II
2.8 Configure Rogue AP Detection
Detect Rogue APs and Move the Rogue APs to the Trusted AP List
....................................... 48
..................................................................................................52
3.2 Monitor the Wireless Parameters
4.1 Manage the IP Address of the EAP
Configure the Way of Receiving Logs
4.4 Configure Management Access
Configure Access MAC Management
....................................................................70
4.7 Configure PoE Out (Only for Certain Devices)
..............................................................................71
................................................................................................75