Configuration by Telnet and SSH Consoles ............................................................................................. 5-4
Configuration by Web Browser with HTTPS/SSL ...................................................................................... 5-4
Disabling Telnet and Browser Access ..................................................................................................... 5-5
A.
References ........................................................................................................................................ A-1
Beacon .............................................................................................................................................. A-2
DTIM ................................................................................................................................................. A-2
Fragment ........................................................................................................................................... A-2
RTS Threshold .................................................................................................................................... A-2
B.
Supporting Information .................................................................................................................... B-1
Firmware Recovery ............................................................................................................................. B-2
DoC (Declaration of Conformity) ........................................................................................................... B-3
Federal Communication Commission Interference Statement ............................................................ B-3
RED Compliance Statement ................................................................................................................. B-4