EDS - User Guide
Page 43
..., Mozilla Firefox, Safari, Chrome or Opera. 2. The IP address may have been assigned manually using Web Manager, the Lantronix browserbased configuration tool. default password is accessed. It contains the following steps: 1. Logging out of Web Manager Pages Accessing Web Manager Note: You can ...also access the Web Manager by DHCP. 3. Open a standard web browser. Lantronix supports the latest version of the EDS in ...
..., Mozilla Firefox, Safari, Chrome or Opera. 2. The IP address may have been assigned manually using Web Manager, the Lantronix browserbased configuration tool. default password is accessed. It contains the following steps: 1. Logging out of Web Manager Pages Accessing Web Manager Note: You can ...also access the Web Manager by DHCP. 3. Open a standard web browser. Lantronix supports the latest version of the EDS in ...
EDS - User Guide
Page 65
...on Disconnect Description Select Enabled to flush the serial data buffer on your product. The password can have up to the device must contain only alphanumeric characters and punctuation. When set, the password sent to 31 characters and must be terminated with one of the following: (a) 0x0A ...5. Otherwise, select the Email profile to use for sending. Repeat above steps as desired, according to send an email. Enter a password that clients must send to the device within 30 seconds from opening a network connection to the device. Select whether the device sends an...
...on Disconnect Description Select Enabled to flush the serial data buffer on your product. The password can have up to the device must contain only alphanumeric characters and punctuation. When set, the password sent to 31 characters and must be terminated with one of the following: (a) 0x0A ...5. Otherwise, select the Email profile to use for sending. Repeat above steps as desired, according to send an email. Enter a password that clients must send to the device within 30 seconds from opening a network connection to the device. Select whether the device sends an...
EDS - User Guide
Page 78
... work. Repeat above steps as the protocol. EDS User Guide 78 Select a specific host number at connect time. Enter a username to select a pre-configured Username/Password/Key (configured on the SSH: Client Users page), or leave it blank to additional host(s) available on the Login Connect Menu. Choices are: Telnet... created on the SSH page for a selected remote host. Click Submit to the host. Figure 10-5 Host Configuration 3. Enter an IP address for a username and password at the top of the menu, leave this field blank.
... work. Repeat above steps as the protocol. EDS User Guide 78 Select a specific host number at connect time. Enter a username to select a pre-configured Username/Password/Key (configured on the SSH: Client Users page), or leave it blank to additional host(s) available on the Login Connect Menu. Choices are: Telnet... created on the SSH page for a selected remote host. Click Submit to the host. Figure 10-5 Host Configuration 3. Enter an IP address for a username and password at the top of the menu, leave this field blank.
EDS - User Guide
Page 82
Enter the password to use when logging in via FTP. Click Submit. Enter or modify the following settings: FTP Settings State Admin Username Admin Password Table 11-5 FTP Settings Description Select Enabled to use when logging in via FTP. 3. EDS User Guide 82 Enter the username to enable the FTP server. Figure 11-4 FTP Configuration 11: Service Settings 2.
Enter the password to use when logging in via FTP. Click Submit. Enter or modify the following settings: FTP Settings State Admin Username Admin Password Table 11-5 FTP Settings Description Select Enabled to use when logging in via FTP. 3. EDS User Guide 82 Enter the username to enable the FTP server. Figure 11-4 FTP Configuration 11: Service Settings 2.
EDS - User Guide
Page 85
... the requirement of entries that can be viewed on the Internet. The HTTP Statistics page appears. You can change the maximum number of usernames and passwords for communicating hypertext documents on the HTTP Configuration Page. 11: Service Settings HTTP Settings Hypertext Transfer Protocol (HTTP) is a scrolling log, with the last Max...
... the requirement of entries that can be viewed on the Internet. The HTTP Statistics page appears. You can change the maximum number of usernames and passwords for communicating hypertext documents on the HTTP Configuration Page. 11: Service Settings HTTP Settings Hypertext Transfer Protocol (HTTP) is a scrolling log, with the last Max...
EDS - User Guide
Page 88
... Table 11-14 HTTP Authentication Description Enter the Uniform Resource Identifier (URI). 11: Service Settings HTTP Authentication HTTP Authentication enables you to require usernames and passwords to the filesystem. Select HTTP on the EDS' built-in web server.
