EDSxxPR Family - Product Brief
Page 2
...v3, SSH v2 MD5, SHA-1 Rijndael/AES 128-bit encryption 3DES encryption ARC4 128-bit encryption Password protection IP address filtering Hardened OS and stack Agency Approvals UL/CUL, FCC, CE,TUV, C-Tick... and control EDS8PR multi-port, secure device server; 1U, 8-port, 100-240 VAC EDS16PR multi-port, secure device server; 1U, 16-port, 100-240 VAC EDS03212N-02 200...| Irvine | CA 92618 | USA | Tel: 800.422.7055 | Fax: 949.450.7232 | www.lantronix.com ©2009, Lantronix, Inc. All other trademarks are trademarks of their respective owners. All rights reserved. 910-505 01/09 PDF ...
...v3, SSH v2 MD5, SHA-1 Rijndael/AES 128-bit encryption 3DES encryption ARC4 128-bit encryption Password protection IP address filtering Hardened OS and stack Agency Approvals UL/CUL, FCC, CE,TUV, C-Tick... and control EDS8PR multi-port, secure device server; 1U, 8-port, 100-240 VAC EDS16PR multi-port, secure device server; 1U, 16-port, 100-240 VAC EDS03212N-02 200...| Irvine | CA 92618 | USA | Tel: 800.422.7055 | Fax: 949.450.7232 | www.lantronix.com ©2009, Lantronix, Inc. All other trademarks are trademarks of their respective owners. All rights reserved. 910-505 01/09 PDF ...
EDSxxPR Family - Quick Start Guide
Page 7
..., and click Go. • Open a web browser and enter the IP address of the EDS to sub pages and configure the EDS. 10 WWW.LANTRONIX.COM 11 Enter your product. 1. Use the menu to navigate to open Web Manager. 2. Quick Start Guide EDS8/16/32PR CONFIGURATION USING WEB MANAGER In... this Quick Start Guide, we briefly describe how to configure the EDS using Web Manager, Lantronix's browser-based configuration tool. For detailed information on Web Manager configuration and on other methods, please see the User Guide for your User Name (...
..., and click Go. • Open a web browser and enter the IP address of the EDS to sub pages and configure the EDS. 10 WWW.LANTRONIX.COM 11 Enter your product. 1. Use the menu to navigate to open Web Manager. 2. Quick Start Guide EDS8/16/32PR CONFIGURATION USING WEB MANAGER In... this Quick Start Guide, we briefly describe how to configure the EDS using Web Manager, Lantronix's browser-based configuration tool. For detailed information on Web Manager configuration and on other methods, please see the User Guide for your User Name (...
EDS - User Guide
Page 43
It contains the following steps: 1. EDS User Guide 43 default password is retained without power. Logging out of Web Manager Pages Accessing Web Manager Note: You can also access the Web Manager by DHCP. 3. To access ...-authentication to configure the EDS using DeviceInstaller (see the EDS Quick Start Guide) or automatically by selecting the Web Configuration tab on any web page. Lantronix supports the latest version of the EDS in Figure 7-1 displays configuration, network settings, line settings, tunneling settings, and product information. The Device Status web page...
It contains the following steps: 1. EDS User Guide 43 default password is retained without power. Logging out of Web Manager Pages Accessing Web Manager Note: You can also access the Web Manager by DHCP. 3. To access ...-authentication to configure the EDS using DeviceInstaller (see the EDS Quick Start Guide) or automatically by selecting the Web Configuration tab on any web page. Lantronix supports the latest version of the EDS in Figure 7-1 displays configuration, network settings, line settings, tunneling settings, and product information. The Device Status web page...
EDS - User Guide
Page 65
... the device sends an email when a connection is closed. Accept Mode Settings (continued) Flush Serial Data Block Serial Data Block Network Password Email on Connect Email on a new connection. Otherwise, select the Email profile to flush the serial data buffer on Disconnect Description Select... Enabled to use for sending. 5. The password can have up to the device must be terminated with one of the following: (a) 0x0A (LF), (b) 0x00, (c) 0x0D 0x0A (CR LF),...
... the device sends an email when a connection is closed. Accept Mode Settings (continued) Flush Serial Data Block Serial Data Block Network Password Email on Connect Email on a new connection. Otherwise, select the Email profile to flush the serial data buffer on Disconnect Description Select... Enabled to use for sending. 5. The password can have up to the device must be terminated with one of the following: (a) 0x0A (LF), (b) 0x00, (c) 0x0D 0x0A (CR LF),...
