PERLE - IOLAN Secure User's Guide V5.0
PERLE - IOLAN Secure User's Guide V5.0
Document Description
IOLAN Hardware Installation Guide Product specific hardware guide on how to install your IOLAN.
IOLAN Quick Start Guide Product specific Quick Start Guide that came with your IOLAN.
IOLAN CLI (Command Reference Command reference guide using CLI commands to configure the
Guide) Guide V5.0 and greater IOLAN (this is an advanced way to configure the IOLAN)
Document Conventions
This document contains the following conventions:
Most text is presented in the typeface used in this paragraph. Other typefaces are used to help you identify
certain types of information. The other typefaces are:
Guide Updates
This guide may be updated from time to time and is available at no charge from the download area of Perle’s
web site at https://www.perle.com/downloads/
Licensing
All Perle software pre-installed in Perle Products or downloaded from any other source or media is governed
by Perle’s End User License Agreement. USING THIS PERLE PRODUCT CONSTITUTES ACCEPTANCE OF THIS
AGREEMENT. Please review the country specific End User License Agreement located at the following
location prior to usage;
https://www.perle.com/EULA.shtml/
https://www.perle.com/EULA-Germany.shtml/
You also agree that Perle may collect, use, or disclose customer information in the course of fulfilling its obli-
gations under the End User License Agreement, and such collection, use, and disclosure will be in accordance
with Perle’s privacy policy available at https://www.perle.com
Copyright Statement
This document must not be reproduced in any way whatsoever, either printed or electronically, without the
consent of:
Perle Systems Limited,
60 Renfrew Drive
Markham, ON
Canada
L3R 0E1
Perle reserves the right to make changes without further notice, to any products to improve reliability, func-
tion, or design.
Perle, the Perle logo, and IOLAN are trademarks of Perle Systems Limited.
Microsoft, Windows NT®/Windows 2000®/Windows Vista®/Windows Server 2003®/Windows 2003 R2®/Win-
dows 2008®/Windows2008 R2®/Windows XP®/Windows 7®/Windows 8®/Windows 8.1®/Windows Server
2012®/Windows Server 2012 R2® /Windows Server 2016® /Windows 10 and Internet
Explorer® are trademarks of Microsoft Corporation.
Solaris® is a registered trademark of Sun Microsystems, Inc. in the USA and other countries.
Perle Systems Limited, 2005-2018.
FCC Note The IOLAN Device Server series has been found to comply with the limits for a Class A digital device,
pursuant to Part 15 of the FCC rules. These limits are designed to provide reasonable protection against harm-
ful interference when the equipment is operated in a commercial environment. This equipment
generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the
instructions in this Guide, may cause harmful interference to radio communications. Operation of this
equipment in a residential area is likely to cause harmful interference, in which case the user will be required
to correct the interference at his/her own expense.
EN 55022: 1998, Class A, Note
WARNING This is a Class A product. In a domestic environment this product may cause radio interference in
which case the user maybe required to take adequate measures.
Caution: the IOLAN product is approved for commercial use only.
Note: If you are not seeing IPv6 addresses in the list (you must expand the entry).
If the authentication and connection are successful, the IOLAN’s Server Info window is displayed.
If you cannot connect to the IOLAN, you can highlight the IOLAN and selecting the Ping button to verify
that the DeviceManager can communicate with the IOLAN’s IP Address. If the ping times out, then you
might need to set up a Gateway in your IOLAN or verify that your network is communicating correctly.
If your IOLAN is not in the local network and you do not have a multi-cast enabled router in your network
and therefore the IOLAN is not displayed in the selectable list, but can be pinged from your PC, you can
add it to the selectable list by selecting the Add button.
Note: The DeviceManager does not automatically update the IOLANs configuration. You must download the
configuration changes to the IOLAN and then reboot the IOLAN to make the configuration changes take effect.
The left-hand navigation tree allows you to quickly and easily navigate the various Configuration and
Statistics pages of DeviceManager. Further navigation is available in the form of buttons and tabs in the
display area of DeviceManager, depending on where you are in the navigation tree, as shown in the
below.
Notice that when you expand a parent node in the tree (e.g., Serial), the tree displays the same options
that appear as buttons in the display area, as shown below. This gives you the choice of using the
navigation tree or buttons to navigate the options.
Select the IOLAN model for which you want to create a new configuration file. Any configuration file cre-
ated in this manner can only be save locally. To download a created configuration file, you must first con-
nect to the IOLAN, import the created configuration file into DeviceManager (this is not available in
WebManager), and then download the configuration file to the IOLAN and reboot it.Opening an Existing
Configuration File
If you select the File, Open, a browse window is opened so you can select the configuration file you want
to edit. IOLAN configuration files saved in the DeviceManager can be in the IOLAN-native binary format
(.dme) or as a text file (.txt), which can be edited with a text editor. Either configuration version can be
imported into the DeviceManager. IOLAN configuration files saved from WebManager can also be opened
into DeviceManager.
Importing an Existing Configuration File
If you have a local, saved configuration file that you want to download to the IOLAN, you must first con-
nect to the IOLAN that you want to download the configuration file to. Once you have successfully logged
into the IOLAN, in DeviceManager select Tools, Import Configuration from a File and in WebManager select
Administration, Restore/Backup. You need to download the file in DeviceManager and in both managers
you need to reboot the IOLAN.
WebManager
Using the WebManager
The Perle WebManager is an embedded Web based application that provides an easy to use browser
interface for managing the IOLAN. This interface provides the ability to configure and manage the IOLAN.
This is accessible through any standard desktop web browser. You must have preconfigured a valid IP
address on the IOLAN before connecting with the WebManager.
WebManager Features
Some Perle WebManager features are:
• The ability to downloading firmware to the IOLAN.
• The ability to reset serial ports.
If the authentication and connection are successful, the IOLAN’s Server Info window is displayed.
You are now ready to configure the IOLAN.
WebManager also launches EasyPort Web, which is a browser-based management tool that can be used
to manage clustered IOLANs and Remote Power Switches (RPS). EasyPort Web can also be launched by
any user who can connect to the IOLAN through a web browser.
Navigating the WebManager
The WebManager uses a expandable/collapsible buttons with folders and pages for the navigation tree.
You can expand the buttons to view the folders and pages to see the available configuration options.
When you access a configuration page, you can often navigate the tabs in the configuration area to access
all of the configuration options.
When using WebManager, you are required to select the Apply button each time you make a change to a
configuration window/tab.
Configuration Area
DHCP/BOOTP
Connecting to the IOLAN Using DHCP/BOOTP
The IOLAN will automatically request an IP address from the DCHP/BOOTP server when the Obtain IP
address automatically using DHCP/BOOTP parameter is enabled. By default, DHCP is disabled
Using DHCP/BOOTP
To use DHCP/BOOTP, edit the bootp file with IOLAN configuration parameters. You can use DHCP/BOOTP
to perform the following actions on a single or multiple IOLANs on boot up:
• auto-configure with minimal information; for example, only an IP address
• auto-configure with basic setup information (IP address, subnet/prefix bits, etc.)
• download a new version of firmware
• download a full configuration file
DHCP/BOOTP is particularly useful for multiple installations: you can do all the IOLANs’ configuration in
one DHCP/BOOTP file, rather than configure each IOLAN manually. Another advantage of DHCP/BOOTP is
that you can connect the IOLAN to the network, turn on its power and let autoconfiguration take place.
All the configuration is carried out for you during the DHCP/BOOTP process.
DHCP Parameters
The following parameters can be set in the DHCP/BOOTP bootp file:
• SW_FILE—The full path, pre-fixed by hostname/IP address (IPv4 or IPv6), and file name of the
firmware update.
• CONFIG_FILE—The full path, pre-fixed by hostname/IP address (IPv4 or IPv6), and file name of
the configuration file.
• GUI_ACCESS—Access to the IOLAN from the HTTP or HTTPS WebManager. Values are on or
off.
• AUTH_TYPE—The authentication method(s) employed by the IOLAN for all users. You can
specify the primary and secondary authentication servers, separated by a comma. This uses
the following numeric values for the authentication methods.
– 0—None (only valid for secondary authentication)
– 1—Local
– 2—RADIUS
– 3—Kerberos
– 4—LDAP/Microsoft Active Directory
– 5—TACACS+
– 6—SECURID
– 7—NIS
From the ping command issued in step 2, the IOLAN will pickup and use the IP address entered into the
ARP table in step 1. You are now ready to configure the IOLAN.
Connecting to an IPv6 Network
The IOLAN has a factory default link local IPv6 address based upon its MAC Address.
For example:
For an IOLAN with a MAC Address of 00-80-D4-AB-CD-EF, the Link Local Address would be
fe80::0280:D4ff:feAB:CDEF.
By default, the IOLAN will listen for IPV6 router advertisements to obtain additional IPV6 addresses. No
configuration is required, however, you can manually configure IPV6 addresses and network settings; see
Connecting to an IPv6 Network for more information on IPv6 configuration options.
SNMP
The IOLAN supports configuration and management through SNMP. SNMP Management tools (SNMP cli-
ent/MIB browser software) can be used to set IOLAN configuration parameters and/or view IOLAN
statistics.
Connecting to the IOLAN Using SNMP
Before you can connect to the IOLAN through an SNMP Management tool or MIB browser, you need to
set the following components through another configuration method.
2. Verify that the read-write user for SNMP version 3 or a community for SNMP version 1 or 2
match the configuration on the IOLAN.
3. Type in the IOLAN’s IP address and connect to the IOLAN.
4. You are now ready to start configuring the IOLAN using SNMP.
The first variable in each folder is the Status variable, for example, serviceStatus. When you perform a GET
on this variable, one of the following values will be returned:
• 1—Indicates that the container folder is active with no changes.
• 2—Indicates that the container folder is active with change(s).
Once you have completed setting the variables in a folder, you will want to submit your changes to the
IOLAN. To do this, set the Status variable to 4. If you want to discard the changes, set the Status variable to
6.
• 4—Indicates that the changes in the container folder are to be submitted to the IOLAN.
• 6—Indicates that the changes in the container folder are to be discarded.
If you want to save all the changes that have been submitted to the IOLAN, you need to expand the admin-
Info container folder and SET the adminFunction to 1 to write to FLASH. To make the configuration changes
take effect, SET the adminFunction to 3 to reboot the IOLAN.
To select a serial port profile in the WebManager, connect through the WebManager to the IOLAN you are
configuring and select Serial Port, in the navigation pane. Highlight the serial port you want to
configure and then select Edit.
Domain This field is combined with the System Name to construct the fully qualified
domain name (FQDN). For example, if the domain is mycompany.com and the
Server Name is set to accounting, the FQDN would be
accounting.mycompany.com.
Obtain IP Address When enabled, the IOLAN will request an IP address from the DHCP/BOOTP server.
automatically using By default, when this option is enabled, the IOLAN will also attempt to retrieve the
DHCP/BOOTP DNS server, WINS server, and default gateway from the DHCP/BOOTP server.
Default: Disabled
Default Gateway Specify the gateway IP address that will provide general access beyond the local
network.
Field Format: IPv4 address
DNS Server Specify the IP address of a DNS host in your network for host name resolution.
Field Format: IPv4 or IPv6 address
DNS Server Obtain When DHCP/BOOTP is enabled, you can enable this option to have the IOLAN
Automatically receive the DNS IP address from the DHCP/BOOTP server.
Default: Enabled
WINS Server Specify the IP address of a WINS (Windows Internet Naming Service) host in your
network for host resolution.
Field Format: IPv4 address
WINS Server Obtain When DHCP/BOOTP is enabled, you can enable this option to have the IOLAN
Automatically receive the WINS IP address from the DHCP/BOOTP server.
Default: Enabled
IPv6 Settings
Configure IPv6 settings when the IOLAN resides in an IPv6 network.
Ethernet 1 The IOLAN’s unique IPv6 network Interface 1 IP address.
Field Format: IPv6 address
Obtain IPv6 When enabled, you can configure the IOLAN to obtain the IPv6 address(es) using
Address(es) using IPv6 Autoconfiguration or a DHCPv6 server.
Default: Enabled
IPv6 When enabled, the IOLAN will send out a Router Solicitation message. If a Router
Autoconfiguration Advertisement message is received, the IOLAN will configure the IPv6 address(es)
and configuration parameters based on the information contained in the
advertisement. If no Router Advertisement message is received, the IOLAN will
attempt to connect to a DHCPv6 server to obtain IPv6 addresses and other
configuration parameters.
Default: Enabled
DHCPv6 When enabled, requests IPv6 address(es) and configuration information from the
DHCPv6 server.
Default: Disabled
Custom IPv6 Address Displays the list of custom configured IPv6 addresses.
List
DNS Server Specify the IPv6 address of a DNS host in your network for host name resolution.
Field Format: IPv6 address
DNS Server Obtain When DHCPv6 is enabled, you can enable this option to have the IOLAN receive
Automatically the DNS IP address from the DHCPv6 server.
Default: Enabled
DHCPv6 Settings IPv6 When enabled, the IOLAN will accept IPv6 address(es) from the DHCPv6 server.
Address(es) Default: Disabled
DHCPv6 Settings When enabled, the IOLAN will accept the network prefix from the DHCPv6 server.
Network Prefix Default: Disabled
Network Subnet Bits Specify the number of bits in the Network prefix which will be used to specify the
subnet.
Range: 0-64
Default: 64
IPv6 Address IPv6 Specify the network prefix bits for the IPv6 address.
Prefix Bits Range: 0-128
Default: 64
Register Address in When this parameter is set, the IOLAN will provide the DHCP/DHCPv6 server with
DNS a fully qualified domain name (FQDN), so that the DHCP/DHCPv6 server can
update the network's DNS server with the newly assigned IP address.