... Table 11-14 HTTP Authentication Description Enter the Uniform Resource Identifier (URI). 11: Service Settings HTTP Authentication HTTP Authentication enables you to require usernames and passwords to the filesystem. Select HTTP on the EDS' built-in web server.
EDS - User Guide
Page 89
..., RSS feeds permit viewing only relevant and new information regarding changes made to access the URI. Note: The URI, realm, username, and password are user-specified, free-form fields. Select RSS on the EDS file system. Click Submit and enter the next Username as Rich Site Summary...system cfg_log.txt file. The RSS feeds may also be accessed over SSL (no authentication is necessary. Basic = encodes passwords using Base64. Digest = encodes passwords using MD5. Enter the Username used to the EDS via an RSS publisher. More than one Username per URI is a method...
..., RSS feeds permit viewing only relevant and new information regarding changes made to access the URI. Note: The URI, realm, username, and password are user-specified, free-form fields. Select RSS on the EDS file system. Click Submit and enter the next Username as Rich Site Summary...system cfg_log.txt file. The RSS feeds may also be accessed over SSL (no authentication is necessary. Basic = encodes passwords using Base64. Digest = encodes passwords using MD5. Enter the Username used to the EDS via an RSS publisher. More than one Username per URI is a method...
EDS - User Guide
Page 98
.... Note: SSH Keys from other programs may be used to log into the CLI or open an SSH connection to be made without the password being asked. EDS User Guide 98 Using public key authentication allows a connection to SSH into the EDS using SSH. To configure the SSH ...be converted to the required EDS format. Under Current Configuration, User has a Delete User link, and Public RSA Key and Public DSA Key have a password. Select SSH on the EDS that can change SSH server settings for Authorized Users. 12: Security Settings SSH Server: Host Keys Settings (continued) Bit ...
.... Note: SSH Keys from other programs may be used to log into the CLI or open an SSH connection to be made without the password being asked. EDS User Guide 98 Using public key authentication allows a connection to SSH into the EDS using SSH. To configure the SSH ...be converted to the required EDS format. Under Current Configuration, User has a Delete User link, and Public RSA Key and Public DSA Key have a password. Select SSH on the EDS that can change SSH server settings for Authorized Users. 12: Security Settings SSH Server: Host Keys Settings (continued) Bit ...
EDS - User Guide
Page 99
... RSA key you want to use with this user or use the Browse button to access the SSH server. Password Public RSA Key Public DSA Key Enter the password associated with the key, no password is required. Click Submit. If authentication is required. 3. EDS User Guide 99 Enter the path and name of... not compromised in transit. Enter the path and name of the user authorized to select the key. If authentication is successful with the key, no password is successful with the username. Figure 12-7 SSH Server: Authorized Users 12: Security Settings 2.
... RSA key you want to use with this user or use the Browse button to access the SSH server. Password Public RSA Key Public DSA Key Enter the password associated with the key, no password is required. Click Submit. If authentication is required. 3. EDS User Guide 99 Enter the path and name of... not compromised in transit. Enter the path and name of the user authorized to select the key. If authentication is successful with the key, no password is successful with the username. Figure 12-7 SSH Server: Authorized Users 12: Security Settings 2.
EDS - User Guide
Page 101
.... The keys for public key authentication can change SSH client settings for a user. At the very least, a password or key pair must be both configured and also exist on the remote SSH server. Figure 12-11 SSH Client: Users EDS User Guide 101 ...
.... The keys for public key authentication can change SSH client settings for a user. At the very least, a password or key pair must be both configured and also exist on the remote SSH server. Figure 12-11 SSH Client: Users EDS User Guide 101 ...
EDS - User Guide
Page 102
...Note: If the user public key is a command shell. The default is known on the remote SSH server, the SSH server does not require a password. Select the bit length of the key, or use the Browse button to execute a remote shell upon connection. It can be executed remotely. Default is...table, delete currently stored settings as necessary. Enter or modify the following settings: Table 12-12 SSH Client Users SSH Client: Users Settings Username Password Description Enter the name that can be changed to anything the remote host can either enter the path and name of the new key: ...