EDS - User Guide
Page 78
...the menu bar. Appears if you may view and modify current settings for a selected remote host. Enter a username to select a pre-configured Username/Password/Key (configured on the SSH: Client Users page), or leave it blank to be loaded or created on your product. Select a specific host number...Description Enter a name for the selected host appears. Choices are: Telnet SSH Note: SSH keys must be prompted for a username and password at the top of the menu, leave this field blank. Repeat above steps as the protocol. Enter an IP address for the host to which...
...the menu bar. Appears if you may view and modify current settings for a selected remote host. Enter a username to select a pre-configured Username/Password/Key (configured on the SSH: Client Users page), or leave it blank to be loaded or created on your product. Select a specific host number...Description Enter a name for the selected host appears. Choices are: Telnet SSH Note: SSH keys must be prompted for a username and password at the top of the menu, leave this field blank. Repeat above steps as the protocol. Enter an IP address for the host to which...
EDS - User Guide
Page 82
Enter or modify the following settings: FTP Settings State Admin Username Admin Password Table 11-5 FTP Settings Description Select Enabled to use when logging in via FTP. 3. Enter the username to enable the FTP server. EDS User Guide 82 Click Submit. Figure 11-4 FTP Configuration 11: Service Settings 2. Enter the password to use when logging in via FTP.
Enter or modify the following settings: FTP Settings State Admin Username Admin Password Table 11-5 FTP Settings Description Select Enabled to use when logging in via FTP. 3. Enter the username to enable the FTP server. EDS User Guide 82 Click Submit. Figure 11-4 FTP Configuration 11: Service Settings 2. Enter the password to use when logging in via FTP.
EDS - User Guide
Page 85
.... It also defines the actions web servers and browsers should take in response to the EDS device. HTTP Authentication enables the requirement of usernames and passwords for viewing and changing configuration and authentication settings. HTTP Statistics-Viewing statistics such as bytes received and transmitted, bad requests, authorizations required, etc. ...
.... It also defines the actions web servers and browsers should take in response to the EDS device. HTTP Authentication enables the requirement of usernames and passwords for viewing and changing configuration and authentication settings. HTTP Statistics-Viewing statistics such as bytes received and transmitted, bad requests, authorizations required, etc. ...
EDS - User Guide
Page 88
... the menu bar and then Authentication at the top of the page. 11: Service Settings HTTP Authentication HTTP Authentication enables you to require usernames and passwords to the filesystem. To configure HTTP authentication settings: 1. Select HTTP on the EDS' built-in web server. Enter or modify the following settings: HTTP Authentication...
... the menu bar and then Authentication at the top of the page. 11: Service Settings HTTP Authentication HTTP Authentication enables you to require usernames and passwords to the filesystem. To configure HTTP authentication settings: 1. Select HTTP on the EDS' built-in web server. Enter or modify the following settings: HTTP Authentication...
EDS - User Guide
Page 89
...browser to ensure it does not attempt to the file system cfg_log.txt file. Click Submit. 4. To configure RSS settings: 1. Enter the Password for EDS configuration changes, RSS feeds permit viewing only relevant and new information regarding changes made to access the URI. Instead of feeding online ...content to as necessary. Figure 11-15 RSS EDS User Guide 89 Note: The URI, realm, username, and password are user-specified, free-form fields. The RSS page opens and shows the current RSS configuration. To delete the URI and users, click ...
...browser to ensure it does not attempt to the file system cfg_log.txt file. Click Submit. 4. To configure RSS settings: 1. Enter the Password for EDS configuration changes, RSS feeds permit viewing only relevant and new information regarding changes made to access the URI. Instead of feeding online ...content to as necessary. Figure 11-15 RSS EDS User Guide 89 Note: The URI, realm, username, and password are user-specified, free-form fields. The RSS page opens and shows the current RSS configuration. To delete the URI and users, click ...
EDS - User Guide
Page 98
... users: 1. SSH Server Authorized Users On this information. Under Current Configuration, User has a Delete User link, and Public RSA Key and Public DSA Key have a password. Select SSH on the EDS that can be used to log into the CLI or open an SSH connection to 1024 bits long. This device... to SSH into the EDS using SSH. The SSH Server: Authorized Users page appears. Note: SSH Keys from other programs may be made without the password being asked. If you click a Delete link, a message asks whether you can work with larger keys (up to a device port. Click OK to proceed or...