Default: Disabled
Domain Prefix (Dual Interface models only) A domain prefix to uniquely identify the interface to
the DNS when the IOLAN has more than one Ethernet interface. The FQDN that is
sent to the DNS will be one of the following formats, depending on what is
configured in the System Settings section on the IPv4 Settings tab:
• <Server Name>.<Domain Prefix>.<Domain Name>
• <Server Name>.<Domain Prefix>
Field Format: Maximum 8 alphanumeric characters
Maximum The Maximum Transmission Unit (MTU) size of an IP frame that will be sent over
Transmission Unit the network. If your IOLAN has more then one interface each interface can be set
(MTU) separately, however only one MTU size can be set for both IPv4 or IPv6 frames.
MTU IPv4: 68-1500 bytes
MTU IPv6: 68-1500 bytes
Enable Active Active Standby permits the grouping of Ethernet LAN connections to provide for
Standby link failover. Both Ethernet connections will have the same Ethernet MAC address.
Active standby refers to the process by which a failure of one interface can be
automatically overcome by having its traffic routed to the other interface.
Default: Disabled
Advertise DHCPv6 When enabled, the Router Advertisement message indicates to use the DHCPv6
Configuration server to obtain additional configuration parameters.
Options Default: Disabled
Advertise the The network prefix of the IPV6 addresses created in the IPv6 Settings tab in the
following Network Custom IPv6 Address List are included in the Router Advertisement message. You
Prefix(es) can choose to enabled or disable specific network prefixes from being advertised
to hosts.
Default: Enabled
Soft-AP Mode
In Soft-AP Mode, the IOLAN acts as an Access Point for wireless clients. Up to 6 wireless clients can con-
nect to the IOLAN.
Mode Specify the mode of operation for the IOLAN’s WLAN operation.
Client: The IOLAN’s wireless interface is used to connect to an AP (Access Point).
Soft-AP: The IOLAN’s wireless interface acts as an AP (Access Point) allowing
wireless clients to connect.
Disabled: The IOLAN’s wireless capabilities are disabled. When disabled, the
external WPS button will have no effect on the mode of the IOLAN.
Default: Client
Radio Band The IOLAN can operate over 2.4GHz or 5GHz. To support connections to both
bands use 2.4+5.
Values: 2.4, 5, 2.4+5
Default: 2.4+5 (dual-band)
WPS Enabled (in By default WPS (Wireless Protected Setup) mode is enabled to allow the IOLAN to
client mode) easily connect to any routers/Access Points that are in the network and configured
for WPS mode. The IOLAN will scan for 120 seconds to find the closest AP that is
currently in WPS mode. The IOLAN will exchange credentials with that AP and
then create an internal wireless profile (association) and then the IOLAN will exit
WPS mode.
Values: on or off
Default: on
WPS Enabled (in Soft- The WPS button can be used in Soft-AP mode to facilitate the connection of
AP mode) wireless clients
Roaming Enabled This setting allows you to roam (reconnect) to a different wireless router/AP (with
the same SSID) if there is a significant difference in the signal strength.
Values: on or off
Default: on
Roaming Decision When roaming, the IOLAN will be constantly scanning in the background to
determine if there is a better AP to connect to within the ESSID network. Since this
background scanning can have an effect on performance, it will normally do slow
scans when the signal is strong and faster scans when the signal is weaker.
Values: Balanced, Optimize Bandwidth, Optimize Distance
Default: Balanced
Out of Range Scan Specify the out of range scan interval for fast roaming scans.
Interval Values: 0-65535 seconds
Default: 30 seconds
In Range Scan Specify the in range scan interval for slow roaming scans.
Interval Values: 0-65535 seconds
Default: 300 seconds
Antenna Rx The IOLAN uses these techniques to optimize receive signals on it’s wireless
Diversity/MRC antennas. (supported on models with 2 antennas)
2.4-GHz supports MRC (Maximal-Ratio Combining)
5-GHz supports Diversity Capable
Default: on
WLAN Profiles
A WLAN profile defines all the settings necessary to establish a wireless connection with an Access Point.
You can defined up to 8 client profiles on the IOLAN. Associations with AP’s in WPS mode will be automat-
ically added by the IOLAN as profile (priority 1).
Radio Band The IOLAN can operate over 2.4GHz or 5GHz. To support connections to both
bands use 2.4+5.
Values: 2.4, 5, 2.4+5
Default: 2.4+5 (dual-band)
Scan DFS Channel The IOLAN supports DFS. When connected to an AP that is using Dynamic
Frequency Selection, it will respond to the specific protocol requests. When
scanning channels for AP’s the IOLAN provides the option of skipping the DFS
protected channels.
Values: off or on
Default: on (applies to 5GHz mode only)
Hidden SSID If this profile is defined to connect to an AP that has a hidden SSID then this option
must be enabled. This will force the IOLAN to send a directed probe to this AP with
the specified SSID in order to discover it and determine the channel that it is using.
Values: off or on
Default: off
Validate server Enable this option if you want the Radius server to validate that the IOLAN’s
certificate server’s certificate has been signed by a SSL/TLS certificate authority (CA). If you
enable this option, you need to download an SSL/TLS certificate authority (CA) list
file to the IOLAN.
Values: yes or no
Default: no
Channel Number Enter the channel number the IOLAN will use to connect to the AP.
Values: (1-11) 2.4GHz (36,40,44,48) 5GHz
Default: Selecting a channel number between 1-11 will use 2.4GHz band and
selecting channels 38, 40, 44 and 48 will use 5GHz band.
Security type in Soft In Soft-AP Mode, the IOLAN supports wpa-personal and wpa2-personal
AP mode encryption.
wpa-personal: tkip, aes
Default: aes
wpa2-personal: tkip, aes
Default: aes
Network mask Enter the IOLAN’s subnet mask. For example 255.255.0.0
Enable DHCP Server This DHCP server can be used to give IP addresses to clients connecting on this
wireless network.
Value: off or on
Default: on
DHCP IP address Enter the start IPv4 address of the DHCP pool.
Value: IP address
Default: 192.168.0.100
DHCP subnet mask Enter the IOLAN’s subnet mask. For example 255.255.0.0
Enable Selecting this option will enable your IOLAN to connect to your cellular network.
APN Enter the Access Point Name (APN). The APN will use this information to identify
the packet data network (PDN) that mobile data devices want to communicate
with. In addition to identifying a PDN, an APN may be used to define the type of
service. It can assigned an IP address to the wireless device, which security
methods should be used and how or if it should be connected to a customer
private network.
Examples of APNs:
• three.co.uk
• internet.t-mobile
• m2minternet.apn
Pin Enter a Pin if your SIM card has a PIN enabled, this will allow you to connect to the
SIM card.
Note: The IOLAN does not have the capability to set a Pin number on your SIM
card.
Value: 8 characters
Radio Access Select the radio access technology you will use to connect to the network.
Technology Data Options: Auto, LTE, 3G, 2G
Default: auto
Host Table
The Host table contains the list of hosts that will be accessed by an IP address or Fully Qualified Domain
Name (FQDN) from the IOLAN. This table will contain a symbolic name for the host as well as its IP address
or FQDN. When a host entry is required elsewhere in the configuration, the symbolic name will be used.
You can configure up to 100 hosts using IPv4 or IPv6 internet addresses.
Host Name The name of the host. This is used only for the IOLAN configuration.
Field Format: Up to 14 characters, no spaces.
Fully Qualified When you have DNS defined in the IOLAN, you can enter a DNS resolvable fully
Domain Name qualified domain name (note: FQDN’s are excluded as accessible hosts when IP
Filtering is enabled).
Field Format: Maximum 254 alphanumeric characters
IP Filtering
The IP Filtering Host table allows you to configure a table to customize how traffic to and from the IOLAN
will be filtered.
IP Filtering You can allow all IP traffic to and from the IOLAN. This is the default configuration.
Define traffic based This is a security feature that allow you to defined traffic to/from hosts defined
on below criteria within the IOLAN Host table or IP traffic based on address ranges.
IP Filtering on Host Table
This is a security feature that allow you to defined traffic to/from hosts defined
only within the IOLAN Host table.
IP Filtering on Address Ranges
This is a security feature that allows you to define IP address ranges for traffic to/
from the IOLAN. The IOLAN will only accept data from or send data to hosts
configured within these IPv4 address ranges. You can define up to 6 IP traffic to/
from address ranges.
Routes
Entering routes in the routing list enables the identification of gateways to be used for accessing specific
hosts or external networks from the IOLAN's local network.
There are three types of routes:
• Default—A route that provides general access beyond your local network.
• Host—A route defined for accessing a specific host external to your local network.
• Network—A route defined for accessing a specific network external to your local network.
You can specify up to 49 routes on the IOLAN. Two types or gateways (method of accessing specific hosts
or external networks) can be configured.
IP Address When the route Type is defined as Host, this field will contain the IP address of the
host. If the route Type is defined as Network, the network portion of the IP address
must be specified and the Host port of the address will be set to 0. Example: to
access network 10.10.20, the address 10.10.20.0 would be specified in this field.
Format: IPv4 or IPv6 address
IPv4 Subnet Mask When the route is a Network route, you must specify the network’s subnet mask.
IPv6 Prefix Bits If the IP address is IPv6, then you must specify the network’s prefix bits.
Range: 0-128
Host Select this option when a host is being used as the route gateway.
Default: Enabled, None
Interface The Interface list is comprised of configured IPv6 tunnels and serial ports defined
for Remote Access (PPP) and Remote Access (SLIP) profiles. Select this option
when you want to use the specified interface as the gateway to the destination.
Field Option(s): IPv6 tunnels, Remote Access (PPP) and Remote Access (SLIP) serial
ports
Default: Disabled
DNS/WINS
You can configure WINS servers for PPP-client name resolution and DNS servers for PPP-client name reso-
lution and IOLAN host name resolution.
You can configure up to four DNS and four WINS servers. If you specified a DNS and/or WINS server on the
Network, IP Settings tabs (either IPv4 or IPv6), it will be automatically entered into the appropriate list. If
the DNS and/or WINS server is provided by a DHCP server, these will NOT be viewable in the list, however,
you can add DNS and/or WINS servers to supplement the DHCP supplied server.
Editing/Adding DNS/WINS Servers
DNS IP Address You can configure up to four DNS servers.
Field Format: IPv4 or IPv6 address
RIP
The Routing Information Protocol (RIP) is a routing protocol used with almost every TCP/IP implementa-
tion. Its function is to pass routing information from a router or gateway to a neighboring router(s) or
gateway(s). RIP messages contain information about destinations which can be reached and the number
of hops which are required. The hop-count is the basic metric of RIP and so RIP is referred to as a “dis-
tance vector protocol”. RIP messages are carried in UDP datagrams.
You can configure RIP to selectively advertise networks remotely connected via a SLIP/PPP link on the
Ethernet connection, and pass RIP routing information to remotely connected clients. As this can be
undesirable in some environments, this behavior can be configured and is defaulted to the non-routing
behavior.
Transmission and reception of Routing Information Protocol (RIP) packets over PPP and SLIP connections
can be configured on a per user basis or on a per serial port basis.
The Routing parameter can be configured:
• On the Advanced tab for Remote Access (PPP) and Remote Access (SLIP) profiles configured for
a serial port to determine the exchange of RIP packets between the IOLAN and remotely con-
nected users connected from the serial side.
• On the Services tab for each local user to determine the exchange of RIP packets between the
IOLAN and remotely connected users connected from the serial side.
• By the RADIUS server for users authenticated by RADIUS, the RADIUS-defined Framed-Routing
parameter determines the exchange of RIP packets.
Password Specify the password that allows the router tables to be updated.
Confirm Password Retype in the password to verify that you typed in it correctly.
Dynamic DNS
Dynamic DNS Service providers enable users to access a server connected to the internet that has been
assigned a dynamic IP address. The IOLAN product line has built-in support for the DynDNS.com service
provider. Refer to www.DynDNS.com for information on setting up an account.
When the IOLAN is assigned a dynamic IP address, it will inform the DynDNS.com service provider of its
new IP address. Users can then use DynDNS.com as a DNS service to get the IP address of the IOLAN. In
order to take advantage of this service, the following steps need to be taken.
1. Create an account with DynDNS.com and configure the name your IOLAN will be known
by on the internet (the Host name). For example, create a host name such as
yourcompanySCS.DynDNS.org.
2. Enable the Network Dynamic DNS feature and configure the IOLAN’s dynamic DNS
parameters to match the Host’s configuration on the DynDNS.com server. Every
time the IOLAN gets assigned a new IP address, it will update DynDNS.com with the
new IP address.
3. Users accessing the IOLAN via the internet can now access it via its fully qualified
host name. For example, telnet yourcompanySCS.DynDNS.org.
Enable Dynamic DNS Enables/disables the dynamic DNS feature. When Dynamic DNS is enabled, the
for the system IOLAN will automatically update its IP address with DynDNS.org if it changes.
Default: Disabled
Registered Host Specify the registered hostname with DynDNS.org that will be updated with the
Name IOLAN’s IP address should it change. Put in the full name; for example,
mydeviceserver.dyndns.org.
User Name Specify the user name used to access the account set up on the DynDNS.org
server.
Password Specify the password used to access the account set up on the DynDNS.org server.
HTTPS Configuration
Cipher Suite Button Launches the cipher information window so you can specify the type of
encryption that will be used for data that is transferred between the DynDNS.org
server and the IOLAN. You can specify up to five cipher groups.
Validation Criteria
If you choose to configure validation criteria, the information in the peer SSL/TLS
certificate must match exactly the information configured in this window in order to pass peer authenti-
cation and create a valid SSL/TLS connection.
Note: Some combinations of cipher groups may not be available on some firmware versions.
Country A country code; for example, US. This field is case sensitive in order to successfully
match the information in the peer SSL/TLS certificate.
Data Options: 2 characters
State/Province An entry for the state/province; for example, IL. This field is case sensitive in order
to successfully match the information in the peer SSL/TLS certificate.
Data Options: Maximum 128 characters
Locality An entry for the location; for example, Chicago. This field is case sensitive in order
to successfully match the information in the peer SSL/TLS certificate.
Data Options: Maximum 128 characters
Organization An entry for the organization; for example, Accounting. This field is case sensitive
in order to successfully match the information in the peer SSL/TLS certificate.
