background image

 

 

cnMatrix EX1K Basic Configuration Guide

 

 

 

 

Copyright 2021 Cambium Networks. All rights reserved. (v1.2) 

16

 

 

 
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL 
ANY  COPYRIGHT  HOLDER,  OR  ANY  OTHER  PARTY  WHO  MAY  MODIFY  AND/OR 
REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, 
INCLUDING  ANY  GENERAL,  SPECIAL,  INCIDENTAL  OR  CONSEQUENTIAL  DAMAGES 
ARISING  OUT  OF  THE  USE  OR  INABILITY  TO  USE  THE  PROGRAM (INCLUDING  BUT NOT 
LIMITED  TO  LOSS  OF  DATA  OR  DATA  BEING  RENDERED  INACCURATE  OR  LOSSES 
SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE 
WITH  ANY  OTHER  PROGRAMS),  EVEN  IF  SUCH  HOLDER  OR  OTHER  PARTY  HAS  BEEN 
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 
 
2) 
The 32-bit CRC compensation attack detector in deattack.c was contributed by CORE SDI S.A. 
under a BSD-style license. 
 
Cryptographic attack detector for ssh - source code 
 
Copyright (c) 1998 CORE SDI S.A., Buenos Aires, Argentina. 
 
All rights reserved. Redistribution and use in source and binary forms, with or without modification, 
are permitted provided that this copyright notice is retained. 
 
THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES ARE 
DISCLAIMED. IN NO EVENT SHALL CORE SDI S.A. BE LIABLE FOR ANY DIRECT, INDIRECT, 
INCIDENTAL,  SPECIAL,  EXEMPLARY  OR  CONSEQUENTIAL  DAMAGES  RESULTING  FROM 
THE USE OR MISUSE OF THIS SOFTWARE. 
 
Ariel Futoransky <[email protected]
  <http://www.core-sdi.com> 
 
3) 
ssh-keyscan was contributed by David Mazieres under a BSD-style license. 
 
Copyright 1995, 1996 by David Mazieres <[email protected]>. 
 
Modification and redistribution in source and binary forms is permitted provided that due credit is 
given to the author and the OpenBSD project by leaving this copyright notice intact. 
 
4) 
The  Rijndael implementation  by  Vincent  Rijmen,  Antoon  Bosselaers  and  Paulo  Barreto  is  in  the 
public domain and distributed with the following license: 
 
@version 3.0 (December 2000) 
 
Optimised ANSI C code for the Rijndael cipher (now AES) 
 
@author Vincent Rijmen <[email protected]
@author Antoon Bosselaers <[email protected]
@author Paulo Barreto <[email protected]
 
This code is hereby placed in the public domain. 
 
THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS OR IMPLIED 
WARRANTIES,  INCLUDING,  BUT  NOT  LIMITED  TO,  THE  IMPLIED  WARRANTIES  OF 
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.  IN NO 
EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, 
INCIDENTAL,  SPECIAL,  EXEMPLARY,  OR  CONSEQUENTIAL  DAMAGES  (INCLUDING,  BUT 

Summary of Contents for cnMatrix EX1K

Page 1: ...cnMatrix EX1K Switch Basic Configuration Guide...

Page 2: ...switch verify you have all the package contents available and a PC with SSH client such as PuTTY or OpenSSH SSH Client Package Contents Rack mount ears 2x with screws 8x are included with the 28 port...

Page 3: ...cord into a wall socket Model Name Part Number Number of Ports Power over Ethernet Throughput Switch cnMatrix EX1010 MX EX1010xxA 0 10 No 20 Gbps cnMatrix EX1010 P MX EX1010PxA 0 10 Yes 20 Gbps cnMat...

Page 4: ...d admin Configure Management PC 1 For Windows operating system open the Control Panel window 2 In the Control Panel window select the View network status and tasks option The Network and Sharing Cente...

Page 5: ...1 Use PuTTY SSH client 2 On the PuTTY Configuration window in the Host Name field enter 192 168 1 1 IP address and in the Port field enter the 22 value 3 Click Open The login prompt is displayed 4 In...