... users: 1. SSH Server Authorized Users On this information. Under Current Configuration, User has a Delete User link, and Public RSA Key and Public DSA Key have a password. Select SSH on the EDS that can be used to log into the CLI or open an SSH connection to 1024 bits long. This device... to SSH into the EDS using SSH. The SSH Server: Authorized Users page appears. Note: SSH Keys from other programs may be made without the password being asked. If you click a Delete link, a message asks whether you can work with larger keys (up to a device port. Click OK to proceed or...
EDS - User Guide
Page 99
... transit. EDS User Guide 99 Click Submit. If authentication is successful with the key, no password is required. Password Public RSA Key Public DSA Key Enter the password associated with this user or use with the key, no password is required. 3. Enter or modify the following settings: Table 12-8 SSH Server Authorized User Settings...
... transit. EDS User Guide 99 Click Submit. If authentication is successful with the key, no password is required. Password Public RSA Key Public DSA Key Enter the password associated with this user or use with the key, no password is required. 3. Enter or modify the following settings: Table 12-8 SSH Server Authorized User Settings...
EDS - User Guide
Page 101
... users are providing a key by all applications that the key is uploaded over some kind of secure private network. This implies the data is not password protected. Select SSH on the remote SSH server. Note: If you can be both configured and also exist on the menu bar and then SSH... Client Users at the top of the page. At the very least, a password or key pair must be created elsewhere and uploaded to the device or automatically generated on the device. The SSH Client: Users page appears. The...
... users are providing a key by all applications that the key is uploaded over some kind of secure private network. This implies the data is not password protected. Select SSH on the remote SSH server. Note: If you can be both configured and also exist on the menu bar and then SSH... Client Users at the top of the page. At the very least, a password or key pair must be created elsewhere and uploaded to the device or automatically generated on the device. The SSH Client: Users page appears. The...
EDS - User Guide
Page 102
... SSH server. 12: Security Settings 2. Enter or modify the following settings: Table 12-12 SSH Client Users SSH Client: Users Settings Username Password Description Enter the name that can be used . Enter the name of the existing private key you want to execute upon connection. Choices are ...user or use with the SSH2 protocol. Click Submit. 4. In the Current Configuration table, delete currently stored settings as necessary. Enter the password associated with larger keys (up to select the key. Select the bit length of the key, or use the Browse button to be ...
... SSH server. 12: Security Settings 2. Enter or modify the following settings: Table 12-12 SSH Client Users SSH Client: Users Settings Username Password Description Enter the name that can be used . Enter the name of the existing private key you want to execute upon connection. Choices are ...user or use with the SSH2 protocol. Click Submit. 4. In the Current Configuration table, delete currently stored settings as necessary. Enter the password associated with larger keys (up to select the key. Select the bit length of the key, or use the Browse button to be ...
EDS - User Guide
Page 104
... methods that require a RSA-style certificate and key exchange methods that allows another public CA. SSL Certificates and Private Keys You can authenticate users with a password or not. The key can only be unencrypted. A few utilities exist to authenticate its own self-signed certificate/key combo. 12: Security Settings SSL Certificates...
... methods that require a RSA-style certificate and key exchange methods that allows another public CA. SSL Certificates and Private Keys You can authenticate users with a password or not. The key can only be unencrypted. A few utilities exist to authenticate its own self-signed certificate/key combo. 12: Security Settings SSL Certificates...
EDS - User Guide
Page 138
... a string is no data is enabled by default. There is L. Enter the SSH port to the Command Mode Enable level. Enter the password for access to use for Telnet access. An example of 0 to terminate a connect line session and resume the CLI. Enter the Telnet ...access. Figure 15-5 CLI Configuration 15: Advanced Settings 2. Enter or modify the following settings: Command Line Interface Configuration Settings Login Password Enable Level Password Quit Connect Line Inactivity Timeout Telnet State Telnet Port Telnet Max Sessions SSH State SSH Port SSH Max Sessions Table 15-6 CLI ...
... a string is no data is enabled by default. There is L. Enter the SSH port to the Command Mode Enable level. Enter the password for access to use for Telnet access. An example of 0 to terminate a connect line session and resume the CLI. Enter the Telnet ...access. Figure 15-5 CLI Configuration 15: Advanced Settings 2. Enter or modify the following settings: Command Line Interface Configuration Settings Login Password Enable Level Password Quit Connect Line Inactivity Timeout Telnet State Telnet Port Telnet Max Sessions SSH State SSH Port SSH Max Sessions Table 15-6 CLI ...
