User Manual
Page 1
... device battery life is intended. The Motorola wireless switch discovers access ports on the Web at www.motorola.com/ap300 or access our global contact directory at www.motorola.com/enterprisemobility/contactus Virtual AP enables true Wireless VLANs for Layer 2 and Layer 3 deployments. SPECIFICATION Sheet AP300 Access Port Plug-n-play 802.11a/b/g Access Ports: Securely mobilizing the Wireless Enterprise FEATURES Mobility Supports Mobility at Layer...
... device battery life is intended. The Motorola wireless switch discovers access ports on the Web at www.motorola.com/ap300 or access our global contact directory at www.motorola.com/enterprisemobility/contactus Virtual AP enables true Wireless VLANs for Layer 2 and Layer 3 deployments. SPECIFICATION Sheet AP300 Access Port Plug-n-play 802.11a/b/g Access Ports: Securely mobilizing the Wireless Enterprise FEATURES Mobility Supports Mobility at Layer...
User Manual
Page 2
...GHz 5.725 GHz to T-bars of suspended ceilings without notice. North America: 12; WS-2000-2ES-BG-WR motorola.com Part number SS-AP300. All rights reserved. the plastic internalantenna housing allows for 5.4-5.7 GHz pending); internal antenna version snaps on regulatory ....11b/g: ETSI: 13; elements with metal housing is ideal for installation above tile); SPECIFICATION Sheet AP300 ACCESS PORT Plug-n-play 802.11a/b/g Access Ports: Securely mobilizing the Wireless Enterprise 802.11i Support for IEEE standardsbased security protocols for strong Encryption (AES, TKIP), Authentication and...
...GHz 5.725 GHz to T-bars of suspended ceilings without notice. North America: 12; WS-2000-2ES-BG-WR motorola.com Part number SS-AP300. All rights reserved. the plastic internalantenna housing allows for 5.4-5.7 GHz pending); internal antenna version snaps on regulatory ....11b/g: ETSI: 13; elements with metal housing is ideal for installation above tile); SPECIFICATION Sheet AP300 ACCESS PORT Plug-n-play 802.11a/b/g Access Ports: Securely mobilizing the Wireless Enterprise 802.11i Support for IEEE standardsbased security protocols for strong Encryption (AES, TKIP), Authentication and...