X8-A11-E-A Digi International, X8-A11-E-A Datasheet - Page 95

no-image

X8-A11-E-A

Manufacturer Part Number
X8-A11-E-A
Description
CONNECTPORT X8 2.4GHZ
Manufacturer
Digi International
Series
ConnectPort™ X8r
Datasheets

Specifications of X8-A11-E-A

Function
Transceiver, Xbee, Gateway
Modulation Or Protocol
UDP/TCP, DHCP, SNMPv1
Frequency
2.4GHz
Applications
General Purpose
Interface
RJ45, DB-9, 2 USB
Sensitivity
-93dBm
Power - Output
15dBm
Data Rate - Maximum
54Mbps
Voltage - Supply
12VDC
Wireless Frequency
2.4 GHz
Interface Type
RS-232, Ethernet, USB
Modulation
BPSK, CCK, DBPSK, DQPSK, QPSK
Security
256 bit AES, 3DES, DES, SSL Tunnel
Operating Voltage
9 V to 30 V
Output Power
3.1 W
Antenna
4 in Dipole with 2 ft Cable
Operating Temperature Range
- 30 C to + 60 C
Lead Free Status / RoHS Status
Lead free / RoHS Compliant
Features
-
Lead Free Status / Rohs Status
Lead free / RoHS Compliant
Other names
602-1171
you specify will determine the level of security used when devices on the local
private network communicate with devices on the remote private network. As with
the other settings, the both the Digi unit and the remote VPN device must be
configured to use the same values. If more than one policy is specified, the VPN
devices will use the most secure policy that they both have been configured to
support.
groups are more secure.
the key. The longer the key the more secure it is. There are three supported
encryption algorithms including DES, 3-DES, and AES. DES encryption uses 64-
bit keys, 3-DES encryption uses 192-bit keys, and AES encryption uses 256-bit
keys.
are two supported authentication algorithms including MD5 and SHA1. MD5
authentication uses 128-bit keys and SHA1 uses 160-bit keys. The SHA1 algorithm
is more secure than MD5.
seconds. After the SA has been negotiated, the SA lifetime begins. Once the
lifetime has completed, a new set of SA policies are negotiated with the remote
VPN endpoint.
ISAKMP Phase 2 Settings:
The SAs used for bulk data transfer are created during phase 2. The phase 2 settings
General Security Settings for Phase 2
Diffie-Hellman: Select the Diffie-Hellman group used to generate keys. Larger
ISAKMP Phase 2 Policies
Encryption: The encryption algorithm used for encrypting data and the length of
Authentication: The authentication algorithm used in authenticating clients. There
SA Lifetime: The maximum length of the Phase 2 security association (SA), in
C o n f i g u r e D i g i d e v i c e s
9 5

Related parts for X8-A11-E-A