Data Options: Maximum 64 characters
Organization Unit An entry for the unit in the organization; for example, Payroll. This field is case
sensitive in order to successfully match the information in the peer SSL/TLS
certificate.
Data Options: Maximum 64 characters
Common Name An entry for common name; for example, the host name or fully qualified domain
name. This field is case sensitive in order to successfully match the information in
the peer SSL/TLS certificate.
Data Options: Maximum 64 characters
Mode The method or protocol that is used to create the IPv6 tunnel.
• Manual—When enabled, the IOLAN will manually create the IPv6 tunnel to the
specified Remote Host through the specified Interface.
• 6to4—When enabled, the IOLAN will broadcast to the multi-cast address
192.88.99.1 through the specified Interface. When the closest 6to4 router
responds, it will create the IPv6 tunnel, encapsulating and decapsulating IPv6
traffic sent to and from the IOLAN.
• Teredo—When enabled, the Teredo protocol encapsulates the IPv6 packet as an
IPv4 UDP message, allowing it to pass through most network address translator
(NAT) boxes and create an IPv6 tunnel to the specified Remote Host (a Teredo
server) through the specified Interface.
Default: Manual
Remote Host The IPv4 host that can access the IPv6 network when the Mode is Manual.
The Teredo server when the Mode is Teredo.
Default: None
Interface The interface that the IOLAN is going to use to access the Remote Host. The list is
comprised of the Ethernet interface(s) and serial ports configured for the Remote
Access (PPP) or Remote Access (SLIP) profiles.
Default: Ethernet 1
Serial Interface Specifies the type of serial line that is being used with the IOLAN.
Data Options: EIA-232, EIA-422, EIA-485, USB
Rolled (DTE)/Straight Specifies the type of serial cable that you will need to use when connecting to this
(DCE) RS232 serial port.
Default: Straight
Parity Specifies the type of parity being used for the data communication on the serial
port. If you want to force a parity type, you can specify Mark for 1 or Space for 0.
Data Options: Even, Odd, Mark, Space, None
Default: None
Stop Bits Specifies the number of stop bits that follow a byte.
Data Options: 1, 2
Default: 1
Flow Control Defines whether the data flow is handled by the software (Soft), hardware (Hard),
Both, or None. If you are using SLIP, set to Hard only. If you are using PPP, set to
either Soft or Hard (Hard is recommended). If you select Soft with PPP, you must
set the ACCM parameter when you configure PPP for the Serial Port.
Data Options: Soft, Hard, Both, None
Default: None
Enable RTS-Toggle Configure the Toggle RTS Feature if your application needs for RTS to be raised
during character transmission.
Initial delay: configure the time (in ms) between the time the RTS signal is raised
and the start of character transmission. This delay only applies if this port is not
running hardware flow control. If hardware flow control is used, the transmission
will occur as soon as CTS is raised by the modem.
Final delay: configure the time (in ms) between the time of character
transmission and when RTS is dropped.
Initial delay range: 0-1000 ms
Final delay range: 0-1000 ms
Default: Off
Monitor DCD Specifies whether the EIA-232 signal DCD (Data Carrier Detect) should be
monitored. This is used with modems or any other device that sends a DCD signal.
When it is monitored and the IOLAN detects a DCD signal, the serial port profile is
started. If both Monitor DCD and Monitor DSR are enabled, both signals must be
detected before the serial port profile is started.
Default: Disabled
Discard Characters When enabled, the IOLAN will discard characters received with a parity of framing
Received with Errors error.
Default: Disabled
Enable Echo This parameter applies only to EIA-485 Half Duplex mode. All characters will be
Suppression echoed to the user and transmitted across the serial ports. Some EIA-485
applications require local echo to be enabled in order to monitor the loopback
data to determine that line contention has occurred. If your application cannot
handle loopback data, echo suppression should be enabled.
Default: Disabled
Enable Line Used with EIA-422 and EIA-485 (on IOLAN models that support this option),
Termination specifies whether or not the line is terminated; use this option when the serial
port is connected to a device at the end of the serial network. Line termination
should only be used if the serial port is the end point in a network.
Default: Disabled
Use System Setting By default, the fields are populated with the "global email" parameters. If you
wish to override a field you must uncheck this field.
To An email address or list of email addresses that will receive the email notification.
Subject A text string, which can contain spaces, that will display in the Subject field of the
email notification.
From The field can contain an email address that might identify the IOLAN name or
some other value.
Reply to The email address to whom all replies to the email notification should go.
Packet Forwarding
The Packet Forwarding tab can be used to control/define how and when serial port data packets are sent
from the IOLAN to the network.
Minimize Latency This option ensures that all application data is immediately forwarded to the
serial device and that every character received from the device is immediately
sent on the network. Select this option for timing-sensitive applications.
Default: Enabled
Optimize Network This option provides optimal network usage while ensuring that the application
Throughput performance is not compromised. Select this option when you want to minimize
overall packet count, such as when the connection is over a WAN.
Default: Disabled
Prevent Message This option detects the message, packet, or data blocking characteristics of the
Fragmentation serial data and preserves it throughout the communication. Select this option for
message-based applications or serial devices that are sensitive to inter-character
delays within these messages.
Default: Disabled
Delay Between The minimum time, in milliseconds, between messages that must pass before the
Messages data is forwarded by the IOLAN.
Range: 0-65535
Default: 250 ms
Packet Definition When enabled, this group of parameters allows you to set a variety of packet
definition options. The first criteria that is met causes the packet to be
transmitted. For example, if you set a Force Transmit Timer of 1000 ms and a
Packet Size of 100 bytes, whichever criteria is met first is what will cause the
packet to be transmitted.
Default: Enabled
Packet Size The number of bytes that must be received from the serial port before the packet
is transmitted to the network. A value of zero (0) ignores this parameter.
Range: 0-1024 bytes
Default: 0
Idle Time The amount of time, in milliseconds, that must elapse between characters before
the packet is transmitted to the network. A value of zero (0) ignores this
parameter.
Range: 0-65535 ms
Default: 0
End Trigger1 When enabled, specifies the character that when received will define when the
Character packet is ready for transmission. The actual transmission of the packet is based on
the Trigger Forwarding Rule.
Range: hexadecimal 0-FF
Default: 0
End Trigger2 When enabled, creates a sequence of characters that must be received to specify
Character when the packet is ready for transmission (if the End Trigger1 character is not
immediately followed by the End Trigger2 character, the IOLAN waits for another
End Trigger1 character to start the End Trigger1/End Trigger2 character
sequence). The actual transmission of the packet is based on the Trigger
Forwarding Rule.
Range: hexadecimal 0-FF
Default: 0
Frame Definition When enabled, this group of parameters allows you to control the frame that is
transmitted by defining the start and end of frame character(s). If the internal
buffer (1024 bytes) is full before the EOF character(s) are received, the packet will
be transmitted and the EOF character(s) search will continue.
Default: Disabled
SOF1 Character When enabled, the Start of Frame character defines the first character of the
frame, any character(s) received before the Start of Frame character is ignored.
Range: hexadecimal 0-FF
Default: 0
Transmit SOF When enabled, the SOF1 or SOF1/SOF2 characters will be transmitted with the
Character(s) frame. If not enabled, the SOF1 or SOF1/SOF2 characters will be stripped from the
transmission.
Default: Disabled
EOF1 Character Specifies the End of Frame character, which defines when the frame is ready to be
transmitted. The actual transmission of the frame is based on the Trigger
Forwarding Rule.
Range: hexadecimal 0-FF
Default: 0
EOF2 Character When enabled, creates a sequence of characters that must be received to define
the end of the frame (if the EOF1 character is not immediately followed by the
EOF2 character, the IOLAN waits for another EOF1 character to start the EOF1/
EOF2 character sequence), which defines when the frame is ready to be
transmitted. The actual transmission of the frame is based on the Trigger
Forwarding Rule.
Range: hexadecimal 0-FF
Default: 0
Trigger Forwarding Determines what is included in the Frame (based on the EOF1 or EOF1/EOF2) or
Rule Packet (based on Trigger1 or Trigger1/Trigger2). Choose one of the following
options:
• Strip-Trigger—Strips out the EOF1, EOF1/EOF2, Trigger1, or Trigger1/Trigger2,
depending on your settings.
• Trigger—Includes the EOF1, EOF1/EOF2, Trigger1, or Trigger1/Trigger2,
depending on your settings.
• Trigger+1—Includes the EOF1, EOF1/EOF2, Trigger1, or Trigger1/Trigger2,
depending on your settings, plus the first byte that follows the trigger.
• Trigger+2—Includes the EOF1, EOF1/EOF2, Trigger1, or Trigger1/Trigger2,
depending on your settings, plus the next two bytes received after the trigger.
Default: Trigger
SSL/TLS Settings
You can create an encrypted connection using SSL/TLS for the following profiles: TruePort, TCP Sockets,
Terminal (the user’s Service must be set to SSL_Raw), Serial Tunneling, Virtual Modem, and Modbus. When
you enable this feature, it will automatically use the global SSL/TLS settings (configured on Security, SSL/
TLS), although you can configure unique SSL/TLS settings for the serial port.
When configuring SSL/TLS, the following configuration options are available:
• You can set up the IOLAN to act as an SSL/TLS client or server.
• There is an extensive selection of SSL/TLS ciphers that you can configure for your SSL/TLS
connection; see Valid SSL/TLS Ciphers for a list of SSL/TLS ciphers.
State/Province An entry for the state/province; for example, IL. This field is case sensitive in order
to successfully match the information in the peer SSL/TLS certificate.
Data Options: Maximum 128 characters
Locality An entry for the location; for example, Chicago. This field is case sensitive in order
to successfully match the information in the peer SSL/TLS certificate.
Data Options: Maximum 128 characters
Organization An entry for the organization; for example, Accounting. This field is case sensitive
in order to successfully match the information in the peer SSL/TLS certificate.
Data Options: Maximum 64 characters
Organization Unit An entry for the unit in the organization; for example, Payroll. This field is case
sensitive in order to successfully match the information in the peer SSL/TLS
certificate.
Data Options: Maximum 64 characters
Common Name An entry for common name; for example, the host name or fully qualified domain
name. This field is case sensitive in order to successfully match the information in
the peer SSL/TLS certificate.
Data Options: Maximum 64 characters
Email An entry for an email address; for example, [email protected]. This field is
case sensitive in order to successfully match the information in the peer SSL/TLS
certificate.
Data Options: Maximum 64 characters
Protocol Specify the connection method that users will use to communicate with a serial
device connected to the IOLAN through the network.
Data Options: Telnet, SSH
Default: Telnet
Listen for The port number that the IOLAN will listen on for incoming TCP connections.
connections on TCP Note: if more then one serial port has the same TCP port number assignment, this
Port would create a hunt group scenario, However, all operating parameters for each
serial port configuration need to be the same.
Default: 10001, depending on the serial port number
Enable IP Aliasing Enables/disables the ability to access a serial device connected to the serial port
by an IP address (or host name that can be resolved to the Internet Address in a
DNS network) instead of the IOLAN’s IP address and port number.
Default: Disabled
IP address Users can access serial devices connected to the IOLAN through the network by
the specified Internet Address (or host name that can be resolved to the Internet
Address in a DNS network).
Field Format: IPv4 or IPv6 Address
Authenticate User Enables/disables login/password authentication for users connecting from the
network.
Default: Disabled
Enable TCP Keepalive Enables a per-connection TCP keep-alive feature. After the configured number of
seconds, the connection will send a gratuitous ACK to the network peer, thus
either ensuring the connection stays active OR causing a dropped connection
condition to be recognized.
This parameter needs to be used in conjunction with Monitor Connection Status
Interval parameter found in the Serial, Advanced, Advanced Settings tab. The
interval specifies the inactivity period before "testing" the connection. It should
be noted that if a network connection is accidentally dropped, it can take as long
as the specified interval before anyone can reconnect to the serial port.
Default: Disabled
Enable Microsoft When enabled, a user can access SAC (the interface of the Microsoft Emergency
Special Administer Management Systems utility) through EasyPort Web when the IOLAN’s serial port
Console (SAC) is connected to a Microsoft Server 2003 or Microsoft Server 2008 host.
support Default: Disabled
Multisessions The number of extra network connections available on a serial port, in addition to
the single session that is always available. Enabling multisessions will permit
multiple users to monitor the same console port. The maximum number of
multisessions would be 101 sessions. Each user monitoring the port can be
assigned different privileges to this port.
Default: 0
Session Timeout Use this timer to forcibly close the session/connection when the Session Timeout
expires.
Default: 0 seconds so the port will never timeout
Range: 0-4294967 seconds (about 49 days)
Idle Timer Use this timer to close a connection because of inactivity. When the Idle Timeout
expires, the IOLAN will end the connection.
Range: 0-4294967 seconds (about 49 days)
Default: 0 seconds so the port will never timeout
Session Strings Controls the sending of ASCII strings to serial devices at session start and session
termination as follows;
• Send at Start - If configured, this string will be sent to the serial device on
power-up of the IOLAN, or when a kill line command is issued on this serial
port. If the "monitor DSR" or "monitor DCD" options are set, the string will also
be sent when the monitored signal is raised.
• Range: 0-127 alpha-numeric characters. Non printable ascii characters must be
entered in this format <027>. The decimal numbers within the brackets must
be 3 digits long (example 003 not 3).
• Send at End - If configured, this string will be sent to the serial device when the
TCP session on the LAN is terminated. If multi-host is configured, this string will
only be send in listen mode to the serial device when all multi-host connec-
tions are terminated.
• Range: 0-127 alpha-numeric characters. Non printable ascii characters must be
entered in this format <027>. The decimal numbers within the brackets must
be 3 digits long (example 003 not 3).
• Delay after Send—If configured, a delay time is sent to the device. This delay
can be used to provide the serial device with time to process the string before
the session is initiated.
Range: 0-65535 ms
Default: 10 ms
Dial In If the console port is remote and will be dialing in via modem or ISDN TA, enable
this parameter.
