Lantronix MPS100 EPS Reference Manual - Page 24

Security - reset

Page 24 highlights

Security Concepts 2.9 Security Several methods can be used to control access to the Server and restrict user behavior once logged in. For example: x Incoming logins can be selectively disabled and/or password protected via the Set/Define Server Incoming command. x The IP security table can be used to restrict logins to the Server. x Ports used for network logins can be "preconfigured" with a standard set of characteristics for each login. For more information about security measures and restriction options, including some Server features that are used for more than security reasons, see the Server Configuration and Ports chapters. 2.9.1 Event Reporting/Logging The Server can be configured to report various errors and events either to the serial console port or to a network host via TCP/IP (using the syslogd facility), LAT, or NetWare. Events that can be logged include user logins, modem events, printer state changes, system boots, system resets, and a full record of commands issued on the Server. See Set/Define Logging on page 12-13 for more information. 2-10

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223

Security
Concepts
2-
10
2.9
Security
Several methods can be used to control access to the Server and restrict user behavior once logged in. For
example:
Incoming logins can be selectively disabled and/or password protected via the
Set/Define Server
Incoming
command.
The IP security table can be used to restrict logins to the Server.
Ports used for network logins can be “preconfigured” with a standard set of characteristics for each
login.
For more information about security measures and restriction options, including some Server features that
are used for more than security reasons, see the
Server Configuration
and
Ports
chapters.
2.9.1
Event Reporting/Logging
The Server can be configured to report various errors and events either to the serial console port or to a
network host via TCP/IP (using the syslogd facility), LAT, or NetWare. Events that can be logged include
user logins, modem events, printer state changes, system boots, system resets, and a full record of
commands issued on the Server. See
Set/Define Logging
on page 12-13 for more information.