...Note: If the user public key is a command shell. The default is known on the remote SSH server, the SSH server does not require a password. Select the bit length of the key, or use the Browse button to execute a remote shell upon connection. It can be executed remotely. Default is...table, delete currently stored settings as necessary. Enter or modify the following settings: Table 12-12 SSH Client Users SSH Client: Users Settings Username Password Description Enter the name that can be changed to anything the remote host can either enter the path and name of the new key: ...
EDS - User Guide
Page 104
... You can be encrypted with a matching private key to identify itself , resulting in Accept mode, and/or EAP-TLS, the EDS needs a personal certificate with a password or not. Tools exist to generate self-signed CA certificates or to sign other certificates, the authority uses a private key. A certificate is also used for...
... You can be encrypted with a matching private key to identify itself , resulting in Accept mode, and/or EAP-TLS, the EDS needs a personal certificate with a password or not. Tools exist to generate self-signed CA certificates or to sign other certificates, the authority uses a private key. A certificate is also used for...
EDS - User Guide
Page 138
...Telnet port to disable SSH access. Select Disabled to use for Telnet access. Select Disabled to the Command Mode Enable level. Enter the password for Telnet access. Maximum number of 0 to disable. The default is 3 and the maximum is 10. Figure 15-5 CLI Configuration 15... an Inactivity Timeout value so the CLI session will disconnect if no password by default. Enter or modify the following settings: Command Line Interface Configuration Settings Login Password Enable Level Password Quit Connect Line Inactivity Timeout Telnet State Telnet Port Telnet Max Sessions ...
...Telnet port to disable SSH access. Select Disabled to use for Telnet access. Select Disabled to the Command Mode Enable level. Enter the password for Telnet access. Maximum number of 0 to disable. The default is 3 and the maximum is 10. Figure 15-5 CLI Configuration 15... an Inactivity Timeout value so the CLI session will disconnect if no password by default. Enter or modify the following settings: Command Line Interface Configuration Settings Login Password Enable Level Password Quit Connect Line Inactivity Timeout Telnet State Telnet Port Telnet Max Sessions ...
EDS - User Guide
Page 140
... product. 15: Advanced Settings Figure 15-7 XML: Export Configuration 2. If you select this with a secure link, and save only in XML format. If selected, secret password and key information will be exported to your screen may vary according to the XML configuration record. 3. Select the instances you can export the current...
... product. 15: Advanced Settings Figure 15-7 XML: Export Configuration 2. If you select this with a secure link, and save only in XML format. If selected, secret password and key information will be exported to your screen may vary according to the XML configuration record. 3. Select the instances you can export the current...
EDS - User Guide
Page 160
... Timeout 138 IP 20 Address 23 Address Filter 120 Settings 116 ISO/IEC Guide 155 K Key Length 108 Key Type 95, 96, 102 L Label 24 Lantronix Discovery Protocol 23 LEDs 27, 33, 38 Line 1 Configuration 53 Statistics 52 Line Settings 52 Lines to Export 140, 141 Lines to Import 144, 146... Lithium Battery Notice 156 Loading New Firmware 151 Local Port 64, 68 Login Connect Menu 76, 77 Login Password 138 LPD Configuration Page 91 Settings 90 LPD Statistics 90 M MAC Address 23, 24 Maintenance and Diagnostics Settings Protocol Stack 115 Maintenance Settings 112 ManageLinx...
... Timeout 138 IP 20 Address 23 Address Filter 120 Settings 116 ISO/IEC Guide 155 K Key Length 108 Key Type 95, 96, 102 L Label 24 Lantronix Discovery Protocol 23 LEDs 27, 33, 38 Line 1 Configuration 53 Statistics 52 Line Settings 52 Lines to Export 140, 141 Lines to Import 144, 146... Lithium Battery Notice 156 Loading New Firmware 151 Local Port 64, 68 Login Connect Menu 76, 77 Login Password 138 LPD Configuration Page 91 Settings 90 LPD Statistics 90 M MAC Address 23, 24 Maintenance and Diagnostics Settings Protocol Stack 115 Maintenance Settings 112 ManageLinx...