Default: Disabled
Dial out If you want the modem to dial a number when the serial port is started, enable
this parameter.
Default: Disabled
Dial Timeout The number of seconds the IOLAN will wait to establish a connection to a remote
modem.
Range: 1-99
Default: 45 seconds
Modem The name of the predefined modem that is used on this port. If you are using a
IOLAN with a built in modem port then select iolan_modem.
See Adding/Editing a Modem
Connect to Remote When enabled, the IOLAN initiates communication to the TruePort client.
System (Server- Default: Enabled
Initiated Connection)
Host Name The configured host that the IOLAN will connect to (must be running TruePort).
Default: None
TCP Port The TCP Port that the IOLAN will use to communicate through to the TruePort
client.
10001 for serial port 1, then increments by one for each serial port
HTTP Tunnel Specify the HTTP tunnel to be used for this connection.
Connect to Multiple When enabled, the IOLAN will establish a connection to multiple clients (Hosts).
Hosts When using the multiple hosts feature, all TruePort clients must be running in Lite
mode.
Default: Disabled
Define Additional Select this button to define the hosts that this serial port will connect to. This
Hosts Button button is also used to define the Primary/Backup host functionality.
See Host Table for more information.
Listen for Connection When enabled, the IOLAN will wait for connections to be initiated by the TruePort
(Client-Initiated Client.
Connection) Default: Disabled
TCP Port The TCP Port that the IOLAN will use to communicate through to the TruePort
client.
Default: 10001 for serial port 1
Allow Multiple Hosts When this option is enabled, multiple hosts can connect to a serial device that is
to connect connected to this serial port. Note: These multiple clients (Hosts) need to be
running TruePort in Lite mode.
Default: Disabled
Define Additional When this option is enabled, you can define up to 49 hosts that the serial device
hosts to connect to connected to this serial port will attempt communicate to. With this mode of
operation, the IOLAN will connect to multiple hosts simultaneously.
Default: Enabled
See Host Table for more information.
Define a primary When this option is enabled, you need to define a primary host that the serial
host and a backup device connected to this serial port will communicate to and a backup host, in the
host to connection event that the IOLAN loses communication to the primary host. The IOLAN will
first establish a connection to the primary host. Should the connection to the
primary host be lost (or never established), the IOLAN will establish a connection
the backup host. Once connected to the backup, the IOLAN will attempt to re-
establish a connection to the Primary host, once this is successfully done, it
gracefully shuts down the backup connection.
Default: Disabled
Primary Host Specify a preconfigured host that the serial device will communicate to through
the IOLAN.
Default: None
TCP Port Specify the TCP port that the IOLAN will use to communicate to the Primary Host.
Default: 0
Backup Host Specify a preconfigured host that the serial device will communicate to through
the IOLAN if the IOLAN cannot communicate with the Primary Host.
Default: None
Host Specify the preconfigured host that will be in the multi-host list.
Default: None
TCP Port Specify the TCP port that the IOLAN will use to communicate to the Primary Host.
Default: 1000 + serial port number -1
Trueport Advanced Parameters
The TruePort Advanced tab determines how the TruePort connection is initiated and then sets up the
appropriate connection parameters.
Signals high when This option has the following impact based on the state of the TruePort
not under TruePort connection:
client control • TruePort Lite Mode—When enabled, the EIA-232 signals remain active before,
during, and after the TruePort connection is established. When disabled, the
EIA-232 signals remain inactive during and after the Trueport connection is
established.
• TruePort Full Mode—When enabled, the EIA-232 signals remain active before
and after the TruePort connection and the TruePort client will control the state
of the signals during the established TruePort connection. When disabled, the
EIA-232 signals remain inactive before and after the TruePort connection and
the TruePort client will control the state of the signals during the established
TruePort connection.
Default: Enabled
Enable Message the Enables/disables the display of the message of the day.
Day (MOTD) Default: Disabled
Enable TCP Keepalive Enables a per-connection TCP keep-alive feature. After the configured number of
seconds, the connection will send a gratuitous ACK to the network peer, thus
either ensuring the connection stays active OR causing a dropped connection
condition to be recognized.
This parameter needs to be used in conjunction with Monitor Connection Status
Interval parameter found in the Serial, Advanced, Advanced Settings tab. The
interval specifies the inactivity period before "testing" the connection.
Note: If a network connection is accidentally dropped, it can take as long as the
specified interval before anyone can reconnect to the serial port.
Default: Disabled
Idle Timeout Use this timer to close a connection because of inactivity. When the Idle Timeout
expires, the IOLAN will end the connection.
Range: 0-4294967 seconds (about 49 days)
Default: 0 seconds so the port will never timeout
Session Timeout Use this timer to forcibly close the session/connection when the Session Timeout
expires.
Default: 0 seconds so the port will never timeout
Range: 0-4294967 seconds (about 49 days)
Session Strings Controls the sending of ASCII strings to serial device at session start as follows;
• Send at Start—If configured, this string will be sent to the serial device on
power-up of the IOLAN, or when a kill line command is issued on this serial
port. If the "monitor DSR" or "monitor DCD" options are set, the string will also
be sent when the monitored signal is raised.
• Range: 0-127 alpha-numeric characters
• Range: hexadecimal 0-FF
• Delay after Send - If configured, will inset a delay after the string is sent to the
device. This delay can be used to provide the serial device with time to process
the string before the session is initiated.
Range: 0-65535 ms
Default: 10 ms
Dial in If the device is remote and will be dialing in via modem or ISDN TA, enable this
parameter.
Default: Disabled
Dial out If you want the modem to dial a number when the serial port is started, enable
this parameter.
Default: Disabled
Dial Retry The number of times the IOLAN will attempt to re-establish a connection with a
remote modem.
Range: 0-99
Default: 2
Modem The name of the predefined modem that is used on this port. If you are using a
IOLAN SCG with a built in modem then select iolan_modem.
See Adding/Editing a Modem
Listen for Connection When enabled, the IOLAN listens for a connection to be established by the
Workstation/Server on the network.
Default: Enabled
TCP Port The TCP port that the IOLAN will use to listen for incoming connections.
Default: 10000 plus the serial port number, so serial port 5 would have a default
of 10005
HTTP Tunnel Specify the HTTP tunnel to be used for this connection.
Allow Multiple Hosts When this option is enabled, multiple hosts can connect to the serial device that
to Connect is connected to this serial port.
Default: Disabled
Enable IP Aliasing Enables/disables the ability to access a serial device connected to the serial port
by an IP address (or host name that can be resolved to the Internet Address in a
DNS network) instead of the IOLAN’s IP address and port number.
Default: Disabled
IP Address Users can access serial devices connected to the IOLAN through the network by
the specified Internet Address (or host name that can be resolved to the Internet
Address in a DNS network).
Field Format: IPv4 or IPv6 Address
TCP Port The TCP Port that the IOLAN will use to communicate to the client.
Default: 0
Connect to Multiple When enabled, allows a serial device connected to this serial port to
Hosts communicate to multiple hosts.
Default: Disabled
Define Additional Select this button to define the hosts that this serial port will connect to. This
Hosts Button button is also used to define the Primary/Backup host functionality.
Initiate Connection If the serial port hardware parameters have been setup to monitor DSR or DCD,
Automatically the host session will be started once the signals are detected. If no hardware
signals are being monitored, the IOLAN will initiate the session immediately after
being powered up.
Default: Enabled
When any data is Initiates a connection to the specified host when any data is received on the serial
received port.
Default: Disabled
When <hexadecimal Initiates a connection to the specified host only when the specified character is
value> is received received on the serial port.
Default: Disabled
Send Name On When enabled, the port name will be sent to the host upon session
Connect initiation. This will be done before any other data is sent or received to/from the
host
Default: Disabled
Permit Connections When this option is enabled, the connection can be initiated by either the IOLAN
in Both Directions or a host.
Default: Disabled
Define additional When this option is enabled, you can define up to 49 hosts that the serial device
hosts to connect to connected to this serial port will attempt communicate to. With this mode of
operation, the IOLAN will connect to multiple hosts simultaneously.
Default: Enabled
Primary Host Specify a pre-configured host that the serial device will communicate to through
the IOLAN.
Default: None
TCP Port Specify the TCP port that the IOLAN will use to communicate to the Primary Host.
Default: 0
Backup Host Specify a preconfigured host that the serial device will communicate to through
the IOLAN if the IOLAN cannot communicate with the Primary Host.
Default: None
TCP Port Specify the TCP port that the IOLAN will use to communicate to the Backup Host.
Default: 10000
TCP Port Specify the TCP port that the IOLAN will use to communicate to the Host.
Default: 0
Authenticate User Enables/disables login/password authentication for users connecting from the
network.
Default: Disabled
Enable TCP Keepalive Enables a per-connection TCP keep-alive feature. After the configured number of
seconds, the connection will send a gratuitous ACK to the network peer, thus
either ensuring the connection stays active OR causing a dropped connection
condition to be recognized.
This parameter needs to be used in conjunction with Monitor Connection Status
Interval parameter found in the Serial, Advanced, Advanced Settings tab. The
interval specifies the inactivity period before "testing" the connection.
Default: Disabled
Enable Data Logging When enabled, serial data will be buffered if the TCP connection is lost. When
Logging the TCP connection is re-established, the buffered serial data will be sent
to its destination. If using the Trueport profile, data logging is only supported in
Lite Mode.
The minimum data buffer size for all models is 1 KB. The maximum data buffer
size is 2000 KB for DS1/TS2/STS8D, all other models are 4000 KB.
If the data buffer is filled, incoming serial data will overwrite the oldest data.
Values: 1-2000 KB (DS1/TS2/STS8D) - Default 4 KB
Values: 1-4000 KB (all other models) - Default 256 KB
Default: Disabled
Note: A kill line or a reboot of the IOLAN causes all buffered data to be lost
Some profile features are not compatible with the data logging feature. See Data
Logging Feature
Idle Timeout Use this timer to close a connection because of inactivity. When the Idle Timeout
expires, the IOLAN will end the connection.
Range: 0-4294967 seconds (about 49 days)
Default: 0 seconds so the port will never timeout
Session Timeout Use this timer to forcibly close the session/connection when the Session Timeout
expires.
Default: 0 seconds so the port will never timeout
Range: 0-4294967 seconds (about 49 days)
Session Strings Controls the sending of ASCII strings to serial devices at session start and session
termination as follows;
• Send at Start - If configured, this string will be sent to the serial device on
power-up of the IOLAN, or when a kill line command is issued on this serial
port. If the "monitor DSR" or "monitor DCD" options are set, the string will also
be sent when the monitored signal is raised.
• Range: 0-127 alpha-numeric characters. Non printable ascii characters must be
entered in this format <027>. The decimal numbers within the brackets must be
3 digits long (example 003 not 3).
• Send at End - If configured, this string will be sent to the serial device when the
TCP session on the LAN is terminated. If multi-host is configured, this string will
only be send in listen mode to the serial device when all multi-host connections
are terminated.
• Range: 0-127 alpha-numeric characters. Non printable ascii characters must be
entered in this format <027>. The decimal numbers within the brackets must be
3 digits long (example 003 not 3).
• Delay after Send—If configured, a delay time is sent to the device. This delay
can be used to provide the serial device with time to process the string before
the session is initiated.
Range: 0-65535 ms
Default: 10 ms
Dial out If you want the modem to dial a number when the serial port is started, enable
this parameter.
Default: Disabled
Dial Timeout The number of seconds the IOLAN will wait to establish a connection to a remote
modem.
Range: 1-99
Default: 45 seconds
Dial Retry The number of times the IOLAN will attempt to re-establish a connection with a
remote modem.
Range: 0-99
Default: 2
Modem The name of the predefined modem that is used on this port. If you are using a
IOLAN SCG with a built in modem then select iolan_modem.
See Adding/Editing a Modem
Four individual entries are provided to allow you greater flexibility to specify how data will be forwarded
to/from the serial device. All four entries support the same configuration parameters. You can configure
one or more of the entries as needed.
The first thing you need to configure for an entry is the “Direction” of the data flow. The following options
are available;
• Disabled - UDP service not enabled.
• LAN to Serial - This setting will allow UDP data to be received from one or more hosts on the
LAN and forwarded to the serial device attached to this serial port.
• Serial to LAN - This setting will allow data originating from the serial device attached to this
serial port to be sent to one or more hosts on the LAN using UDP datagrams.
• Both - Allows for data to flow from the serial device to the LAN and from the LAN to the serial
device.
The role of each of the configurable parameters in an entry depends on the “Direction” selected.
When the direction is "LAN to Serial" the role of the additional parameters is as follow;
• Start IP Address - This is the IP address of the host from which the UDP data will originate. If
the data will originate from a number of hosts, this becomes the starting IP address of a range.
• End IP Address - If you wish to receive data only from the single host defined by "Start IP
address", leave this entry as is (0.0.0.0). If you wish to accept data from a number of hosts, this
address will represent the upper end of a range starting from "Start IP address". Only data
originating from this range will be forwarded to the serial port.
• UDP port - This is the UPD port from which the data will originate. There are three options for
this parameter.
• Auto Learn - The first UDP message received will be used to define which UDP port we are
going to accept UDP data from. Once learned, only data from this UDP port will be accepted.
The data must also originate from a host which is in the IP range defined for this entry.
• Any Port - Any UDP port will be accepted as long as the data originates from a host in the IP
range defined for this entry.
The UDP configuration window, taken from the DeviceManager, is configured to:
UDP Entry 1
All UDP data received from hosts that have an IP address that falls within the range of 172.16.1.25 to
172.16.1.50 and source UDP Port of 33010 will be sent to the serial device. The IOLAN will not send any
data received on its serial port to the host range defined by this entry.
UDP Entry 2
All hosts that have an IP Address that falls within the range of 172.16.1.75 to 172.16.1.80 and who lis-
ten to UDP Port 33009 will receive UDP data from the serial device. No UDP data originating from the
hosts defined by this entry will be forwarded to the serial device.
