Lantronix SCS Reference Manual page 13

Secure console servers
Table of Contents

Advertisement

12.11.5 Disk ................................................................................................................................12-182
12.11.6 Finger ..............................................................................................................................12-186
12.11.7 Forwards .........................................................................................................................12-186
12.11.8 Help .................................................................................................................................12-187
12.11.9 Monitor ............................................................................................................................12-187
12.11.10 Netstat ...........................................................................................................................12-187
12.11.11 Ping ...............................................................................................................................12-188
12.11.12 Resolve .........................................................................................................................12-188
12.11.13 Save ..............................................................................................................................12-189
12.11.14 Show/Monitor Queue.....................................................................................................12-190
12.11.15 Show Version ................................................................................................................12-191
12.11.16 Zero Counters ...............................................................................................................12-192
A: Environment Strings..............................................................................................A-1
A.1 Usage .........................................................................................................................A-1
A.1.1 Multiple Strings ............................................................................................A-1
A.2 Available Strings.........................................................................................................A-1
A.2.1 Usage Examples..........................................................................................A-1
B: Show 802.11 Errors................................................................................................B-1
B.1 Introduction .................................................................................................................B-1
B.2 Error Bits.....................................................................................................................B-1
B.2.1 Leftmost Number .........................................................................................B-1
B.2.2 Rightmost Number .......................................................................................B-3
C: SNMP Support ........................................................................................................C-1
C.1 Support.......................................................................................................................C-1
C.2 Security ......................................................................................................................C-1
D: Supported RADIUS Attributes ..............................................................................D-1
D.1 Authentication Attributes ............................................................................................D-1
D.1.1 Access-Request...........................................................................................D-1
D.1.2 Access-Accept .............................................................................................D-2
D.2 Accounting Attributes .................................................................................................D-4
D.3 Examples....................................................................................................................D-5
D.3.1 Configuring Authenticated PPP Connections ..............................................D-5
D.3.2 Forcing a Telnet Connection to Preferred Host ...........................................D-6
D.3.3 Forcing a Telnet Connection to a Specific Port ...........................................D-6
D.3.4 Preventing RADIUS Authentication .............................................................D-6
xi

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the SCS and is the answer not in the manual?

Table of Contents