7: Network, Line, Tunnel, and Terminal Settings
EDS Device Servers User Guide
70
Tunnel – Modem Emulation Page
Tunnel – Modem
Emulation Page
Settings
Description
Echo Pluses
Select whether the modem plus (+) command is echoed (sent).
Choices are:
On
= modem pluses are echoed.
Off
= modem pluses are not echoed. (
default
)
Echo Commands
Select whether modem commands are echoed on the serial line.
Choices are:
On
= modem commands are echoed. (
default
)
Off
= modem commands are not echoed.
Verbose Response
Codes
Select whether modem response (result) codes are sent on the
serial line. Choices are:
On
= modem responses are sent on the serial line. (
default
)
Off
= modem responses are not sent.
Response Codes
Select whether modem response (result) codes sent on the serial
line take the form of words or numbers. Choices are:
Text
= modem responses are sent as words. (
default
)
Numeric
= modem responses are sent as numbers.
Error Unknown
Commands
Select whether an ERROR or OK response is sent in reply to
unrecognized AT commands. Choices are:
On
= ERROR is returned for unrecognized AT commands.
Off
= OK is returned for unrecognized AT commands. (
default
)
Connect String
If required, enter a customized string that is sent along with the
CONNECT response code. Default is <none>.
Tunnel – AES Keys Page
Four Advanced Encryption Standard (AES) Encryption Keys are used for tunneling.
Connect mode and Accept mode contain their own sets of keys. One key is used for
encrypting outgoing data and another key is used for decrypting incoming data. These
AES keys are fixed at 16 bytes. Any keys entered that are less than 16 bytes long are
padded with zeroes.
If you click
AES Keys
at the top of one of the Tunnel pages, the Tunnel – AES Keys
page displays. Here you can enter key data as text or binary values for the tunnel
selected at the top of the page. Binary values are a string of characters representing
hexadecimal or decimal values.
Notes:
Keys are shared secret keys that must be known by both sides of the connection
and kept secret.
Tunneling using AES encryption uses a non-standard protocol and shared keys,
making it not very secure. The EDS also supports SSH as an alternative method
of secure tunneling. SSH tunneling has the advantage of not using shared keys.
Содержание EDS16PR
Страница 49: ...7 Network Line Tunnel and Terminal Settings EDS Device Servers User Guide 49 Figure 7 1 Network Configuration ...
Страница 64: ...7 Network Line Tunnel and Terminal Settings EDS Device Servers User Guide 64 Figure 7 9 Connect Mode Page ...
Страница 83: ...8 Services Settings EDS Device Servers User Guide 83 Figure 8 7 HTTP Configuration Page ...
Страница 86: ...8 Services Settings EDS Device Servers User Guide 86 Figure 8 8 HTTP Authentication Page ...
Страница 94: ...9 Security Settings EDS Device Servers User Guide 94 Figure 9 1 SSH Server Host Keys Page ...
Страница 99: ...9 Security Settings EDS Device Servers User Guide 99 Figure 9 4 SSH Client Users Page ...
Страница 102: ...9 Security Settings EDS Device Servers User Guide 102 Figure 9 6 SSL Page Bottom ...
Страница 107: ...10 Maintenance and Diagnostics Settings EDS Device Servers User Guide 107 Figure 10 2 Filesystem Browser Page ...
Страница 119: ...10 Maintenance and Diagnostics Settings EDS Device Servers User Guide 119 Figure 10 12 Diagnostics Memory Page ...
Страница 132: ...11 Advanced Settings EDS Device Servers User Guide 132 Figure 11 5 XML Export Configuration Page ...
Страница 137: ...11 Advanced Settings EDS Device Servers User Guide 137 Figure 11 9 XML Import from Filesystem ...