UDP Entry 3
All hosts that have an IP address that falls within the range of 172.16.1.1 to 172.16.1.20 and listen to
Port 33001 will be sent the data from the serial device in UDP format. The serial device will only receive
UDP data from the hosts in that range with a source UDP Port of 33001. The IOLAN will listen for data on
the port value configured in the Listen for connections on UDP port parameter. (10001 in above example)
UDP Entry 4
This entry is disabled since Direction is set to Disabled.
UDP Sockets General Parameters
Listen for The IOLAN will listen for UDP packets on the specified port.
connections on UDP Default: 1000+<port-number> (for example, 10001 for serial port 1)
Port
Start IP address The first host IP address in the range of IP addresses (for IPv4 or IPv6) that the
IOLAN will listen for messages from and/or send messages to.
Field Format: IPv4 or IPv6 address
End IP address The last host IP address in the range of IP addresses (for IPv4, not supported for
IPv6) that the IOLAN will listen for messages from and/or send messages to.
Field Format: IPv4 address
UDP Port Determines how the IOLAN’s UDP port that will send/receive UDP messages is
defined:
• Auto Learn—The IOLAN will only listen to the first port that it receives a UDP
packet from. Applicable when Direction is set to LAN to Serial or Both.
• Any Port—The IOLAN will receive messages from any port sending UDP pack-
ets. Applicable when Direction is set to LAN to Serial.
• Port—The port that the IOLAN will use to relay messages to servers/hosts. This
option works with any Direction except Disabled. The IOLAN will listen for UDP
packets on the port configured by the Listen for connections on UDP port param-
eter.
Default: Auto Learn
HTTP Tunnel Specify the HTTP tunnel to be used for this connection.
Require Login When users access the IOLAN through the serial port, they must be authenticated,
using either the local user database or an external authentication server.
Default: Enabled
User Service Settings After a user has been successfully authenticated, the IOLAN will connect to the
Button specified host using the specified protocol according to:
• the User Service parameter for locally configured users
• the Default User Service parameter for users who are externally authenticated
TACACS+/RADIUS for externally authenticated users where the target host is
passed to the IOLAN
See User Services Parameters
Connect to remote When the serial port is started, the IOLAN will initiate a connection to the
system specified host using the specified protocol. With this option, user authentication
will not be performed by the IOLAN.
Default: Disabled
Settings Button Select this button to define the settings for the protocol that will be used to
connect the user to the specified host.
Host Name The name (resolvable via DNS) or IP address of the configured host the IOLAN will
connect to.
TCP Port The TCP Port that the IOLAN will use to connect to the host.
Default: Telnet-23, SSH-22, Rlogin-513
Automatically If the serial port hardware parameters have been setup to monitor DSR or DCD,
the host session will be started once the signals are detected. If no hardware
signals are being monitored, the IOLAN will initiate the session immediately after
being powered up.
Default: Enabled
When any data is Initiates a connection to the specified host when any data is received on the serial
received port.
Default: Disabled
When <hexadecimal Initiates a connection to the specified host only when the specified character is
value> is received received on the serial port.
Default: Disabled
Reset Terminal on When enabled, resets the terminal definition connected to the serial port when a
disconnect user logs out.
Default: Disabled
Allow Port Locking When enabled, the user can lock his terminal with a password using the Hotkey
Prefix (default Ctrl-a) ^a l (lowercase L). The IOLAN prompts the user for a
password and a confirmation.
Default: Disabled
Idle Timeout Use this timer to close a connection because of inactivity. When the Idle Timeout
expires, the IOLAN will end the connection.
Range: 0-4294967 seconds (about 49 days)
Default: 0 seconds so the port will never timeout
Session Timeout Use this timer to forcibly close the session/connection when the Session Timeout
expires.
Default: 0 seconds so the port will never timeout
Range: 0-4294967 seconds (about 49 days)
Session Strings Controls the sending of ASCII strings to serial device at session start as follows;
Send at Start—If configured, this string will be sent to the serial device on power-
up of the IOLAN, or when a kill line command is issued on this serial port. If the
"monitor DSR" or "monitor DCD" options are set, the string will also be sent when
the monitored signal is raised.
Range: 0-127 alpha-numeric characters
Range: hexadecimal 0-FF
Delay after Send - If configured, will inset a delay after the string is sent to the
device. This delay can be used to provide the serial device with time to process the
string before the session is initiated.
Range: 0-65535 ms
Default: 10 ms
Dial Timeout The number of seconds the IOLAN will wait to establish a connection to a remote
modem.
Range: 1-99
Default: 45 seconds
Dial Retry The number of times the IOLAN will attempt to re-establish a connection with a
remote modem.
Range: 0-99
Default: 2
Dial In If the device is remote and will be dialing in via modem or ISDN TA, enable this
parameter.
Default: Disabled
Modem The name of the predefined modem that is used on this line. If you are using a
IOLAN SCG with a built in modem then select iolan_modem.
See Adding/Editing a Modem
Limit Connection to Makes the serial port dedicated to the specified user. The user won’t need to enter
User their login name - just their password.
Initial Mode Specifies the initial interface a user navigates when logging into the serial port.
Data Options: Command Line
Default: Command Line
Telnet Settings
The Telnet settings apply when the User Service is set to Telnet or the Terminal profile specifies a Telnet
connection to a host.
Terminal Type Type of terminal attached to this serial port; for example, ANSI or WYSE60.
Local Echo Toggles between local echo of entered characters and suppressing local echo.
Local echo is used for normal processing, while suppressing the echo is
convenient for entering text that should not be displayed on the screen, such as
passwords. This parameter can be used only when Enable Line Mode is enabled.
Default: Disabled
Enable Line Mode When enabled, keyboard input is not sent to the remote host until Enter is
pressed, otherwise input is sent every time a key is pressed.
Default: Disabled
Map CR to CRLF When enabled, maps carriage returns (CR) to carriage return line feed (CRLF).
Default: Disabled
Quit Defines the quit character. Typing the quit character closes and exits the current
telnet session. This value is in hexadecimal.
Default: 1c (ASCII value FS)
EOF Defines the end-of-file character. When Enable Line Mode is enabled, entering the
EOF character as the first character on a line sends the character to the remote
host. This value is in hexadecimal.
Default: 4 (ASCII value ^D)
Erase Defines the erase character. When Line Mode is Off, typing the erase character
erases one character. This value is in hexadecimal.
Default: 8 (ASCII value ^H)
Echo Defines the echo character. When Line Mode is On, typing the echo character
echoes the text locally and sends only completed lines to the host. This value is in
hexadecimal.
Default: 5 (ASCII value ^E)
Escape Defines the escape character. Returns you to the command line mode. This value
is in hexadecimal.
Default: 1d (ASCII value GS)
Rlogin Settings
The Rlogin settings apply when the User Service is set to Rlogin or the Terminal profile has Require Login
selected and specifies an Rlogin connection to a host.
Configure the following parameters:
Terminal Type Type of terminal attached to this serial port; for example, ANSI or WYSE60.
When Connect to remote system is selected, the Rlogin window requires the name of the user who is con-
necting to the host.
Terminal Type Type of terminal attached to this serial port; for example, ANSI or WYSE60.
User This name is passed on to the specified host for the Rlogin session, so that the
user is only prompted for a password.
SSH Setting
The SSH settings apply when the User Service is set to SSH or the Terminal profile specifies an SSH con-
nection to a host.
Note: Some combinations of cipher groups are not available on FIPS firmware versions.
SSH-1 protocol is not available on FIPS firmware versions.
Terminal Type Type of terminal attached to this serial port; for example, ANSI or WYSE60.
Enable Compression When enabled, requests compression of all data. Compression is desirable on
modem lines and other slow connections, but will only slow down things on fast
networks.
Default: Disabled
Strict Host Key When enabled, a host public key (for each host you wish to ssh to) must be
Checking downloaded into the IOLAN.
Default: Enabled
Auto Login When enabled, creates an automatic SSH login, using the Name and Password
values.
Default: Disabled
Name The name of the user logging into the SSH session.
Field Format: Up to 20 alphanumeric characters, excluding spaces
SSH1 Cipher Select the encryption method (cipher) that you want to use for your SSH version 1
connection:
Data Options:
• 3DES
• Blowfish
Default: 3DES
SSH2 When enabled, selects an SSH version 2 connection. If both SSH 1 and SSH 2 are
selected, the IOLAN will attempt to make an SSH 2 connection first. If that
connection fails, it will attempt to connect to the specified host using SSH 1.
Default: Enabled
SSH2 Cipher Opt1-5 When the order of negotiation for the encryption method (ciphers) that the
IOLAN will use for the SSH version 2 connection:
Data Options:
• 3DES
• Blowfish
• AES-CBC
• AES-CTR
• AES-GCM
• Arcfour
• CAST
• ChaCha20-Poly1305
DSA When enabled, an authentication method used by SSH version 2. Use DSA
authentication for the SSH session.
Default: Enabled
SLIP Settings
The SLIP settings apply when the User Service is set to SLIP.
Local IP Address The IPv4 address of the IOLAN end of the SLIP link. For routing to work you must
enter an IP address in this field. Choose an address that is part of the same
network or subnetwork as the remote end; for example, if the remote end is
address 192.101.34.146, your local IP address can be 192.101.34.145. Do not use
the IOLAN’s (main) IP address in this field; if you do so, routing will not take place
correctly.
Remote IP Address The IPv4 address of the remote end of the SLIP link. Choose an address that is part
of the same network or subnetwork as the IOLAN. If your user is authenticated by
the IOLAN, this remote IP address will be overridden if you have set a Framed IP
Address for the user. If your user is authenticated by RADIUS and the RADIUS
parameter Framed-Address is set in the RADIUS file, the IOLAN will use the value
in the RADIUS file in preference to the value configured here.
Subnet Mask Te network subnet mask. For example, 255.255.0.0. If your user is authenticated
by RADIUS and the RADIUS parameter Framed-Netmask is set in the RADIUS file,
the IOLAN will use the value in the RADIUS file in preference to the value
configured here.
MTU The Maximum Transmission Unit (MTU) parameter restricts the size of individual
SLIP packets being sent by the IOLAN. Enter a value between 256 and 1006 bytes;
for example, 512. The default value is 256. If your user is authenticated by the
IOLAN, this MTU value will be overridden when you have set a Framed MTU value
for the user. If your user is authenticated by RADIUS and the RADIUS parameter
Framed-MTU is set in the RADIUS file, the IOLAN will use the value in the RADIUS
file in preference to the value configured here.
Default: 256
VJ Compression When enabled, Van Jacobson compression is used on this link. When enabled, C-
SLIP, or compressed SLIP, is used. When disabled, plain SLIP is used. C-SLIP greatly
improves the performance of interactive traffic, such as Telnet or Rlogin.
If your user is authenticated by the IOLAN, this VJ compression value will be
overridden if you have set a Framed Compression value for a user. If your user is
authenticated by RADIUS and the RADIUS parameter Framed-Compression is set in
the RADIUS file, the IOLAN will use the value in the RADIUS file in preference to
the value configured here.
Default: Enabled
PPP Settings
The PPP settings apply when the User Service is set to PPP.
IPv4 Local IP Address The IPV4 IP address of the IOLAN end of the PPP link. For routing to work, you
must enter a local IP address. Choose an address that is part of the same network
or subnetwork as the remote end; for example, if the remote end is address
192.101.34.146, your local IP address can be 192.101.34.145. Do not use the
IOLAN’s (main) IP address in this field; if you do so, routing will not take place
correctly.
IPv4 Remote IP The IPV4 IP address of the remote end of the PPP link. Choose an address that is
Address part of the same network or subnetwork as the IOLAN. If you set the PPP
parameter IP Address Negotiation to On, the IOLAN will ignore the remote IP
address value you enter here and will allow the remote end to specify its IP
address. If your user is authenticated by RADIUS and the RADIUS parameter
Framed-Address is set in the RADIUS file, the IOLAN will use the value in the
RADIUS file in preference to the value configured here. The exception to this rule
is a Framed-Address value in the RADIUS file of 255.255.255.254; this value allows
the IOLAN to use the remote IP address value configured here.
IPv4 Subnet Mask The network subnet mask. For example, 255.255.0.0. If your user is
authenticated by RADIUS and the RADIUS parameter Framed-Netmask is set in the
RADIUS file, the IOLAN will use the value in the RADIUS file in preference to the
value configured here.
IPv6 Remote The remote IPv6 interface identifier of the remote end of the PPP link. Choose an
Interface Identifier address that is part of the same network or subnetwork as the IOLAN. If you
enable Negotiate IP Address Automatically, the IOLAN will ignore the remote IP
address value you enter here and will allow the remote end to specify its IP
address. If your user is authenticated by RADIUS and the RADIUS parameter
Framed-Interface-ID is set in the RADIUS file, the IOLAN will use the value in the
RADIUS file in preference to the value configured here.
Field Format: The first 64 bits of the Interface Identifier must be zero, therefore,
::abcd:abcd:abcd:abcd is the expected format.
ACCM Specify the ACCM (Asynchronous Control Character Map) characters that should
be escaped from the data stream.
Field Format: This is entered as a 32-bit hexadecimal number with each bit
specifying whether or not the corresponding character should be escaped. The
bits are specified as the most significant bit first and are numbered 31-0. Thus if
bit 17 is set, the 17th character should be escaped, that is, 0x11 (XON). The value
000a0000 will cause the control characters 0x11 (XON) and 0x13 (XOFF) to be
escaped on the link, thus allowing the use of XON/XOFF (software) flow control. If
you have selected Soft Flow Control on the Serial Port, you must enter a value of at
least 000a0000 for the ACCM.
Default: 00000000, which means no characters will be escaped
MRU The Maximum Receive Unit (MRU) parameter specifies the maximum size of PPP
packets that the IOLAN’s port will accept. If your user is authenticated by the
IOLAN, the MRU value will be overridden if you have set a MTU value for the user.
If your user is authenticated by RADIUS and the RADIUS parameter Framed-MTU is
set in the RADIUS file, the IOLAN will use the value in the RADIUS file in
preference to the value configured here.
