




AJAX
AJAX ReX 2 Jeweller Radio Signal Range Extender with Ethernet and Photo Verification
Pickup available at NexGen Computing
Usually ready in 24 hours
Expand Your Security Horizons with Unprecedented Reliability
Introducing the AJAX ReX 2 Jeweller, a sophisticated radio signal range extender that redefines the boundaries of your security system. Designed for large and complex properties, the ReX 2 not only doubles the signal range but also integrates visual alarm verification and a hardwired Ethernet connection for ultimate stability. Protect multi-story office buildings, detached garages, or expansive warehouse complexes by ensuring your Ajax devices maintain a robust connection to the hub, no matter the distance.
Dual-Protocol Communication for Guaranteed Delivery
To ensure the most reliable communication, the ReX 2 is equipped with four antennas and utilizes two proprietary Ajax radio protocols simultaneously: Jeweller and Wings. Jeweller is dedicated to transmitting critical commands, events, and alarms with a delivery time of just 0.3 seconds. The Wings protocol specializes in the batch transmission of high-resolution images from MotionCam detectors, ensuring you receive visual confirmation of any event swiftly and efficiently. This dual-tech approach guarantees that alarms and photo verifications are delivered without fail.
Ethernet Backup: Unbreakable Connectivity
The ReX 2 enhances connection reliability with an Ethernet port, allowing it to connect to the hub via a wired connection. This can serve as a primary or a backup communication channel. If the Jeweller radio signal is interrupted for any reason, the ReX 2 will automatically and seamlessly switch to Ethernet to maintain a constant connection, ensuring your system remains online and fully operational through steel and concrete structures.
Instant Visual Verification
Working in tandem with MotionCam and MotionCam Outdoor detectors, the ReX 2 allows for rapid photo verification of alarms. When a detector is triggered, it captures a series of images that are transmitted through the ReX 2. This allows you to instantly assess the situation, reducing false alarms and unnecessary stress. The first photo is delivered in as little as 10 seconds, providing crucial visual evidence when it matters most.
Robust Power and Anti-Sabotage Features
The ReX 2 is built to resist intruder attacks and power outages. It features a built-in backup Li-Ion battery that provides up to 38 hours of autonomous operation. The device is protected by a tamper alarm, jamming notifications, and advanced authentication to prevent forgery. Running on the secure OS Malevich, all transmitted data is encrypted, making it immune to viruses and cyberattacks.
| Classification | Radio signal range extender with photo verification support |
| Installation | Indoors |
| Hub Compatibility | Hub 2 (2G), Hub 2 (4G), Hub 2 Plus, Hub Hybrid (2G), Hub Hybrid (4G) |
| Max. Range Extenders per Hub | Up to 5 (depending on hub model) |
| Alarm Delivery Time | 0.3 seconds |
| Photo Delivery Time | From 10 seconds via Ethernet, from 18 seconds via Wings |
| Communication Protocols | Jeweller (alarms, events), Wings (photo verification), Ethernet |
| Jeweller Radio Range | Up to 1,700 meters in open space |
| Ethernet | 8P8C socket, up to 100 Mbps |
| Power Supply | 110-240 V AC |
| Backup Battery | Li-Ion 2 Ah, up to 38 hours of battery life (up to 12 hours with Ethernet enabled) |
| Anti-Sabotage | Tamper alarm, jamming detection, block encryption with dynamic key, authentication |
| Operating Temperature Range | 14°F to 104°F (-10°C to +40°C) |
| Operating Humidity | Up to 75% |
| Dimensions | 6.42″ × 6.42″ × 1.42″ (163 × 163 × 36 mm) |
| Weight | 12.84 oz (364 g) |
| In the Box | ReX 2 Jeweller, SmartBracket mounting panel, Power cable, Ethernet cable, Installation kit, Quick Start Guide |
Manufacturer Technical Data
| Product Spec Sheet |
|
|---|
Shipping & Returns
- R120 Delivery Fee
- 30 Day Returns
- 24 Hour Live Chat Support
Computer Accessories
Step Up Your Tech Game
Frequently Asked Questions
Answers to frequently asked questions
Does NexGen Computing conduct regular security audits?
Yes, we regularly conduct security audits and vulnerability assessments to identify and address potential security weaknesses, maintaining a high level of security and compliance with industry standards.
How can I stay informed about policy changes?
We reserve the right to update or modify our policies at any time. Changes will be posted on our website, and your continued use of our products and services constitutes acceptance of any changes.
Where can I find more information or ask additional questions?
For more information or assistance, please visit our website at www.nexgencomputing.co.za or contact us at support@nexgencomputing.co.za.
How does NexGen Computing handle shipping and delivery?
Orders are processed promptly, with delivery details provided at checkout. Tracking information will be emailed once your order ships.
What is the return and refund policy?
Refunds are typically issued for defective or incorrect items within 14 days of receipt. For detailed information, please refer to our Refund Policy.
Is my payment information secure?
Yes, all payments made on our site are processed securely on our domain using industry-standard security measures. Sensitive data, such as credit card numbers, are processed by PCI-compliant payment processors like Yoco, Paystack, and Peach Payments.





