Ruckus T310s

  • Ruckus T310s
    Ruckus T310s
End of Life

Product Detail

The T310s is a specialized outdoor access point (AP) meant for more targeted deployments, when focusing the Wi-Fi signal is of paramount importance.  Unlike other sectorized APs of its class, T310s is not restricted to just a sector AP, but provides a platform for multiple different use cases in one box.

The T310s is a dual-band 802.11ac Wave 2 outdoor AP which includes a wide (120 degree) internal antenna, enabling a focused beam when it makes little sense to waste WiFi in an Omni deployment, such as blanketing a public park that is surrounded by apartments, or a stadium.

Additionally, it also has a USB port and unique DC power option that enables multiple use cases like IoT support and Mesh without reliance on a power grid.

Designed for easy installation within an ultra-lightweight and low profile enclosure, the T310s is ideal for venue owners and enterprises looking to quickly and economically deploy focused WiFi in high-capacity envrionments.

Model Name:
T310s
Product Family:
EOL RUCKUS Products
Recommended Software:
Stability Release:
Patches:
SmartZone AP Refresh Patch 5.2.2 (LT-GD MR 2)
Technology Release:
Patches:
SmartZone AP Patch 6.1.2.0.1003 (LT-GD-AP Patch-1003)

Documents

Downloads

KB Articles

Forum Topics

Security Bulletins

ID Title Version Release Date Edit Date
20210511 RUCKUS AP Aggregation And Fragmentation Attacks Vulnerability (aka “FragAttacks”) 1.1 May 11, 2021 October 15, 2021
20210129 AP / ZD CLI Passphrase Vulnerability 1.0 January 29, 2021 January 29, 2021
20230208 CVE-2023-25717: RUCKUS AP Web Vulnerability (RCE/CSRF) 1.2 February 08, 2023 May 18, 2023
20230731 RUCKUS Unleashed Authenticated Remote Command Execution Vulnerability 1.1 July 31, 2023 August 01, 2023
20231128 CVE-2023-49225: RUCKUS AP Stored Cross-Site Scripting Vulnerability 1.0 November 29, 2023 November 29, 2023
20240925 RUCKUS AP Remote Code Execution Vulnerability 1.2 October 04, 2024 October 11, 2024

Support Bulletins

Advanced Search

Working...Please wait

This is here to prevent you from accidentally submitting twice.

The page will automatically refresh.

Alert!!

Close