EDS - User Guide
Page 161
... Status 48 Network Settings 48 New Certificate 107 New Private Key 107 O Obtaining a Bootstrap File 147 Obtaining Firmware 151 Organization Unit 107 P Packing Mode 60 Password 65, 102 PBX 22 Persistent 90 Port 114 Port Numbers 23 Ports Serial and Telnet 23 Power Frequency Magnetic Field Immunity 155 PPP Settings 80...
... Status 48 Network Settings 48 New Certificate 107 New Private Key 107 O Obtaining a Bootstrap File 147 Obtaining Firmware 151 Organization Unit 107 P Packing Mode 60 Password 65, 102 PBX 22 Persistent 90 Port 114 Port Numbers 23 Ports Serial and Telnet 23 Power Frequency Magnetic Field Immunity 155 PPP Settings 80...
EDS - Command Reference
Page 3
... Element Attributes 15 Record, Group, Item, and Value Tags 16 Importing and Exporting an XML Configuration File 17 Best Practices 18 Importing 18 Exporting 19 Passwords in the XML File 19 XML Configuration Groups 20 XML Status Record Groups and Items 35 5: Commands and Levels 49 EDS Command Reference 3
... Element Attributes 15 Record, Group, Item, and Value Tags 16 Importing and Exporting an XML Configuration File 17 Best Practices 18 Importing 18 Exporting 19 Passwords in the XML File 19 XML Configuration Groups 20 XML Status Record Groups and Items 35 5: Commands and Levels 49 EDS Command Reference 3
EDS - Command Reference
Page 4
List of Figures Figure 3-1 CLI Level Hierarchy 12 Figure 3-2 Login Level Commands 13 Figure 3-3 Enable Level Commands 13 Figure 4-1 DTD for XCRs 14 Figure 4-2 XML Example 15 Figure 4-3 XML Example 16 Figure 4-4 XML Example of Multiple Named Values 16 Figure 4-5 XML Example of Multiple Items 17 Figure 4-6 XML Example with Multiple Groups 17 Figure 4-7 XML Example of Supplying Passwords 20 EDS Command Reference 4
List of Figures Figure 3-1 CLI Level Hierarchy 12 Figure 3-2 Login Level Commands 13 Figure 3-3 Enable Level Commands 13 Figure 4-1 DTD for XCRs 14 Figure 4-2 XML Example 15 Figure 4-3 XML Example 16 Figure 4-4 XML Example of Multiple Named Values 16 Figure 4-5 XML Example of Multiple Items 17 Figure 4-6 XML Example with Multiple Groups 17 Figure 4-7 XML Example of Supplying Passwords 20 EDS Command Reference 4
EDS - Command Reference
Page 9
... EDS, navigating the Command Line Interface (CLI), typing keyboard shortcuts, and moving between the levels. Note: Depending on our website www.lantronix.com/support/downloads. To complete the boot process, terminate the serial CLI session (with the exit command). To access the EDS by using...Telnet connection by clicking the Telnet Configuration tab in command mode permanently or to Chapter 5: Commands and Levels for a complete list of security, a password may be required. Click Start > Run. While the back door is active, the CLI prompt is online when the command prompt (>) displays. 3:...
... EDS, navigating the Command Line Interface (CLI), typing keyboard shortcuts, and moving between the levels. Note: Depending on our website www.lantronix.com/support/downloads. To complete the boot process, terminate the serial CLI session (with the exit command). To access the EDS by using...Telnet connection by clicking the Telnet Configuration tab in command mode permanently or to Chapter 5: Commands and Levels for a complete list of security, a password may be required. Click Start > Run. While the back door is active, the CLI prompt is online when the command prompt (>) displays. 3:...
EDS - Command Reference
Page 11
..., as well as commands that take you begin at the login level. The enable level can be password protected and is the gateway to full configuration and management of levels. This level can also be password protected and provides access to a user at one word Understanding the CLI Level Hierarchy The CLI...
..., as well as commands that take you begin at the login level. The enable level can be password protected and is the gateway to full configuration and management of levels. This level can also be password protected and provides access to a user at one word Understanding the CLI Level Hierarchy The CLI...