Telnet Login Method _____________________________________________ 3-1
Command Line Method___________________________________________ 3-1
4: Application Setup ______________________________________ 4-1
Login Banner Pages ________________________________________________ 4-1
Menus ___________________________________________________________ 4-1
Connecting ____________________________________________________ 4-1
Enabling Menu Mode ____________________________________________ 4-2
Creating the Menu_______________________________________________ 4-3
Using Menu/Connection Commands ________________________________ 4-4
Enabling Menu Mode for a Port ____________________________________ 4-5
Using the Menu _________________________________________________ 4-6
Remote User Dial-Up _______________________________________________ 4-7
Break Sequences __________________________________________________ 4-8
Serial Breaks___________________________________________________ 4-8
Alternate Break Sequences _______________________________________ 4-8
Modem Mode______________________________________________________ 4-9
Event Port Logging and Email Notification ______________________________ 4-10
Creating an Email Site __________________________________________ 4-11
Dial-Out ISP Connection ____________________________________________ 4-12
Com Port Redirector _______________________________________________ 4-13
SSH Connections _________________________________________________ 4-14
Defining Supported SSH Connections ______________________________ 4-14
Creating an AUTHORIZED_KEYS File ______________________________ 4-14
Shared Key Authentication Process ________________________________ 4-15
Setting up RSA Shared Key Authentication (for SSHv1) ________________ 4-15
Setting up DSA Shared Key Authentication (for SSHv2) ________________ 4-16
Setting up Username/Password Authentication (SSHv1 or SSHv2) ________ 4-16
Forming SSH Incoming Connections (Unix and Non-Unix)_______________ 4-17
Non-Unix Platforms _____________________________________________ 4-17
UNIX Platforms ________________________________________________ 4-17
Security Enhancements_____________________________________________ 4-18
Incoming Security ______________________________________________ 4-18
Port User Restrictions ___________________________________________ 4-18
5: Troubleshooting________________________________________ 5-1
Technical Support __________________________________________________ 5-1
LEDs ____________________________________________________________ 5-2
iii