Lantronix XPort User Manual Page 41

  • Download
  • Add to my manuals
  • Print
  • Page
    / 57
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 40
4: Using Setup Mode for Configuration
XPort™ User Guide 41
Disable TFTP Firmware Upgrade
This setting defaults to the N (No) option. The Y (Yes) option disables the use of
TFTP to perform network firmware upgrades. With this option, you can download
firmware upgrades over the serial port using DeviceInstaller’s Recover Firmware
procedure. (See Recovering the Firmware Using the Serial Port on page 51.)
Disable Port 77FE (Hex)
Note: If you choose to disable this option, keep in mind that disabling both
Telnet Setup and Port 77FE will prevent users from accessing the setup
menu from the network.
Port 77FE is a setting that allows DeviceInstaller, Web-Manager, and custom
programs to configure the unit remotely. You may wish to disable this capability for
security purposes.
The default setting is the N (No) option, which enables remote configuration. You can
configure the unit by using DeviceInstaller, web pages, Telnet, or serial configuration.
The Y (Yes) option disables remote configuration and web sites.
Note: The Y (Yes) option disables many of the GUI tools for configuring the
unit, including the embedded Web-Manager tool.
Disable Web Server
This setting defaults to the N (option). The Y (Yes) option disables the web server.
Disable ECHO Ports
This setting controls whether the serial port echoes characters it receives.
Enable Encryption
This option displays only if you purchased the encrypted version of the Lantronix
XPort. You can enable or disable (default) Rijndael encryption. Rijndael is the block
cipher algorithm recently chosen by the National Institute of Science and Technology
(NIST) as the Advanced Encryption Standard (AES) to be used by the US
government.
To enable encryption, select the key length (128, 192 or 256 bits) and enter the
encryption key in hexadecimals (32, 48, or 64, respectively). The hexadecimals are
echoed as asterisks to prevent onlookers from seeing the key.
Figure 4-10. Encryption Keys
Page view 40
1 2 ... 36 37 38 39 40 41 42 43 44 45 46 ... 56 57

Comments to this Manuals

No comments