Contents
EDS Device Servers User Guide 7
AES Keys ____________________________________________________________ 147
Host Settings _____________________________________________________ 147
Terminal Settings__________________________________________________ 148
DNS Settings _____________________________________________________ 148
SNMP Settings____________________________________________________ 148
FTP Settings _____________________________________________________ 149
TFTP Settings ____________________________________________________ 149
Syslog Settings ___________________________________________________ 149
HTTP Settings ____________________________________________________ 150
Configuration _________________________________________________________ 150
Authentication_________________________________________________________ 150
RSS ____________________________________________________________ 150
CLI Settings ______________________________________________________ 151
Telnet _______________________________________________________________ 151
Email Settings ____________________________________________________ 151
LPD Settings _____________________________________________________ 152
IP Address Filter __________________________________________________ 152
Query Port Settings ________________________________________________ 152
System Settings___________________________________________________ 153
Real Time Clock___________________________________________________ 153
Protocol Stack ____________________________________________________ 153
TCP ________________________________________________________________ 153
ICMP _______________________________________________________________ 153
ARP ________________________________________________________________ 153
B: Technical Specifications 154
EDS4100 ________________________________________________________ 154
EDS8/16/32PR____________________________________________________ 156
C: Networking and Security 158
SSH ____________________________________________________________ 158
How Does SSH Authenticate? ____________________________________________ 158
What Does SSH Protect Against? _________________________________________ 158
SSL ____________________________________________________________ 159
Benefits of SSL________________________________________________________ 159
How SSL Works _______________________________________________________ 159
Digital Certificates _____________________________________________________ 160
Tunneling________________________________________________________ 161
Tunneling and the EDS _________________________________________________ 162