Range: 64-1500 bytes
Default: 1500
User Complete this field only if you have specified PAP or CHAP (security protocols) in
the Authentication field, and
• you wish to dedicate this line to a single remote user, who will be authenticated
by the IOLAN, or
• you are using the IOLAN as a router (back-to-back with another IOLAN).
When Connect is set to Dial Out or both Dial In/Dial Out are enabled, the User is the
name the remote device will use to authenticate a port on this IOLAN. The remote
device will only authenticate your IOLAN’s port when PAP or CHAP are operating.
You can enter a maximum of sixteen alphanumeric characters; for example,
tracy201. When connecting together two networks, enter a dummy user name;
for example, DS_HQ.
Note If you want a reasonable level of security, the user name and password
should not be similar to a user name or password used regularly to login to the
IOLAN. External authentication can not be used for this user.
Field Format: You can enter a maximum of 254 alphanumeric characters
Password Complete this field only if you have specified PAP or CHAP (security protocols) in
the Security field and:
• you wish to dedicate this serial port to a single remote user, who will be authen-
ticated by the IOLAN, or
• you are using the IOLAN as a router (back-to-back with another IOLAN)
Password means the following:
• When PAP is specified, this is the password the remote device will use to
authenticate the port on this IOLAN.
• When CHAP is specified, this is the secret (password) known to both ends of the
link upon which responses to challenges shall be based.
Field Format: You can enter a maximum of 16 alphanumeric characters.
Remote Password Complete this field only if you have specified PAP or CHAP (security protocols) in
the Security field, and
• you wish to dedicate this serial port to a single remote user, and this user will be
authenticated by the IOLAN, or
• you are using the IOLAN as a router (back-to-back with another IOLAN)
Remote password means the following:
• When PAP is specified, this is the password the IOLAN will use to authenticate
the remote device.
• When CHAP is specified, this is the secret (password) known to both ends of the
link upon which responses to challenges will be based.
Remote Password is the opposite of the parameter Password. Your IOLAN will only
authenticate the remote device when PAP or CHAP is operating.
Field Format: You can enter a maximum of 16 alphanumeric characters.
Routing Determines the routing mode (RIP, Routing Information Protocol) used on the PPP
interface.This is the same function as the Framed-Routing attribute for RADIUS
authenticated users.
Data Options:
• None—Disables RIP over the PPP interface.
• Send—Sends RIP over the PPP interface.
• Listen—Listens for RIP over the PPP interface.
• Send and Listen—Sends RIP and listens for RIP over the PPP interface.
Default: None
Configure Req. The maximum time, in seconds, that LCP (Link Control Protocol) will wait before it
Timeout considers a configure request packet to have been lost.
Range: 1-255
Default: 3 seconds
Configure Req. The maximum number of times a configure request packet will be re-sent
Retries before the link is terminated.
Range: 0-255
Default: 10 seconds
Terminate Req. The maximum number of times a terminate request packet will be re-sent
Retries before the link is terminated.
Range: 0-255
Default: 2 seconds
Configure NAK The maximum number of times a configure NAK packet will be re-sent before the
Retries link is terminated.
Range: 0-255
Default: 10 seconds
Authentication The timeout, in minutes, during which successful PAP or CHAP authentication
Timeout must take place (when PAP or CHAP are specified). If the timer expires before the
remote end has been authenticated successfully, the link will be terminated.
Range: 1-255
Default: 1 minute
Roaming Callback A user can enter a telephone number that the IOLAN will use to callback him/her.
This feature is particularly useful for a mobile user. Roaming callback can only
work when the User Enable Callback parameter is enabled. Enable Roaming
Callback therefore overrides (fixed) User Enable Callback.To use Enable Roaming
Callback, the remote end must be a Microsoft Windows OS that supports
Microsoft’s Callback Control Protocol (CBCP). The user is allowed 30 seconds to
enter a telephone number after which the IOLAN ends the call.
Default: Disabled
Challenge Interval The interval, in minutes, for which the IOLAN will issue a CHAP re-challenge to the
remote end. During CHAP authentication, an initial CHAP challenge takes place,
and is unrelated to CHAP re-challenges. The initial challenge takes place even if re-
challenges are disabled. Some PPP client software does not work with CHAP re-
challenges, so you might want to leave the parameter disabled in the IOLAN.
Range: 0-255
Default: 0 (zero), meaning CHAP re-challenge is disabled
Address/Control This determines whether compression of the PPP Address and Control fields take
Compression place on the link. For most applications this should be enabled.
Default: Enabled
Protocol This determines whether compression of the PPP Protocol field takes place on this
Compression link.
Default: Enabled
Magic Negotiation Determines if a line is looping back. If enabled (On), random numbers are sent on
the link. The random numbers should be different, unless the link loops back.
Default: Disabled
IP Address Specifies whether or not IP address negotiation will take place. IP address
Negotiation negotiation is where the IOLAN allows the remote end to specify its IP address.
When On, the IP address specified by the remote end will be used in preference to
the Remote IP Address set for a Serial Port. When Off, the Remote IP Address set
for the Serial Port will be used.
Default: Disabled
Dynamic DNS Button Launches the Dynamic DNS window when IP Address Negotiation is enabled,
which can then update the DNS server with the IP address that is negotiated and
accepted for the PPP session.
Printer Parameters
MAP CR to CR/LF Defines the default end-of-line terminator as CR/LF (ASCII carriage-return line-
feed) when enabled.
Default: Disabled
Serial Serial
perle
perle
Network
Server Client
Tunnel IOLAN IOLAN Tunnel
The Server Tunnel will also support Telnet Com Port Control protocol as detailed in RFC 2217.
Serial
perle
Network
perle
Server
Tunnel IOLAN Running
2217 Application
The IOLAN serial port signals will also follow the signals on the other serial port. If one serial port receives
DSR then it will raise DTR on the other serial port. If one serial port receives CTS then it will raise RTS on
the other serial port. The CD signal is ignored.
Serial Tunneling General Parameters
Act as Tunnel Server The IOLAN will listen for an incoming connection request on the specified Internet
Address on the specified TCP Port.
Default: Enabled
Listen for connection The TCP port that the IOLAN will listen for incoming connection on.
on TCP Port Default: 10000+serial port number; so serial port 5 is 10005.
Act as Tunnel Client The IOLAN will initiate the connection the Tunnel Server.
Default: Disabled
Establish connection A preconfigured host name that is associated with the IP address of the Tunnel
to Host Name Server.
HTTP Tunnel Specify the HHTP tunnel to be used for this connection.
Enable TCP Keepalive Enables a per-connection TCP keep-alive feature. After the configured number of
seconds, the connection will send a gratuitous ACK to the network peer, thus
either ensuring the connection stays active OR causing a dropped connection
condition to be recognized.
This parameter needs to be used in conjunction with Monitor Connection Status
Interval parameter found in the Serial, Advanced, Advanced Settings tab. The
interval specifies the inactivity period before "testing" the connection.
Default: Disabled
Break Length When the IOLAN receives a command from its peer to issue a break signal, this
parameters defines the length of time the break condition will be asserted on the
serial port
Default: 1000ms (1 second)
Delay After Break This parameter defines the delay between the termination of a a break condition
and the time data will be sent out the serial port.
Default: 0ms (no delay).
Session Strings Controls the sending of ASCII strings to serial devices at session start and session
termination as follows;
• Send at Start—If configured, this string will be sent to the serial device on
power-up of the IOLAN or when a kill line command is issued on this serial port.
If the "monitor DSR" or "monitor DCD" options are set, the string will also be
sent when the monitored signal is raised.
• Range: 0-127 alpha-numeric characters
• Range: hexadecimal 0-FF
• Send at End—If configured, this string will be sent to the serial device when the
TCP session on the LAN is terminated. If multi-host is configured, this string will
only be send in listen mode to the serial device when all multi-host connections
are terminated.
• Range: 0-127 alpha-numeric characters
• Range: hexadecimal 0-FF
• Delay after Send—If configured, will inset a delay after the string is sent to the
device. This delay can be used to provide the serial device with time to process
the string before the session is initiated or terminated.
Default: 10 ms
Listen on TCP Port The IOLAN TCP port that the IOLAN will listen on.
Default: 10000 + serial port number (for example, serial port 12 defaults to
10012)
Connect When enabled, automatically establishes the virtual modem connection when the
Automatically At serial port becomes active.
Startup Default: Enabled
TCP Port The port number the target host is listening on for messages.
Default: 0 (zero)
HTTP Tunnel Specify the HTTP tunnel to be used for this connection.
Connect Manually When enabled, the virtual modem requires an AT command before it establishes a
Via AT Command connection. Specify this option when your modem application sends a phone
number or other AT command to a modem. The serial device can supply an IP
address directly or it can provide a phone number that will be translated into an
IP address by the IOLAN using the mapping table.
Default: Disabled
Verbose Strings When enabled, the connection status is sent by text strings to the connected
device.
Default: Disabled
Success String String that is sent to the serial device when a connection succeeds.
Default: CONNECT <speed>, for example, CONNECT 9600
Failure String String that is sent to the serial device when a connection fails.
Default: NO CARRIER
Numeric Codes When enabled, the connection status is sent to the connected device using the
following numeric codes:
• 0 OK
• 1 CONNECTED
• 2 RING
• 3 NO CARRIER
• 4 ERROR
• 6 INTERFACE DOWN
• 7 CONNECTION REFUSED
• 8 NO LISTENER
Default: Enabled
DTR Signal Always Specify this option to make the DTR signal always act as a DTR signal.
On Default: Enabled
DTR Signal Acts as Specify this option to make the DTR signal always act as a DCD signal.
DCD Default: Disabled
DTR Signal Acts as RI Specify this option to make the DTR signal always act as a RI signal.
Default: Disabled
RTS Signal Always On Specify this option to make the RTS signal always act as a RTS signal.
Default: Enabled
RTS Signal Acts as RI Specify this option to make the RTS signal always act as a RI signal.
Default: Disabled
DCD Signal Always When you configure the DTR or RTS signal pin to act as a DCD signal, enable this
On option to make the DCD signal always stay on.
Default: Enabled
DCD Signal On when When you configure the DTR or RTS signal pin to act as a DCD signal, enable this
host connection option to make the DCD signal active only during active communication.
established Default: Disabled
Additional modem You can specify additional virtual modem commands that will affect how virtual
initialization modem starts. The following commands are supported: ATQn, ATVn, ATEn,
+++ATH, ATA, ATI0, ATI3, ATS0, AT&Z1, AT&Sn, AT&Rn, AT&Cn, AT&F, ATS2, ATS12,
ATO (ATD with no phone number), and ATDS1.
Enable Message of When enabled, displays the Message of the Day (MOTD) when a successful virtual
the Day (MOTD) modem connection is made.
Default: Disabled
Enable TCP Keepalive Enables a per-connection TCP keepalive feature. After the configured number of
seconds, the connection will send a gratuitous ACK to the network peer, thus
either ensuring the connection stays active OR causing a dropped connection
condition to be recognized.
This parameter needs to be used in conjunction with Monitor Connection Status
Interval parameter found in the Serial, Advanced, Advanced Settings tab. The
interval specifies the inactivity period before "testing" the connection.
Default: Disabled
Session Strings Controls the sending of ASCII strings to serial devices at session start as follows;
• Send at Start—If configured, this string will be sent to the serial device on
power-up of the IOLAN or when a kill line command is issued on this serial port.
If the “monitor DSR” or “monitor DCD” options are set, the string will also be
sent when the monitored signal is raised.
• Range: 0-127 alpha-numeric characters
• Range: hex 0-FF
• Delay after Send—If configured, will inset a delay after the string is sent to the
device. This delay can be used to provide the serial device with time to process
the string before the session is initiated or terminated.
Default: 10 ms
Phone Number Specify the phone number your modem application sends to the modem. Note:
The IOLAN does not validate the phone number, so it must be entered in the exact
way the application will send it. For example, if you enter 555-1212 in this table
and the application sends 5551212, the IOLAN will not match the two numbers.
Spaces will be ignored.
Host IP Address Specify the IP address of the IOLAN that is receiving the virtual modem
connection.
Field Format: IPv4 or IPv6 address
Host Name Specify the host name (from the host table) of the IOLAN that is receiving the
virtual modem connection.
See Host Table or more information.
TCP Port Specify the TCP Port on the IOLAN that is set to receive the virtual modem
connection.
Default: 0
HTTP Tunnel Specify the HTTP tunnel to be used for this connection.
Modbus Specify how the Modbus Gateway is defined on the serial port.
Data Options:
• Modbus Master—Typically, the Modbus Master is connected to the Serial Port
and is communicating to Modbus Slaves on the network.
• Modbus Slave—Typically, the Modbus Master is accessing the IOLAN through
the network to communicated to Modbus Slaves connected to the IOLAN’s
Serial Ports.
Default: Modbus Master Gateway
Destination Slave IP Select this button to launch the Destination Slave IP Settings window, where you
Mappings Button can configure the TCP/Ethernet Modbus Slaves that the Modbus Master on the
Serial Port will communicate with.
Advanced Slave Select this button to configure global Modbus Slave settings.
Settings Button
UID Range You can specify a range of UIDs (1-247), in addition to individual UIDs.
Field Format: Comma delimited; for example, 2-35, 50, 100-103
IP Address Set the IP address to be used for this serial port when using IP Aliasing feature.
Modbus/ASCII Select this option when Modbus/ASCII protocol is being used for communication
between the Modbus Master and Slave.
Default: Disabled
Append CR/LF When Modbus/ASCII is selected, adds a CR/LF to the end of the transmission; most
Modbus devices require this option.
Default: Enabled
Enable Modbus When enabled, an exception message is generated and sent to the initiating
Exceptions Modbus device when any of the following conditions are encountered: there is an
invalid UID, the UID is not configured in the Gateway, there is no free network
connection, there is an invalid message, or the target device is not answering the
connection attempt.
Default: Enabled
Character Timeout Used in conjunction with the Modbus RTU protocol, specifies how long to wait, in
milliseconds, after a character to determine the end of frame.
