Please begin by filling out the initial questions below

If you need assistance just email or call us and we'll be glad to help.

Enter a VLAN name, Gateway IP Address, and VLAN tag (optional) you'd like to use.

Click to add as many as you would like. We will send you switch port forms requesting specific port information. Not sure? Just let us know and we can design it for you!
Access points will receive an IP via the DHCP server. If a server is not available please let us know.

Section

Best practices dictate not using the client name or address in any part of the network name.
Note: The best and most secure choice is WPA2/AES. Anything else is insecure and also cannot attain 802.11n speeds or greater. WPA/TKIP should only be used for legacy equipment that cannot connect to WPA2/AES.
The password must be a minimum of 8 characters long. Length is preferred over complexity but best practices require a combination of characters, numbers special characters, and different cases, along with at least 10 characters in length.
(eg. 192.168.0.0/24 or 10.0.0.0/24)
Best practices dictate not using the client name or address in any part of the network name.
Note: The best and most secure choice is WPA2/AES. Anything else is insecure and also cannot attain 802.11n speeds or greater. WPA/TKIP should only be used for legacy equipment that cannot connect to WPA2/AES.
The password must be a minimum of 8 characters long. Length is preferred over complexity but best practices require a combination of characters, numbers special characters, and different cases, along with at least 10 characters in length.
Before connecting to the guest network users will be required to accept the terms of use before gaining wireless internet access.
Your company name will be entered at the bottom as "powering" the network.
Drop a file here or click to uploadChoose File
Maximum upload size: 67.11MB
If we already have your logo please skip to the next step.
Some programmers require a network that is directly connected to the control system's subnet which makes discovery and troubleshooting easier. Or you may require an additional network for a secure office or a safe browsing network for children.
Best practices dictate not using the client name or address in any part of the network name.
Note: The best and most secure choice is WPA2/AES. Anything else is insecure and also cannot attain 802.11n speeds or greater. WPA/TKIP should only be used for legacy equipment that cannot connect to WPA2/AES.
The password must be a minimum of 8 characters long. Length is preferred over complexity but best practices require a combination of characters, numbers special characters, and different cases, along with at least 10 characters in length.