Tripp Lite B098016V Owners Manual for B093- B097- and B098-Series Console Serv - Page 41

username=fred:serial, ssh port = 22, PuTTY, 1.6 Serial Bridging, RFC2217, Unauthenticated Telnet,

Page 41 highlights

4. Serial Port, Host, Device and User Configuration Or, by typing username=fred:serial and ssh port = 22, the User is presented with a port selection option: This syntax enables Users to set up SSH tunnels to all serial ports with only a single IP port 22 having to be opened in their firewall/gateway Note: In Console Server mode, when you connect to a serial port, you connect via pmshell. To generate a BREAK on the serial port, type the character sequence ~b. If connecting over OpenSSH, type ~~b. TCP RAW TCP allows connections directly to a TCP socket. However, while communications programs like PuTTY also supports RAW TCP, this protocol would usually be used by a custom application. For RAW TCP, the default port address is IP Address _ Port (4000 + serial port #) i.e. 4001 - 4048. RAW TCP also enables the serial port to be tunneled to a remote console server, so two serial port devices can be transparently interconnect over a network (refer to section 4.1.6 Serial Bridging). RFC2217 Selecting RFC2217 enables serial port redirection on that port. For RFC2217, the default port address is IP Address _ Port (5000 + serial port #) i.e. 5001 - 5048. RFC2217 also enables the serial port to be tunneled to a remote console server, so two serial port devices can be transparently interconnect over a network (refer to section 4.1.6 Serial Bridging). Unauthenticated Telnet Selecting Unauthenticated Telnet enables telnet access to the serial port without authentication credentials. When a user accesses the console server to telnet to a serial port, they are normally provided a login prompt. However, with unauthenticated telnet, they connect directly to the port without any console server login restrictions (if a telnet client does prompt for authentication, any entered data will allow connection). This mode is mainly used when you have an external system (such as conserver) to manage user authentication and access privileges at the serial device level. NB: only the connection to the console server is unauthenticated. Logging into a device connected to the console server may still require authentication. For Unauthenticated telnet, the default port address is IP Address _ Port (6000 + serial port #) i.e. 6001 - 6048. Unauthenticated SSH Selecting Unauthenticated SSH enables SSH access to the serial port without authentication credentials. When a user accesses the console server to telnet to a serial port, they are normally provided a login prompt. However, with unauthenticated SSH, they connect directly to the port without any console server login challenge (if a SSH client does prompt for authentication, any entered data will allow connection). This mode is primarily used when you have another system managing user authentication and access privileges at the serial device level, but still wish to encrypt the session across the network. NB: only the connection to the console server is unauthenticated. Logging into a device connected to the console server may still require authentication. For Unauthenticated telnet, the default port address is IP Address _ Port (7000 + serial port #) i.e. 7001 - 7048. Note: The : method of port access (as described in the above SSH section) always requires authentication. 41

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288

41
4. Serial Port, Host, Device and User Configuration
Or, by typing
username=fred:serial
and
ssh port = 22
, the User is presented with a port selection option:
This syntax enables Users to set up SSH tunnels to all serial ports with only a single IP port 22 having to be opened in
their firewall/gateway
Note:
In Console Server mode, when you connect to a serial port, you connect via pmshell. To generate a BREAK on the serial port, type the
character sequence ~b. If connecting over OpenSSH, type ~~b.
TCP
RAW TCP allows connections directly to a TCP socket. However, while communications programs like
PuTTY
also supports RAW TCP, this protocol would usually be used by a custom application.
For RAW TCP, the default port address is IP Address _ Port (4000 + serial port #) i.e. 4001 – 4048.
RAW TCP also enables the serial port to be tunneled to a remote console server, so two serial port
devices can be transparently interconnect over a network (refer to section
4.1.6 Serial Bridging
).
RFC2217
Selecting RFC2217 enables serial port redirection on that port. For RFC2217, the default port
address is IP Address _ Port (5000 + serial port #) i.e. 5001 – 5048.
RFC2217 also enables the serial port to be tunneled to a remote console server, so two serial port
devices can be transparently interconnect over a network (refer to section
4.1.6 Serial Bridging
).
Unauthenticated Telnet
Selecting Unauthenticated Telnet enables telnet access to the serial port without authentication
credentials. When a user accesses the console server to telnet to a serial port, they are normally
provided a login prompt. However, with unauthenticated telnet, they connect directly to the port
without any console server login restrictions (if a telnet client does prompt for authentication, any
entered data will allow connection).
This mode is mainly used when you have an external system (such as conserver) to manage user
authentication and access privileges at the serial device level.
NB: only the connection to the console server is unauthenticated. Logging into a device connected
to the console server may still require authentication.
For Unauthenticated telnet, the default port address is IP Address _ Port (6000 + serial port #)
i.e. 6001 – 6048.
Unauthenticated SSH
Selecting Unauthenticated SSH enables SSH access to the serial port without authentication
credentials. When a user accesses the console server to telnet to a serial port, they are normally
provided a login prompt. However, with unauthenticated SSH, they connect directly to the port
without any console server login challenge (if a SSH client does prompt for authentication, any
entered data will allow connection).
This mode is primarily used when you have another system managing user authentication and
access privileges at the serial device level, but still wish to encrypt the session across the network.
NB: only the connection to the console server is unauthenticated. Logging into a device connected
to the console server may still require authentication.
For Unauthenticated telnet, the default port address is IP Address _ Port (7000 + serial port #)
i.e. 7001 – 7048.
Note:
The <username>: method of port access (as described in the above
SSH
section) always requires
authentication.