Duration+ flow control, no longer afraid of loiter network etc.
Control strategy of duration on surfing the Internet and flow quota ar ...
Anti-phishing Function says goodbye to illegal hotspots
With the rapid development of internet and the popularization of mobil ...
Demystify Sundary Technologies wireless optimization of E-schoolbag scenario
E-schoolbag is a mobile digital school, which takes students as princi ...
How to solve the problem of high-density wireless access in meeting place, site of activity and other circumstance?
When deploying a wireless network in some meeting room and exhibition ...
How to set access authority of user through role assignment?
After the access authentication of user passes the wireless terminal, ...
On flexible settings of non-first time wireless internet authentication
In general wireless network, the network only can be used after the us ...
How to prevent IP address conflict resulted from static IP of client side
The client side will use internet method with static IP and adopt stat ...
How to avoid network interrupt resulted from authentication server downtime
In the higher education and in the scenario with higher requirement fo ...