Range: 10-10000
Default: 30 ms
Message Timeout Time to wait, in milliseconds, for a response message from a Modbus TCP or serial
slave (depending if the Modbus Gateway is a Master Gateway or Slave Gateway,
respectively) before sending a Modbus exception.
Range: 10-10000
Default: 1000 ms
Session Strings Controls the sending of ASCII strings to serial devices at session start as follows;
• Send at Start—If configured, this string will be sent to the serial device on
power-up of the IOLAN or when a kill line command is issued on this serial port.
If the “monitor DSR” or “monitor DCD” options are set, the string will also be
sent when the monitored signal is raised.
• Range: 0-127 alpha-numeric characters
• Range: hex 0-FF
• Delay after Send—If configured, will inset a delay after the string is sent to the
device. This delay can be used to provide the serial device with time to process
the string before the session is initiated or terminated.
Default: 10 ms
UID End When Destination is set to Host and you have sequential Modbus Slave IP
addresses (for example, 10.10.10.1, 10.10.10.2, 10.10.10.3, etc.), you can specify a
UID range (not supported with IPv6 addresses) and the IOLAN will automatically
increment the last digit of the configured IP address. Therefore, you can specify a
UID range of 1-100, and the IOLAN will route Master Modbus messages to all
Modbus Slaves with IP addresses of 10.10.10.1 - 10.10.10.100.
Range: 1-247
Default: 0 (zero)
End IP Address Displays the ending IP address of the TCP/Ethernet Modbus Slaves, based on the
Start IP address and the UID range (not supported for IPv6 addresses).
Field Format: IPv4 address
HTTP Tunnel Specify the HTTP tunnel to be used for this connection.
Protocol Specify the protocol that is used between the Modbus Master and Modbus
Slave(s).
Data Options: TCP or UDP
Default: TCP
UDP/TCP Port The destination port of the remote Modbus TCP Slave that the IOLAN will connect
to.
Range: 0-65535
Default: 502
Next Request Delay A delay, in milliseconds, to allow serial slave(s) to re-enable receivers before
issuing next Modbus Master request.
Range: 0-1000
Default: 50 ms
Enable Serial When enabled, a UID of 0 (zero) indicates that the message will be broadcast to
Modbus Broadcasts all Modbus Slaves.
Default: Disabled
Request Queuing When enabled, allows multiple, simultaneous messages to be queued and
processed in order of reception.
Default: Enabled
Embedded When this option is selected, the address of the slave Modbus device is
embedded in the message header.
Default: Enabled
Remapped Used for single device/port operation. Older Modbus devices may not include a
UID in their transmission header. When this option is selected, you can specify the
UID that will be inserted into the message header for the Modbus slave device.
This feature supersedes the Broadcast feature.
Default: Disabled
Remap UID Specify the UID that will be inserted into the message header for the Slave
Modbus serial device.
Range: 1-247
Default: 1
Enable IP Aliasing The ability to access a serial device connected to the serial port by an IP address
(or host name that can be resolved to the Internet Address in a DNS network)
instead of the IOLAN’s IP address and port number.
Default: Disabled
Remap: UID
Enable SSL/TLS using When enabled, Modbus Slave Gateway messages to remote TCP Modbus Masters
global settings are encrypted via SSL/TLS.
Default: Disabled
Power up Interval Specify the amount of time, in seconds, that the RPS will wait before powering up
a plug. This can be useful if you have peripherals that need to be started in a
specific order.
Data Options: .5, 1, 2, 5, 15, 30, 60, 120, 180, 300
Default: .5 seconds
Ping • Interval -Specify the frequency (in minutes) at which the configured host will be
PING’ed.
Default - 15 minutes
• Timeout - Specify the length of time (in seconds) to wait for a reply
Default - 60 seconds
• Retries - Specify the number of times to re-try the PING when the host does not
reply. This is in addition to the original PING request.
Default - 2
Wait before cycling Enables a delay before cycling the power on the plug. This delay allows for the
power sending of notification(s) of the impending power cycle. Notifications can be sent
to a user on the console port of the host being monitored and/or via email. This
gives system administrators the time to take appropriate action.
Default: Disabled
• Delay—Specify a delay (in minutes) before cycling the power on the plug.
Default: 5 Minutes
Send Notification—Specify the desired notification to be sent advising of the
impending power cycle.
• By Email—Send an email. Details configured in “Email Alert” tab.
• To Serial Port—Send a message to the serial port associated with this power
plug. This is usually the console port on the host being monitored.
IPv4 Remote IP The IPV4 IP address of the remote end of the PPP link. Choose an address that is
Address part of the same network or subnetwork as the IOLAN. If you set the PPP
parameter IP Address Negotiation to On, the IOLAN will ignore the remote IP
address value you enter here and will allow the remote end to specify its IP
address. If your user is authenticated by RADIUS and the RADIUS parameter
Framed-Address is set in the RADIUS file, the IOLAN will use the value in the
RADIUS file in preference to the value configured here. The exception to this rule
is a Framed-Address value in the RADIUS file of 255.255.255.254; this value allows
the IOLAN to use the remote IP address value configured here.
IPv4 Subnet Mask The network subnet mask. For example, 255.255.0.0. If your user is
authenticated by RADIUS and the RADIUS parameter Framed-Netmask is set in the
RADIUS file, the IOLAN will use the value in the RADIUS file in preference to the
value configured here.
Enable IP Address Specifies whether or not IP address negotiation will take place. IP address
Negotiation negotiation is where the IOLAN allows the remote end to specify its IP address.
When On, the IP address specified by the remote end will be used in preference to
the Remote IP Address set for a Serial Port. When Off, the Remote IP Address set
for the Serial Port will be used.
Default: Disabled
Dynamic DNS Button Launches the Dynamic DNS window when IP Address Negotiation is enabled,
which can then update the DNS server with the IP address that is negotiated and
accepted for the PPP session.
IPv6 Local Interface The local IPv6 interface identifier of the IOLAN end of the PPP link. For routing to
Identifier work, you must enter a local IP address. Choose an address that is part of the
same network or subnetwork as the remote end. Do not use the IOLAN’s (main) IP
address in this field; if you do so, routing will not take place correctly.
Field Format: The first 64 bits of the Interface Identifier must be zero, therefore,
::abcd:abcd:abcd:abcd is the expected format.
IPv6 Remote The remote IPv6 interface identifier of the remote end of the PPP link. Choose an
Interface Identifier address that is part of the same network or subnetwork as the IOLAN. If you
enable Negotiate IP Address Automatically, the IOLAN will ignore the remote IP
address value you enter here and will allow the remote end to specify its IP
address. If your user is authenticated by RADIUS and the RADIUS parameter
Framed-Interface-ID is set in the RADIUS file, the IOLAN will use the value in the
RADIUS file in preference to the value configured here.
Field Format: The first 64 bits of the Interface Identifier must be zero, therefore,
::abcd:abcd:abcd:abcd is the expected format.
IPv6 Prefix Bits Specify the prefix bits for the IPv6 global network prefix.
Default: 64
Dynamic DNS
Dynamic DNS can be enabled and configured on a serial port level. If you enable Dynamic DNS and leave
the parameters blank, the Dynamic DNS system parameters will be used (Network, Advanced, Dynamic
DNS tab).
Host Specify the host name that will be updated with the PPP session’s IP address on
the DNS server.
User Name Specify the user name used to access the DNS server.
Account Settings Select this button to configure the Dynamic DNS DynDNS.org account
Button information.
Authentication The type of authentication that will be done on the link. You can use PAP or CHAP
(MD5-CHAP, MS-CHAPv1 and MS-CHAPv2) to authenticate a user or client on the
IOLAN. When setting either PAP and CHAP, make sure the IOLAN and the PPP
peer, have the same setting. For example, if the IOLAN is set to PAP, but the
remote end is set to CHAP, the connection will be refused.
Data Options:
None — no authentication will be performed.
PAP — is a one time challenge of a client/device requiring that it respond with a
valid username and password. A timer operates during which successful
authentication must take place. If the timer expires before the remote end has
been authenticated successfully, the link will be terminated.
CHAP — challenges a client/device at regular intervals to validate itself with a
username and a response, based on a hash of the secret (password). A timer
operates during which successful authentication must take place. If the timer
expires before the remote end has been authenticated successfully, the link will
be terminated. MD5-CHAP and Microsoft MS-CHAPv1/MS-CHAPv2 are supported.
The IOLAN will attempt MS-CHAPv2 with MPPC compression, but will negotiate to
the variation of CHAP, compression and encryption that the remote peer wants to
use.
Default: CHAP
Password Complete this field only if you have specified PAP or CHAP (security protocols) in
the Security field and:
• you wish to dedicate this serial port to a single remote user, who will be
authenticated by the IOLAN, or
• you are using the IOLAN as a router (back-to-back with another IOLAN)
Password means the following:
• When PAP is specified, this is the password the remote device will use to
authenticate the port on this IOLAN.
• When CHAP is specified, this is the secret (password) known to both ends of
the link upon which responses to challenges shall be based.
Field Format: You can enter a maximum of 16 alphanumeric characters.
Remote User Complete this field only if you have specified PAP or CHAP (security protocols) in
the Security field, and
• you wish to dedicate this line to a single remote user, who will be authenticated
by the IOLAN, or
• you are using the IOLAN as a router (back-to-back with another IOLAN)
When Dial In or Dial In/Dial Out is enabled, the Remote User is the name the IOLAN
will use to authenticate the port on the remote device. Your IOLAN will only
authenticate the port on the remote device when PAP or CHAP are operating.
When connecting together two networks, enter a dummy user name; for
example, DS_SALES.
Note If you want a reasonable level of security, the user name and password
should not be similar to a user name or password used regularly to login to the
IOLAN. This option does not work with external authentication.
Field Format: You can enter a maximum of 254 alphanumeric characters.
Authentication The timeout, in minutes, during which successful PAP or CHAP authentication
Timeout must take place (when PAP or CHAP are specified). If the timer expires before the
remote end has been authenticated successfully, the link will be terminated.
Range: 1-255
Default: 1 minute
CHAP Challenge The interval, in minutes, for which the IOLAN will issue a CHAP re-challenge to the
Interval remote end. During CHAP authentication, an initial CHAP challenge takes place,
and is unrelated to CHAP re-challenges. The initial challenge takes place even if re-
challenges are disabled. Some PPP client software does not work with CHAP re-
challenges, so you might want to leave the parameter disabled in the IOLAN.
Range: 0-255
Default: 0 (zero), meaning CHAP re-challenge is disabled
Enable Roaming A user can enter a telephone number that the IOLAN will use to callback him/her.
Callback This feature is particularly useful for a mobile user. Roaming callback can only
work when the User Enable Callback parameter is enabled. Enable Roaming
Callback therefore overrides (fixed) User Enable Callback.To use Enable Roaming
Callback, the remote end must be a Microsoft Windows OS that supports
Microsoft’s Callback Control Protocol (CBCP). The user is allowed 30 seconds to
enter a telephone number after which the IOLAN ends the call.
Default: Disabled
ACCM Specifies the ACCM (Asynchronous Control Character Map) characters that should
be escaped from the data stream.
Field Format: This is entered as a 32-bit hexadecimal number with each bit
specifying whether or not the corresponding character should be escaped. The
bits are specified as the most significant bit first and are numbered 31-0. Thus if
bit 17 is set, the 17th character should be escaped, that is, 0x11 (XON). The value
000a0000 will cause the control characters 0x11 (XON) and 0x13 (XOFF) to be
escaped on the link, thus allowing the use of XON/XOFF (software) flow control. If
you have selected Soft Flow Control on the Serial Port, you must enter a value of at
least 000a0000 for the ACCM.
Default: 00000000, which means no characters will be escaped
MRU The Maximum Receive Unit (MRU) parameter specifies the maximum size of PPP
packets that the IOLAN’s port will accept. If your user is authenticated by the
IOLAN, the MRU value will be overridden if you have set a MTU value for the user.
If your user is authenticated by RADIUS and the RADIUS parameter Framed-MTU is
set in the RADIUS file, the IOLAN will use the value in the RADIUS file in
preference to the value configured here.
Range: 64-1500 bytes
Default: 1500
Configure Request The maximum time, in seconds, that LCP (Link Control Protocol) will wait before it
Timeout considers a configure request packet to have been lost.
Range: 1-255
Default: 3 seconds
Configure Request The maximum number of times a configure request packet will be re-sent
Retries before the link is terminated.
Range: 0-255
Default: 10 seconds
Terminate Request The maximum time, in seconds, that LCP (Link Control Protocol) will wait before it
Timeout considers a terminate request packet to have been lost.
Range: 1-255
Default: 3 seconds
PPP echo request The maximum time, in seconds, between sending an echo request packet if no
timeout response is received from the remote host.
Range: 0-255
Default: 30 seconds
PPP echo retry The maximum number of times an echo request packet will be re-sent before
the link is terminated.
Range: 0-255
Default: 3
Configure NAK The maximum number of times a configure NAK packet will be re-sent before the
Retries link is terminated.
Range: 0-255
Default: 10 seconds
Enable Address/ This determines whether compression of the PPP Address and Control fields take
Control Compression place on the link. For most applications this should be enabled.
Default: Enabled
Enable Protocol This determines whether compression of the PPP Protocol field takes place on this
Compression link.
Default: Enabled
Enable VJ When enabled, Van Jacobson Compression is used on this link. If your user is
Compression authenticated by the IOLAN, this VJ compression value will be overridden if you
have enabled the User, Enable VJ Compression parameter. If the user is
authenticated by RADIUS and the RADIUS parameter Framed-Compression is set in
the RADIUS file, the IOLAN will use the value in the RADIUS file in preference to
the value configured here.
Default: Enabled
Enable Magic Determines if a line is looping back. If enabled (On), random numbers are sent on
Negotiation the link. The random numbers should be different, unless the link loops back.
Default: Disabled
Idle Timeout Use this timer to close a connection because of inactivity. When the Idle Timeout
expires, the IOLAN will end the connection.
