Black Box 16 port Network Card User Manual


 
Black Box Console Server user guide 174
domain set or change your domain name. After this action, you must reboot the unit; use the
command reboot.
user-iphost the default ip host for all users who login to the unit. Enter an internet address in dot
decimal notation; e.g. 192.101.34.202. The IP address entered here does not affect
any line configuration.
auth-method set the authentication method for users, when they login to the unit; the method is
‘local’, ‘both’ or ‘radius’.
retry-value is the number of times the unit will attempt to transfer (using tftp) a file to/from a host.
Enter a value between 0 and 255. The default value is 5. A value of 0 means that the
unit will not attempt a retry should tftp fail.
timeout-value is the time in seconds the unit will wait for successful transmit or receipt of tftp packets
before retrying a tftp transfer. Enter a value between 1 and 255. The default value is 3.
security-status By enabling security, the CS9000 will restrict incoming connections to the source IP
addresses that are configured host table. Regardless of the type of access (SNMP,
reverse telnet, SSH, etc), all frames from any IP host NOT configured in the host
table will be filtered/dropped if security is enabled. By not responding to
unauthorised IP hosts (even pings), it prevents common IP/port mapping utilities
from discovering the server's IP address and listening port information.
dhcp-status By enabling dhcp, the Console Server allows a dhcp server to provide the
configuration for the Console Server. The values are 'on' or 'off'; the default is 'off'
(dhcp disabled).
ssh-protocol-
status
By enabling the ssh protocol, you allow secure ssh connections to be established
across the LAN to a port device. The values that ssh-protocol-status can be set to are
"disabled", "ssh-1", "ssh-2" and "both (ssh-1+ssh-2)".
By default, the ssh protocol is set to "disabled". By setting the ssh protocol to "ssh-
1", ssh client connecting using SSH version 1 protocol will be allowed access.
Encryption keys will only be generated for SSH version 1 which you will be
prompted to generated. Similarly, encryption keys will only be generated for SSH
version 2, when set to "ssh-2" and only ssh clients that connect using SSH version 2
protocol will be allowed access. Both sets of keys will be generated when setting
ssh-protocol-status to "both (ssh-1+ssh-2)" and will support both SSH version 1 and
2 protocols.
NOTE: generation of keys can takes several minutes depending upon the SSH
version chosen. Key generation is only required once unless the Console Server is
reset back to a factory default state.