Please begin by filling out the initial questions below

If you need assistance just email or call us and we'll be glad to help.

Enter a VLAN name, Gateway IP Address, and VLAN tag (optional) you'd like to use.

Click to add as many as you would like. We will send you switch port forms requesting specific port information. Not sure? Just let us know and we can design it for you!
Access points will receive an IP via the DHCP server. If a server is not available please let us know.

Section

Best practices dictate not using the client name or address in any part of the network name.
Note: The best and most secure choice is WPA2/AES. Anything else is insecure and also cannot attain 802.11n speeds or greater. WPA/TKIP should only be used for legacy equipment that cannot connect to WPA2/AES.
The password must be a minimum of 8 characters long. Length is preferred over complexity but best practices require a combination of characters, numbers special characters, and different cases, along with at least 10 characters in length.
(eg. 192.168.0.0/24 or 10.0.0.0/24)
Best practices dictate not using the client name or address in any part of the network name.
Note: The best and most secure choice is WPA2/AES. Anything else is insecure and also cannot attain 802.11n speeds or greater. WPA/TKIP should only be used for legacy equipment that cannot connect to WPA2/AES.
The password must be a minimum of 8 characters long. Length is preferred over complexity but best practices require a combination of characters, numbers special characters, and different cases, along with at least 10 characters in length.
Before connecting to the guest network users will be required to accept the terms of use before gaining wireless internet access.
Your company name will be entered at the bottom as "powering" the network.
Maximum upload size: 50MB
If we already have your logo please skip to the next step.
Some programmers require a network that is directly connected to the control system's subnet which makes discovery and troubleshooting easier. Or you may require an additional network for a secure office or a safe browsing network for children.
Best practices dictate not using the client name or address in any part of the network name.
Note: The best and most secure choice is WPA2/AES. Anything else is insecure and also cannot attain 802.11n speeds or greater. WPA/TKIP should only be used for legacy equipment that cannot connect to WPA2/AES.
The password must be a minimum of 8 characters long. Length is preferred over complexity but best practices require a combination of characters, numbers special characters, and different cases, along with at least 10 characters in length.
Some programmers require a network that is directly connected to the control system's subnet which makes discovery and troubleshooting easier. Or you may require an additional network for a secure office or a safe browsing network for children.
Best practices dictate not using the client name or address in any part of the network name.
Note: The best and most secure choice is WPA2/AES. Anything else is insecure and also cannot attain 802.11n speeds or greater. WPA/TKIP should only be used for legacy equipment that cannot connect to WPA2/AES.
The password must be a minimum of 8 characters long. Length is preferred over complexity but best practices require a combination of characters, numbers special characters, and different cases, along with at least 10 characters in length.
Please enter the street address of the site the APs will be deployed. This is required to setup the cloud system.*
Please enter the street address of the site the APs will be deployed. This is required to setup the cloud system.
City
State/Province
Zip/Postal
Will this be drop shipped to the same address or to another one (eg. your office)?*
Will this be shipped to your primary shipping location?
Please fill out the address you would like the system shipped to*
Please fill out the address you would like the system shipped to
City
State/Province
Zip/Postal