This topic will explain the configuration flow between AP and NCC. There are 3 entities involved in the flow, the user, NCC, and AP. The flow is described sequentially below. * Starting from the user, whenever the user adjusts configurations on NCC and then press save, the configurations will be sent by NCC to the APs.…
When a client is applied the "Allow" (Whitelist) policy, the client can bypass the authentication through captive portal login methods. If the SSID is configured with layer 2 security via WPA2-PSK and Captive portal for authentication, the allowed clients still be required to enter the pre-shared key password. However, it…
You may often encounter reason codes (#) in event logs without fully understanding their meaning. Below are some common reason codes related to access point event logs: For more details and the original source of this explanation, please visit this post from aboutcher.co
Nebula provides the option to let users authenticate into wireless networks using WPA2 enterprise with My RADIUS server option, connecting to a domain controller located in the network. Note: The SSID network needs to be configured in order to apply 802.1X authentication for the clients connecting to the wireless network.…
What if NAP had no response after firmware upgrade got interrupted? NAP is designed with dual-image capability, allowing a firmware failover in the NAP boot-up process if the running firmware is damaged or corrupted. When it happened to unstable power supply or sudden power outage during the firmware upgrade, the NAP may…
How do I choose between Nebula or NXC products? The difference between NXC series and Nebula is that the NXC series has more complex configurations available and require higher skillsets and networking knowledge while Nebula is meant to be intuative and simple to manage. We would suggest depending you or your customers'…
It looks like you're new here. Sign in or register to get started.