- Hotspot2.0 Profile
Radio Management
AP
Mesh
WDS
WIDS
WLAN Location
Bluetooth Service
IoT
WMI Function
Configuration Examples
- Example for Configuring a Small-Sized Campus Network
- Example for Backing Up the Configuration File
- Example for Configuring EasyDeploy
- Example for Configuring SNMP
- Example for Configuring SVF
- Example for Configuring IPv4 Static Routes
- Example for Configuring IPv6 Static Routes
- Example for Configuring a Device as a DHCP Server (Based on an Interface Address Pool)
- Example for Configuring IPSG Based on the DHCP Snooping Dynamic Binding Table to Prevent Hosts from Changing Their Own IP Addresses
- Example for Connecting IP Phones to Switches Through LLDP
- Example for Configuring Unified Access for Wired and Wireless Users
- Example for Using Advanced ACLs to Control Access to the Specified Server in the Specified Time Range
- Example for Using Advanced ACLs to Restrict Mutual Access Between Network Segments