Overview ........................................................................................................................................... 4-2
Wireless Search Utility ......................................................................................................................... 4-2
Installing Wireless Search Utility ................................................................................................... 4-2
Configuring Wireless Search Utility ................................................................................................ 4-5
5. Using Other Consoles ........................................................................................................................ 5-1
Configuration by Telnet and SSH Consoles ............................................................................................. 5-2
Configuration by Web Browser with HTTPS/SSL ...................................................................................... 5-2
Disabling Telnet and Browser Access ..................................................................................................... 5-3
Configuration by the RS-232 Console .................................................................................................... 5-3
A. References ........................................................................................................................................ A-1
Beacon .............................................................................................................................................. A-2
DTIM ................................................................................................................................................. A-2
Fragment ........................................................................................................................................... A-2
RTS Threshold .................................................................................................................................... A-2
B. Supporting Information .................................................................................................................... B-1
Firmware Recovery ............................................................................................................................. B-2
DoC (Declaration of Conformity) ........................................................................................................... B-3
Federal Communication Commission Interference Statement ............................................................ B-3
RED Compliance Statement .......................................................................................................... B-4