EDS - User Guide
Page 140
... XML Export Configuration Settings Export to browser Export to local file Export secrets Lines to Export Groups to the XML configuration record. 3. If selected, secret password and key information will be exported to Export Description Select this web page you can export the current system configuration in XML format. Select the...
... XML Export Configuration Settings Export to browser Export to local file Export secrets Lines to Export Groups to the XML configuration record. 3. If selected, secret password and key information will be exported to Export Description Select this web page you can export the current system configuration in XML format. Select the...
EDS - User Guide
Page 160
... Timeout 138 IP 20 Address 23 Address Filter 120 Settings 116 ISO/IEC Guide 155 K Key Length 108 Key Type 95, 96, 102 L Label 24 Lantronix Discovery Protocol 23 LEDs 27, 33, 38 Line 1 Configuration 53 Statistics 52 Line Settings 52 Lines to Export 140, 141 Lines to Import 144, 146... Lithium Battery Notice 156 Loading New Firmware 151 Local Port 64, 68 Login Connect Menu 76, 77 Login Password 138 LPD Configuration Page 91 Settings 90 LPD Statistics 90 M MAC Address 23, 24 Maintenance and Diagnostics Settings Protocol Stack 115 Maintenance Settings 112 ManageLinx...
... Timeout 138 IP 20 Address 23 Address Filter 120 Settings 116 ISO/IEC Guide 155 K Key Length 108 Key Type 95, 96, 102 L Label 24 Lantronix Discovery Protocol 23 LEDs 27, 33, 38 Line 1 Configuration 53 Statistics 52 Line Settings 52 Lines to Export 140, 141 Lines to Import 144, 146... Lithium Battery Notice 156 Loading New Firmware 151 Local Port 64, 68 Login Connect Menu 76, 77 Login Password 138 LPD Configuration Page 91 Settings 90 LPD Statistics 90 M MAC Address 23, 24 Maintenance and Diagnostics Settings Protocol Stack 115 Maintenance Settings 112 ManageLinx...
EDS - User Guide
Page 161
... Status 48 Network Settings 48 New Certificate 107 New Private Key 107 O Obtaining a Bootstrap File 147 Obtaining Firmware 151 Organization Unit 107 P Packing Mode 60 Password 65, 102 PBX 22 Persistent 90 Port 114 Port Numbers 23 Ports Serial and Telnet 23 Power Frequency Magnetic Field Immunity 155 PPP Settings 80...
... Status 48 Network Settings 48 New Certificate 107 New Private Key 107 O Obtaining a Bootstrap File 147 Obtaining Firmware 151 Organization Unit 107 P Packing Mode 60 Password 65, 102 PBX 22 Persistent 90 Port 114 Port Numbers 23 Ports Serial and Telnet 23 Power Frequency Magnetic Field Immunity 155 PPP Settings 80...
EDS - Command Reference
Page 3
... Element Attributes 15 Record, Group, Item, and Value Tags 16 Importing and Exporting an XML Configuration File 17 Best Practices 18 Importing 18 Exporting 19 Passwords in the XML File 19 XML Configuration Groups 20 XML Status Record Groups and Items 35 5: Commands and Levels 49 EDS Command Reference 3
... Element Attributes 15 Record, Group, Item, and Value Tags 16 Importing and Exporting an XML Configuration File 17 Best Practices 18 Importing 18 Exporting 19 Passwords in the XML File 19 XML Configuration Groups 20 XML Status Record Groups and Items 35 5: Commands and Levels 49 EDS Command Reference 3
EDS - Command Reference
Page 4
List of Figures Figure 3-1 CLI Level Hierarchy 12 Figure 3-2 Login Level Commands 13 Figure 3-3 Enable Level Commands 13 Figure 4-1 DTD for XCRs 14 Figure 4-2 XML Example 15 Figure 4-3 XML Example 16 Figure 4-4 XML Example of Multiple Named Values 16 Figure 4-5 XML Example of Multiple Items 17 Figure 4-6 XML Example with Multiple Groups 17 Figure 4-7 XML Example of Supplying Passwords 20 EDS Command Reference 4
List of Figures Figure 3-1 CLI Level Hierarchy 12 Figure 3-2 Login Level Commands 13 Figure 3-3 Enable Level Commands 13 Figure 4-1 DTD for XCRs 14 Figure 4-2 XML Example 15 Figure 4-3 XML Example 16 Figure 4-4 XML Example of Multiple Named Values 16 Figure 4-5 XML Example of Multiple Items 17 Figure 4-6 XML Example with Multiple Groups 17 Figure 4-7 XML Example of Supplying Passwords 20 EDS Command Reference 4