Emerson AMS Trex Device Communicator User Manual page 46

Table of Contents

Advertisement

AMS Trex Device Communicator overview
September 2021
2.15
46
1.800.561.8187
6. Click More → Export.
7. Under Trex Synchronization Files, click Show Details.
8. Select one or more Trex synchronization files to export.
9. Click Export.
10. Select a location to save the Trex synchronization file, and click OK.
11. If you are not using the air-gap deployment, email the exported Trex
synchronization file to
12. If you are using the air-gap deployment, do the following:
a) Open Upgrade Studio on the PC that has an internet connection.
b) Transfer the Trex synchronization file to that PC.
c) Click More → Import Package.
d) Browse to the location that has the Trex synchronization file, and click OK.
e) Click Import.
f) Click OK.
g) Log in with your username and password. Upgrade Studio uploads the Trex
synchronization file.
AMS Trex Security
Upgrade Studio lets you manage secure access to Trex units. You can configure a Trex unit
to have Local, Enterprise, or no security scheme.
Initial setup
An Upgrade Studio user can initially set the security of a Trex unit to either Local or
Enterprise security. Subsequently, only this user can change the security scheme of the
Trex unit. Other users may change the security scheme once the first user changes the
security to None.
Local security
Local security only allows user accounts created on the Trex unit to access it.
When local security is selected, an Administrator user must be created on the Trex unit.
This Administrator user can create or delete other users on the Trex unit. The
Administrator user is only deleted when the security of the Trex unit is set to None using
Upgrade Studio.
Enterprise security
Enterprise security requires Windows Active Domain credentials to access a Trex unit.
When enterprise security is selected, a Windows domain name, wireless network service
set identifier (SSID), username, and password is required the first time the Trex unit is
used. A wireless network with WPA2-Enterprise security is required.
www.
information@itm.com
.com
User Guide
User Guide

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents