User's Manual

6
effective alternative to ordinary Access Points that do not
have the range and reach to connect to a growing number of
wireless users who wish to connect to a business network.
To protect sensitive data during wireless transmissions,
the device offers different encryption settings for
wireless transmissions, including industry standard WPA2
encryption.ThedevicealsoincludesMACaddressltering
to allow network administrators to offer network access
only to known computers and other devices based on their
MAC addresses.
System Requirements
The following are the Minimum System Requirements in
ordertocongurethedevice.
• ComputerwithanEthernetinterfaceorwirelessnetworkcapability
• Windows OS(XP, Vista, 7, 8,10), Mac OS, orLinux-based operating
systems
• Web-BrowsingApplication(i.e.:Edge,InternetExplorer,Firefox,Safari,or
anothersimilarbrowserapplication)
Package Contents
• AccessPoint
• CeilingMountBase(9/16”T-Rail)
• CeilingMountBase(15/16”T-Rail)
• MountingScrewKit
• QuickInstallationGuide
*(allitemsmustbeinpackagetoissuearefund):