EasyManuals Logo
Home>Lantronix>Network Hardware>SLC 8000

Lantronix SLC 8000 User Manual

Lantronix SLC 8000
396 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #86 background imageLoading...
Page #86 background image
6: Basic Parameters
SLCâ„¢ 8000 Advanced Console Manager User Guide 86
remotepeertype <ietf|cisco>
forceencaps <enable|disable>
deadpeerdelay <disable|1-300 seconds>
deadpeertimeout <5-1200 seconds>
deadpeeraction <restart|hold|clear>
2. Enter RSA public key or Pre-Shared Key of remote host: set vpn key
3. Configure X.509 certificate for remote peer or local peer.
set vpn certificate local via <sftp|scp> rootfile
<Cert Authority File>
certfile <Certificate File> keyfile <Private Key File>
host <IP Address or Name> login <User Login> [path <Path to Files>
set vpn certificate remote via <sftp|scp> [rootfile
<Cert Authority File>
certfile <Certificate File> host <IP Address or Name>
login <User Login> [path <Path to Files>
4. Delete X.509 certificate for local and/or remote peer.
set vpn certificate delete
5. Enter XAUTH password: set vpn xauthpassword
6. Display all VPN settings and current status: show vpn [email <Email Address>]
7. Display detailed VPN status: show vpn status [email <Email Address>]
8. Display VPN logs: show vpn viewlog [numlines <Number of Lines][email
<Email Address>]
9. Display RSA public key of the SLC: show vpn rsakey
Security
The SLC 8000 advanced console manager supports a security mode that complies with the FIPS
140-2 standard. FIPS (Federal Information Processing Standard) 140-2 is a security standard
developed by the United States federal government that defines rules, regulations and standards
for the use of encryption and cryptographic services. The National Institute of Standards and
Technology (NIST) maintains the documents related to FIPS at:
http://csrc.nist.gov/publications/PubsFIPS.html
FIPS 140-2 defines four security levels, Level 1 through Level 4. The SLC unit uses a FIPS
module certified at Level 1.
Note: The SSH client keyboard-interactive authentication type is not supported while the
SLC unit is in FIPS mode. The SLC 8000 can support a limit of 25 concurrent CLI sessions
simultaneously when in FIPs mode.
To enable FIPS mode, the Network -> Security -> FIPS Mode flag needs to be enabled and the
SLC unit rebooted. Each time the SLC unit is booted in FIPS mode, it will perform a power up self
test to verify the integrity of the SLC unit's cryptographic module. If there are any issues with the
integrity of the cryptographic module, FIPS mode will be disabled and the SLC unit will be
rebooted into non-FIPS mode.
When the SLC unit is running in FIPS mode, the following protocols are supported: TLS 1.0, TLS
1.1, TLS 1.2, and SSH v2.

Table of Contents

Other manuals for Lantronix SLC 8000

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Lantronix SLC 8000 and is the answer not in the manual?

Lantronix SLC 8000 Specifications

General IconGeneral
Rack mountingYes
Console portRJ-45
Serial ports quantity48
USB 2.0 ports quantity2
AC input voltage120-230 V
Power source typeAC
AC input frequency50 - 60 Hz
Weight and Dimensions IconWeight and Dimensions
Weight5030 g
Dimensions (WxDxH)436.9 x 304.8 x 43.18 mm

Related product manuals