EasyManuals Logo
Home>Lantronix>Server>EDS32PR

Lantronix EDS32PR User Manual

Lantronix EDS32PR
175 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #158 background imageLoading...
Page #158 background image
EDS Device Servers User Guide 15
8
C: Networking and Security
This chapter describes the following networking and security concepts as they relate to
the EDS:
SSH described below.
SSL see page 159
Serial tunneling see page 161
This chapter concludes with a description of modem emulation (page 164).
SSH
Like SSL, Secure Shell (SSH) is a protocol that provides secure encrypted
communications over unsecured TCP/IP networks such as the Internet. SSH allows for
secure access to remote systems, eliminating potential security breaches such as
spoofing and eavesdropping or hijacking of sessions. However, SSH differs significantly
from SSL and, in fact, cannot communicate with SSL. The two are different protocols,
though they have some overlap in how they accomplish similar goals.
How Does SSH Authenticate?
SSH authenticates using one or more of the following:
Password (the /etc/passwd or /etc/shadow in UNIX)
User public key (RSA or DSA, depending on the release)
Host-based (.rhosts or /etc/hosts.equiv in SSH1 or public key in SSH2)
What Does SSH Protect Against?
SSH provides strong authentication and secure communications over insecure channels.
It also provides secure connections that protect a network from attacks such as:
IP spoofing, where a remote host sends packets that pretend to originate from
another, trusted host. SSH even protects against a spoofer on the local network
that is pretending to be a router to the outside.
IP source routing, where a host pretends that an IP packet comes from another,
trusted host.
DNS spoofing, where an attacker forges name server records.
Interception of cleartext passwords and other data by intermediate hosts.
Manipulation of data by people in control of intermediate hosts.
Attacks based on listening to authentication data and spoofed connections to the
server.

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Lantronix EDS32PR and is the answer not in the manual?

Lantronix EDS32PR Specifications

General IconGeneral
CertificationUL/CUL, FCC, CE, TUV, C-Tick, GS, CB scheme, VCCI FCC Part 15 Statement Class A Device, ICES-003 Class A Device, C-Tick, VCCI, CE Marking, UL-CUL Mark, TUV-GS Mark, RoHS FCC CFR 47 Part 15 Subpart B, ICES-003 Issue 4, AS/NZS CISPR 22, VCCI V-3, EN55022, EN61000-3-2, EN61000-3-3, EN55024, EN61000-4-2, EN61000-4-3, EN61000-4-4, EN61000-4-5, EN61000-4-6, EN61000-4-8, EN61000-4-11
Networking standardsIEEE 802.3
Serial interface typeRS-232
Serial ports quantity32
Ethernet LAN data rates10, 100 Mbit/s
Cabling technology10/100Base-T(X)
USB 2.0 ports quantity0
Ethernet LAN (RJ-45) ports1
Security algorithmsSSH
Supported network protocolsHTTP, HTTPS, FTP, TFTP, Telnet, TCP, UDP, LPD, XML, DHCP, SSHv2, SSLv3, SNMPv2, AutoIP, RSS, ARP, ICMP, SYSLOG, AES, SMTP, DNS, BOOTP, Traceroute
Built-in processorIntel XScale IXP420
Processor frequency266 MHz
Compatible operating systemsWindows 98/ME/NT/2000/XP/Vista
Flash memory8 MB
RAM capacity64 MB
LED indicatorsLAN
Storage temperature (T-T)-40 - 70 °C
Operating temperature (T-T)0 - 50 °C
Operating relative humidity (H-H)5 - 95 %
Input voltage100 - 240 V
SafetyUL 60950-1, CSA-22.2 No.60950-1-03, EN60950-1, CB Report - IEC 60950-1

Related product manuals