Reference
User Manual
A high level of security is inherent with AES (Advanced Encryption Standard)
encryption. TKIP (Temporal Key Integrity Protocol) is also available. If
necessary, adding WEP128 or WEP64 (Wired Equivalent Protocol) encryption in
addition to AES or TKIP for clients that do not support AES can be done. A
simple Media Access Control (MAC) filter table restricts the radios or clients that
can link to a selected radio according to the MAC IDs entered in the table.
The radio is designed for industrial applications with a metal enclosure, DIN-rail
mounting, and shock and vibration tested to IEC 60068.
The RLX2 radio series is easy to use. Use the Radio Configuration / Diagnostic
Utility, which runs in a web browser, to configure the radio. Also, an SNMP
manager can be used for configuration. The radio comes with a Windows-based
utility called IH Browser. It finds all the radios on the network and lists
information about them. A topology view in the IH Browser shows how the
wireless network is linked together at any point in time. Firmware updates can be
done at anytime from anywhere on the network. This includes over the wireless
link or over the Internet.
ProSoft Technology radios can easily be installed into new or existing systems.
The software and manuals can be downloaded from the DVD or ProSoft
Technology's web site at www.prosoft-technology.com.
Page 116 of 161
RLX2 Series ♦ 802.11a, b, g, n
Industrial Hotspot
ProSoft Technology, Inc.
May 8, 2013
Need help?
Do you have a question about the RLX2-IHA and is the answer not in the manual?
Questions and answers