DSX DSX-WAN/Internet Communications
Technical Specification
- Make: DSX
- Model code: DSX-WAN/Internet Communications
- Communication: IP
DSX IP Communications can be used on Local Area and Wide Area Networks as well across segments using the Internet for their connectivity. This application requires some knowledge of networks, routers, IP communications and addressing. Below is a typical blueprint of using DSX for a centralized approach to system administration for multiple sites and customers. DSX-AES256 can be added to the system to provide encrypted communications to each Location. Each Location is given its own encryption password. Without AES-256 enabled, the system sends all data encoded without any clear text or names but not encrypted. Routers require Static IP Addresses that will not change if they are restarted.
Read moreMake | DSX |
---|---|
Manufacturer | DSX - Europe Ltd. |
Category | Access Control>Access control software |
Model code | DSX-WAN/Internet Communications |
Communication | IP |
Additional info |
DSX IP Communications can be used on Local Area and Wide Area Networks as well across segments using the Internet for their connectivity. This application requires some knowledge of networks, routers, IP communications and addressing. Below is a typical blueprint of using DSX for a centralized approach to system administration for multiple sites and customers. DSX-AES256 can be added to the system to provide encrypted communications to each Location. Each Location is given its own encryption password. Without AES-256 enabled, the system sends all data encoded without any clear text or names but not encrypted. Routers require Static IP Addresses that will not change if they are restarted. |
Download PDF version Download PDF version |
You might be interested in these products
Related Whitepapers
Access and security in the age of hybrid working
Cybersecurity in keyless access management
The critical role of access control in K-12 school security
2025 Trends in video surveillance
Download7 proven solutions for law enforcement key control and asset management
DownloadMaximising security and performance
DownloadGuide for HAAS: New choice of SMB security system
DownloadThe truth behind 9 mobile access myths
Download