Form

Please begin by filling out the initial questions below
If you need assistance just email or call us and we'll be glad to help.

Did you purchase an HA (High Availability) Redundant Firewall for your project?
We HIGHLY recommend setting up a management VLAN to your network. This would be the core network VLAN so that if any other VLAN is affected by a troubled device, hacked into, etc. it will not prohibit the access and resolution of the issue via the network core. Do you want us to setup a management VLAN for this site? Note that it can essentially be invisible to your devices and they can still act as a "flat network" if you don't want other VLANs.
Question: Have you marked on the switch form for this site what ports all of the AP's will be placed?
Note that if you have not marked up the switch form, your AP's will not work until we can set the trunk ports correctly on the respective switch(es) and so your team will need to let us know before it will broadcast properly!!!
Enter a VLAN name, Gateway IP Address, and VLAN tag (optional) you'd like to use.
Click to add as many as you would like. We will send you switch port forms requesting specific port information. Not sure? Just let us know and we can design it for you! AVOID USING COMMON SUBNETS SUCH AS 192.168.1.0/24, 192.168.0.0/24, AND 10.0.0.0/24 AS THESE CAN CAUSE CONFLICTS WITH EVERYTHING FROM MODEMS TO SPEAKERS.
This is important so that we know if we're adding APs to an existing site or if we're creating an entirely new site.
Section
Best practices dictate not using the client name or address in any part of the network name.
Note: The best and most secure choice is WPA2/AES. Anything else is insecure and also cannot attain 802.11n speeds or greater. WPA/TKIP should only be used for legacy equipment that cannot connect to WPA2/AES.
The password must be a minimum of 8 characters long. Length is preferred over complexity but best practices require a combination of characters, numbers special characters, and different cases, along with at least 10 characters in length.
(eg. 192.168.0.0/24 or 10.0.0.0/24)
Best practices dictate not using the client name or address in any part of the network name.
Note: The best and most secure choice is WPA2/AES. Anything else is insecure and also cannot attain 802.11n speeds or greater. WPA/TKIP should only be used for legacy equipment that cannot connect to WPA2/AES.
The password must be a minimum of 8 characters long. Length is preferred over complexity but best practices require a combination of characters, numbers special characters, and different cases, along with at least 10 characters in length.
Before connecting to the guest network users will be required to accept the terms of use before gaining wireless internet access.
Your company name will be entered at the bottom as "powering" the network.

Maximum file size: 209.72MB

If we already have your logo please skip to the next step.
Some programmers require a network that is directly connected to the control system's subnet which makes discovery and troubleshooting easier. Or you may require an additional network for a secure office or a safe browsing network for children.
Best practices dictate not using the client name or address in any part of the network name.
Note: The best and most secure choice is WPA2/AES. Anything else is insecure and also cannot attain 802.11n speeds or greater. WPA/TKIP should only be used for legacy equipment that cannot connect to WPA2/AES.
The password must be a minimum of 8 characters long. Length is preferred over complexity but best practices require a combination of characters, numbers special characters, and different cases, along with at least 10 characters in length.
Some programmers require a network that is directly connected to the control system's subnet which makes discovery and troubleshooting easier. Or you may require an additional network for a secure office or a safe browsing network for children.
Best practices dictate not using the client name or address in any part of the network name.
Note: The best and most secure choice is WPA2/AES. Anything else is insecure and also cannot attain 802.11n speeds or greater. WPA/TKIP should only be used for legacy equipment that cannot connect to WPA2/AES.
The password must be a minimum of 8 characters long. Length is preferred over complexity but best practices require a combination of characters, numbers special characters, and different cases, along with at least 10 characters in length.
To explain our thinking on this a little more, for VLANs not designed for multicast, we avoid enabling multicast optimizations. This ensures that link-local discovery protocols such as mDNS operate as expected. While IGMP snooping should not impact these protocols by design, in practice we have seen certain network implementations effect discovery behavior, sometimes requiring additional configuration (for example, static multicast handling). Our approach is to enable multicast features only where required, allowing for cleaner and more predictable configurations.

Examples of products that would require IGMP snooping include:

  • Dante, AES67, Q-SYS
  • Crestron NVX and NAX
  • AVPro MXNET
  • Sonos

Need VPN accounts created to access this site?

IMPORTANT!!!!! Any info here will be sent in plain text via email and back to you. Ideally you would call passwords into us, or enter them into our documentation portal and then alert us so we can add it to your appliance. If you're ok with sending via plain text, enter it here.
Is this a Wi-Fi 7 Deployment?
Important Wi-Fi 7 AFC Installation Notice
If you plan to use the 6 GHz frequency,
your installer must call our office after the AP is installed
to complete AFC setup.
AFC cannot be finalized until the AP is installed onsite.
If this step is not completed, the AP will operate at only
approximately 1/4 of its expected signal strength
on 6 GHz.
Please enter the street address of the site the APs will be deployed. This is required to setup the cloud system and/or if you are deploying Wi-Fi 7 AP's that require 6GHz. *
Please enter the street address of the site the APs will be deployed. This is required to setup the cloud system and/or if you are deploying Wi-Fi 7 AP's that require 6GHz.
Where will this be shipped? *
Please fill out the address you would like the system shipped to *
Please fill out the address you would like the system shipped to

Maximum file size: 200MB

DId you purchase Pro-active Monitoring for this site?

Please let us know who else should receive alerts besides our team, if any.

Important Pro-Active Monitoring Activation Notice
Pro-Active Monitoring is not automatically enabled.
You must activate service once installation is complete.
After all equipment is installed and you are ready to begin billing,
email support@whyreboot.com to activate monitoring.
We will NOT be monitoring your network until activation is requested.
Please email support to start your monitoring service.

Our Clients

Feedback