![Black Box LES1516A User Manual Download Page 69](http://html1.mh-extra.com/html/black-box/les1516a/les1516a_user-manual_2762893069.webp)
69
1.877.877.2269
BLACKBOX.COM
NEED HELP?
LEAVE THE TECH TO US
LIVE 24/7
TECHNICAL
SUPPORT
1.877.877.2269
CHAPTER 5: SERIAL PORT, HOST DEVICE AND USER CONFIG
For example, if a User named fred wants to access serial port 2, when setting up SSHTerm or the PuTTY SSH client, instead of typing
username = fred
ssh port = 3002
type
username = fred:port02
or
username = fred:ttyS1
and
ssh port = 22.
Alternatively, by typing
username=fred:serial
and
ssh port = 22
the User is presented with a port selection option
This syntax enables Users to set up SSH tunnels to all serial ports with only a single IP port 22 having to be opened in their firewall or
gateway.
NOTE: In Console Server mode, when you connect to a serial port, you connect via pmshell. To generate a BREAK on the serial port
type the character sequence ~b. If you’re doing this over OpenSSH, type ~~b.
Enable or disable Raw TCP access.
RAW TCP allows connections directly to a TCP socket. Communications programs like PuTTY support RAW TCP. This protocol,
however, would usually be used by a custom application.
For RAW TCP, the default port address is IP Address:Port 4000 + serial port # (That is, ports 4001 – 4048).
RAW TCP also enables the serial port to be tunneled to a remote console server, so two serial port devices can be transparently
interconnect over a network (see Section 5.1.6).
Enable or disable RFC 2217 access.
Enabling RFC 2217 access enables serial port redirection on that port. For RFC 2217, the default port address is IP Address:Port 5000
+ serial port # (that is Port #s 5001 – 5048).
Special client software is available for Windows UNIX and Linux that supports RFC 2217 virtual com ports, so a remote host can
monitor and manage remote serially attached devices, as though they were connected to the local serial port (see Section 5.6 for
details).
RFC 2217 also enables the serial port to be tunneled to a remote console server, so two serial port devices can be transparently
interconnect over a network (see Section 5.1.6).
Enable or disable Unauthenticated Telnet.
Enabling Unauthenticated Telnet enables telnet access to the serial port without authentication credentials. When a user accesses
the console server to telnet to a serial port, they are normally given a login prompt. With unauthenticated telnet, they connect directly
through to the port without any console server login challenge. (If a telnet client does prompt for authentication, any entered data will
allow connection.)
This mode is mainly used when you have an external system (such as conserver) managing user authentication and access privileges
at the serial device level.
NOTE: Only the connection to the console server is unauthenticated. Logging into a device connected to the console server may still
require authentication.