Page 6: ...122 F 0 C to 50 C 32 F to 122 F 0 C to 50 C 32 F to 122 F 0 C to 50 C 32 F to 122 F Operating humidity 55 at 95 RH 55 at 95 RH 55 at 95 RH 55 at 95 RH Storage temperature 40 C to 70 C 40 F to 158 F 4...

Page 7: ...modifications to the equipment must not be made unless under the express consent of the party responsible for compliance Any such modifications could void the user s authority to operate the equipment...

Page 8: ...rom or in addition to the terms of this Agreement will not be binding on the parties even if payment is accepted CONDITIONS OF USE Any use of the Software and Documentation outside of the conditions s...

Page 9: ...Cambium Networks for which monetary damages would be inadequate and for which Cambium Networks will be entitled to immediate injunctive relief If applicable you will limit access to the Software and D...

Page 10: ...NO CASE SHALL CAMBIUM S LIABILITY EXCEED THE AMOUNT YOU PAID FOR THE PRODUCT U S GOVERNMENT If you are acquiring the Product on behalf of any unit or agency of the U S Government the following applies...

Page 11: ...SOFTWARE The software may contain one or more items of Third Party Software supplied by other third party suppliers The terms of this Agreement govern your use of any Third Party Software UNLESS A SE...

Page 12: ...m with Netscapes SSL This library is free for commercial and non commercial use as long as the following conditions are aheared to The following conditions apply to all code found in this distribution...

Page 13: ...link the program to a modified version of libwebsockets then the changes to libwebsockets must be provided under the terms of the LGPL in sections 1 2 and 4 2 You do not have to provide a copy of the...

Page 14: ...Please read the FAQ for more information on the distribution of modified source versions OpenSSL 0 9 8i OpenSSL 0 9 8i Copyright c 1998 2008 The OpenSSL Project Copyright c 1995 1998 Eric A Young Tim...

Page 15: ...jh cryptsoft com Copyright remains Eric Young s and as such any Copyright notices in the code are not to be removed If this package is used in a product Eric Young should be given attribution as the a...

Page 16: ...e talks about have been removed from OpenSSH i e RSA is no longer included found in the OpenSSL library IDEA is no longer included its use is deprecated DES is now external in the OpenSSL library GMP...

Page 17: ...RE DISCLAIMED IN NO EVENT SHALL CORE SDI S A BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES RESULTING FROM THE USE OR MISUSE OF THIS SOFTWARE Ariel Futoransky...

Page 18: ...e distribution 3 Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission TH...

Page 19: ...ED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGE...

Page 20: ...R A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO...

Page 21: ...so counts as the successor of the GNU Library Public License version 2 hence the version number 2 1 Preamble The licenses for most software are designed to take away your freedom to share and change i...

Page 22: ...mple permission to use the GNU C Library in non free programs enables many more people to use the whole GNU operating system as well as its variant the GNU Linux operating system Although the Lesser G...

Page 23: ...r to the ordinary GNU General Public License version 2 instead of to this License If a newer version than version 2 of the ordinary GNU General Public License has appeared then you can specify that ve...

Page 24: ...ponents compiler kernel and so on of the operating system on which the executable runs unless that component itself accompanies the executable It may happen that this requirement contradicts the licen...

Page 25: ...Foundation 14 If you wish to incorporate parts of the Library into other free programs whose distribution conditions are incompatible with these write to the author to ask for permission For software...

Page 26: ...to contact you by electronic and paper mail You should also get your employer if you work as a programmer or your school if any to sign a copyright disclaimer for the library if necessary Here is a sa...

Page 27: ...fire water or structural damage There are no serviceable parts inside this equipment Service should be provided only by a qualified service technician Le switch est con u avec une prise de courant pos...

Page 28: ...g this symbol on the product and or its packaging must not be disposed of with unsorted municipal waste The symbol indicates that this product should be disposed of separately from regular household w...

Reviews: