Preferred/Dedicated Hosts; Saving Autostart Characters; Port Restrictions; Locking A Port - Lantronix SCS Reference Manual

Secure console servers
Table of Contents

Advertisement

Ports

8.7.2 Preferred/Dedicated Hosts

A port can be assigned a preferred or dedicated SSH, Telnet, or Rlogin host using the Set/Define Ports
Preferred and Define Ports Dedicated commands. By entering a sequence of key letters (environment
strings) after the TCP parameter, you can specify the type of connection (e.g. SSH, Telnet, etc.). If the TCP
parameter is entered without an environment string, the connection will default to Telnet.
Local>> DEFINE PORT 2 PREFERRED TCP 192.75.1.0:T
Local>> DEFINE PORT 3 DEDICATED RLOGIN 192.0.1.221:R
Local>> DEFINE PORT 4 DEDICATED SSH 192.0.4.52:S
For SSH connections, the port name will be used as the username for the remote host.
See Environment Strings on page A-1 for more information on available strings.

8.7.3 Saving Autostart Characters

When a port is in dedicated mode and is configured to use an Autostart character (see Starting Automatically
on page 8-2 for more information on Autostart), you can forward the autostart characters to the host as the
first bytes of data. Enable this option with the Set/Define Ports Autostart Save command
Figure 8-19: Sending Autostart Characters to a Dedicated Host
Local>> DEFINE PORT 4 AUTOSTART SAVE 1
If you have a two-character autostart trigger, you can instruct the SCS to pass along both, one, or none of
the characters as part of this command.
The full syntax of Set/Define Ports Autostart is discussed on page 12-60.

8.8 Port Restrictions

Ports may be restricted in a number of ways. These methods include locking a port, username/password
protection, restriction of connection type, automatic logouts, control of session interruption, restriction of
commands, and receipt of broadcast messages.

8.8.1 Locking a Port

The Lock command may be used to secure a port without disconnecting sessions. When you enter Lock,
you will be prompted to enter a password. The port will then be locked until that same password is used to
unlock it. Figure 8-20 displays an example.
Local> LOCK
Password> donut (not echoed)
Verification> donut (not echoed)
Unlock password> donut (not echoed)
Local>
Figure 8-18: Specifying a Preferred/Dedicated Host
Figure 8-20: Locking and Unlocking a Port
8-9
Port Restrictions

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the SCS and is the answer not in the manual?

Subscribe to Our Youtube Channel

Table of Contents