The Basics :: About the Serial/IP Redirector

Planning the Application

Successful operation of the Serial/IP Redirector with your specific application depends on the redirector, the server, the application, and the operating system it runs under.  Taking time to properly plan and test is strongly recommended.

To plan the application

Tips

Unattended installation can dramatically reduce the time it takes to initially deploy the redirector and update it for a large user base.

 Notes

All Tactical Software redirectors support encryption (if enabled by the license key).  If you plan to use encryption, be sure that the server supports SSL and/or TLS encryption of the network connection with the redirector.

On the Web

Tactical Software Technical Notes