Range: 0-4294967 seconds (about 49 days)
Default: 0 (zero), which does not timeout, so the connection is permanently open.
Direct Connect Specify this option when a modem is not connected to this serial port.
Default: Enabled
Dial In If the device is remote and will be dialing in via modem or ISDN TA, enable this
parameter.
Default: Disabled
Dial In/Out Enable this option when you want the serial port to do either of the following:
• accept a call from a modem or ISDN TA
• dial a number when the serial port is started
Default: Disabled
MS Direct Host Specify this option when the serial port is connected to a Microsoft Guest device.
Default: Enabled
MS Direct Guest Enable this option when the serial port is connected to a Microsoft Host device.
Default: Disabled
Dial Timeout The number of seconds the IOLAN will wait to establish a connection to a remote
modem.
Range: 1-99
Default: 45 seconds
Dial Retry The number of times the IOLAN will attempt to re-establish a connection with a
remote modem.
Range: 0-99
Default: 2
Modem The name of the predefined modem that is used on this line.
Session Strings Controls the sending of ASCII strings to serial device at session start as follows;
• Send at Start—If configured, this string will be sent to the serial device on
power-up of the IOLAN, or when a kill line command is issued on this serial
port. If the "monitor DSR" or "monitor DCD" options are set, the string will also
be sent when the monitored signal is raised.
Range: 0-127 alpha-numeric characters
Range: hexadecimal 0-FF
• Delay after Send - If configured, will inset a delay after the string is sent to the
device. This delay can be used to provide the serial device with time to process
the string before the session is initiated.
• Range is 0-65535 ms
Default: 10 ms
Remote IP Address The IPv4 address of the remote end of the SLIP link. Choose an address that is part
of the same network or subnetwork as the IOLAN. If your user is authenticated by
the IOLAN, this remote IP address will be overridden if you have set a Framed IP
Address for the user. If your user is authenticated by RADIUS and the RADIUS
parameter Framed-Address is set in the RADIUS file, the IOLAN will use the value
in the RADIUS file in preference to the value configured here.
Subnet Mask The network subnet mask. For example, 255.255.0.0. If your user is
authenticated by RADIUS and the RADIUS parameter Framed-Netmask is set in the
RADIUS file, the IOLAN will use the value in the RADIUS file in preference to the
value configured here.
MTU The Maximum Transmission Unit (MTU) parameter restricts the size of individual
SLIP packets being sent by the IOLAN. Enter a value between 256 and 1006 bytes;
for example, 512. The default value is 256. If your user is authenticated by the
IOLAN, this MTU value will be overridden when you have set a Framed MTU value
for the user. If your user is authenticated by RADIUS and the RADIUS parameter
Framed-MTU is set in the RADIUS file, the IOLAN will use the value in the RADIUS
file in preference to the value configured here.
Default: 256
Enable VJ When enabled, Van Jacobson compression is used on this link. When enabled, C-
Compression SLIP, or compressed SLIP, is used. When disabled, plain SLIP is used. C-SLIP greatly
improves the performance of interactive traffic, such as Telnet or Rlogin.
If your user is authenticated by the IOLAN, this VJ compression value will be
overridden if you have set a Framed Compression value for a user. If your user is
authenticated by RADIUS and the RADIUS parameter Framed-Compression is set in
the RADIUS file, the IOLAN will use the value in the RADIUS file in preference to
the value configured here.
Default: Enabled
Session Strings Controls the sending of ASCII strings to serial device at session start as follows;
• Send at Start—If configured, this string will be sent to the serial device on
power-up of the IOLAN, or when a kill line command is issued on this serial
port. If the "monitor DSR" or "monitor DCD" options are set, the string will also
be sent when the monitored signal is raised.
• Range: 0-127 alpha-numeric characters
• Range: hexadecimal 0-FF
• Delay after Send - If configured, will inset a delay after the string is sent to the
device. This delay can be used to provide the serial device with time to process
the string before the session is initiated.
• Range is 0-65535 ms
Default: 10 ms
Dial Connect If the device is remote and will be dialing in via modem or ISDN TA, enable this
parameter.
Default: Disabled
Dial In If the device is remote and will be dialing in via modem or ISDN TA, enable this
parameter.
Default: Disabled
Dial Out If you want the modem to dial a number when the serial port is started, enable
this parameter.
Default: Disabled
Dial Timeout The number of seconds the IOLAN will wait to establish a connection to a remote
modem.
Range: 1-99
Default: 45 seconds
Dial Retry The number of times the IOLAN will attempt to re-establish a connection with a
remote modem.
Range: 0-99
Default: 2
Modem The name of the predefined modem that is used on this line.
To view the local port buffer for a particular serial port, you must:
Connect to the device on that serial port by Telnet or SSH.
The serial port(s) must be set to the Console Management profile
Once you have established a connection to a device, you can enter the View Buffer String at any time to
switch the display to the content of the port buffer for that particular serial port.
To return to communicating to the device, press the ESC key and the communication session will con-
tinue from where you left off.
To navigate through the port buffer data, the following chart illustrates the keyboard keys or “hot keys”
that can be used to view the port buffer data. Press the ESC key and to continue to communicate with the
device on that particular serial port.
Keyboard Buttons Hot Keys Direction
View Buffer String The string used by a a session connected to a serial port to display the port buffer
for that particular serial port.
Data Options: Up to an 8 character string. You can specify control (unprintable)
codes by putting the decimal value in angle brackets < > (for example, Escape b is
<027>b).
Default: ~view
Enable Remote Port Enables/disables port buffering on a remote system. When you enable this
Buffering option, you have the ability to save the buffered data to a file(s) (one file is
created for each serial port) and/or send it to the Syslog host for viewing on the
Syslog host’s monitor.
Default: Disabled
NFS Host The NFS host that the IOLAN will send data to for its Remote Port Buffering
feature. The IOLAN will open a file on the NFS host for each serial port configured
for Console Management, and will send serial port data to be written to that file(s).
Default: None
Encrypt Data Determines if the data sent to the NFS host is sent encrypted or in the clear across
the LAN.
NOTE: When NFS encryption is enabled, the Decoder utility software is required
to be installed on the NFS host for decrypting the data to a readable format.
Default: Disabled
Enable Port Buffering When enabled, buffered data is sent to the syslog host to be viewed on the host’s
to Syslog monitor. Choose the event level that will be associated with the "port buffer
data" in the syslog.
Data Options: Emergency, Alert, Critical, Error, Warning, Notice, Info, Debug.
Default Level: Info
Default: Disabled
Add Time Stamp to Enable/disable time stamping of the serial port buffer data.
Data Default: Disabled
Enable Key Stroke When enabled, key strokes that are sent from the network host to the serial
Buffering device on the IOLAN’s serial port are buffered.
Default: Disabled
Process Break Signals Enables/disables proprietary inband SSH break signal processing, the Telnet break
signal, and the out-of-band break signals for TruePort.
Default: Disabled
Flush Data Before When enabled, deletes any pending outbound data when a port is closed.
Closing Serial Port Default: Disabled
Enable Data Logging When enabled, serial data will be buffered if the TCP connection is lost. When
Logging the TCP connection is re-established, the buffered serial data will be sent
to its destination. If using the Trueport profile, data logging is only supported in
Lite Mode.
The minimum data buffer size for is 1 KB. The maximum data buffer size is 4000
KB.
If the data buffer is filled, incoming serial data will overwrite the oldest data.
Values: 1-4000 KB - Default 256 KB
Default: Disabled
Note: A kill line or a reboot of the IOLAN causes all buffered data to be lost
Pre V4.3G Data Enable the logging feature previous to V4.3G software.
Logging Mode Default: Disabled
Serial Port Menu When a user connects to the IOLAN through the network, the string used to
String access the Easy Port Access menu without disconnecting the network connection.
Data Options: You can specify control (unprintable) codes by putting the decimal
value in angle brackets < > (for example, ESC-b is <027>b).
Default: ~menu
Session Escape String When a user connects to the IOLAN through the network, the string is used to
access the Reverse Session Menu.
Data Options: You can specify control (unprintable) codes by putting the decimal
value in angle brackets < > (for example, ESC-b is <027>b).
Default: <026>s (Ctrl-z s)
Power Management Users accessing the IOLAN through the network can enter the string to bring up
Menu String the Power Bar Management menu.
Data Options: You can specify control (unprintable) codes by putting the decimal
value in angle brackets < > (for example, ESC-b is <027>b).
Default: <016> (Ctrl-p)
Retry Attempts The number of TCP keep-alive retries before the connection is closed.
Options: 1-32767
Modem Parameters
If your IOLAN contains an internal modem, a permanent modem string called iolan_modem exists
permanently in your configuration.
You will need to configure a modem if you want to connect an external modem to one of your serial ports.
Modems are usually configured for PPP/SLIP dial in/out connections, although some modems do support
raw data communication. When you select the Modems tab, you will see any modems that have been
configured and the Add button to add a new entry to the modem table.
Adding/Editing a Modem
You can add new modems or edit existing modems through the display window:
Initialization String The initialization string of the modem; see your modem’s documentation.
Actual Baud Rate The actual baud rate that runs between the IOLAN and the connected serial
device.
Range: 300-230400, you can also specify a custom baud rate.
Adding/Editing Users
User Name The name of the user.
Restrictions: Do not use spaces.
Password The password the user will need to enter to login to the IOLAN.
Confirm Password Enter the user’s password again to verify it is entered correctly.
Note: A technique for giving a serially attach user (dial-in or terminal attached), the same menus as one that is
network connected is to do the following:
1. Define the serial port with a Terminal Profile using telnet protocol with a direct connection to
Host IP address 127.0.0.0 (local loop back).
2. When the user connects to that serial port a Telnet session will be established to the IOLAN and
the user will appear to have connected from the network.
When a Terminal profile is set for the serial port and Require Login has been selected, user’s accessing the
IOLAN through the serial port will be authenticated. Once authentication is successful, the Service speci-
fied here is started. For example, if the Service Telnet is specified, the IOLAN will start a Telnet connection
to the specified Host IP/TCP Port after the user is successfully authenticated (logs in successfully).
Within the Terminal profile, there are a number of settings that apply to possible
Services. Once it is known which user is connected, and which service is to be used, then the settings
from both the Terminal profile and the user are used. User parameters take precedence over serial port
parameters.
Host IP For outbound User Services such as Telnet or TCP Clear, SSH and Rlogin, this is the
target host name or IP address. If no IP address or host name is specified, the Host
IP value in the Default User configuration will be used.
Default: 0.0.0.0
TCP Port When the User Service is Telnet, or TCP Clear , or SSH, this is the target port
number. The default value will change based on the type of Service selected; the
most common known port numbers are used as the default values.
IPv4 Address Used for User Service PPP or SLIP, sets the IP address of the remote user. Enter the
address in dot decimal notation as follows:
n.n.n.n—(where n is a number) Enter the IP address of your choice. This IP address
will then be used in preference to the Remote IP Address set for a line.
The following IP addresses have a special meaning:
255.255.255.254—The IOLAN will use the Remote IP Address set in the PPP settings
for the serial port that this user is connecting to.
255.255.255.255—When the User Service is PPP, the IOLAN will allow the remote
machine to specify its IP address (overriding the IP address negotiation value
configured in the PPP settings).
255.255.255.255—When the User Service is SLIP, the IOLAN will use the Remote IP
Address set for the line (no negotiation).
Default: 255.255.255.254
IPv4 Subnet Mask If the remote user is on a subnet, enter the network’s subnet mask. For example,
a subnet mask of 255.255.0.0.
IPv6 Interface Used for User Service PPP, sets the IPv6 address of the remote user. Enter the
Identifier address in IPv6 format.
Field Format: The first 64 bits of the Interface Identifier must be zero, therefore,
::abcd:abcd:abcd:abcd is the expected format.
MTU Used for User Service PPP or SLIP, specifies the maximum size of packets, in bytes,
being transferred across the link. On noisy links it might be preferable to fragment
large packets being transferred over the link, since there will a be quicker recovery
from errors.
Data Options:
PPP—MTU will be the maximum size of packets that the IOLAN will negotiate for
this port. This value is negotiated between the two ends of the link.
SLIP—MTU will be the maximum size of packets being sent by the IOLAN.
The User MTU value will override the MTU/MRU values set for a Serial Port.
Range: PPP: 64-1500 bytes, SLIP: 256-1006 bytes
Default: PPP is 1500 bytes, SLIP is 256 bytes
Enable VJ Used for User Service PPP or SLIP, determines whether Van Jacobsen Compression
Compression is used on the link. VJ compression is a means of reducing the standard TCP/IP
header from 40 octets to approximately 5 octets. This gives a significant
performance improvement, particularly when interactive applications are being
used. For example, when the user is typing, a single character can be transmitted
and thus have the overhead of the full TCP/IP header. VJ Compression has minimal
effect on other types of links, such as FTP, where the packets are much larger. The
User VJ Compression option will override the VJ Compression value set for a Serial
Port.
Default: Disabled
Session Timeout The amount of time, in seconds, before the IOLAN forcibly closes a user’s session
(connection). The default value is 0 (zero), meaning that the session timer will not
expire (the session is open permanently, or until the user logs out). The User
Session Timeout will override all other Serial Port Session Timeout parameters.
Range: 0-4294967
Default: 0
Enable Callback When enabled, enter a phone number for the IOLAN to call the user back (the
Enable Callback parameter is unrelated to the Serial Port Remote Access (PPP)
profile Dial parameter).
Note: the IOLAN will allow callback only when a user is authenticated. If the
protocol over the link does not provide authentication, there will be no callback.
Therefore, when the Serial Port profile is set to Remote Access (PPP), you must use
either PAP or CHAP, because these protocols provide authentication.
The IOLAN supports another type of callback, Roaming Callback, which is
configurable when the Serial Port profile is set to Remote Access (PPP).
Default: Disabled
Language You can specify whether a user will use English or Custom Language as the
language that appears in the CLI. The IOLAN supports one custom language that
must be downloaded to the IOLAN.
Default: English
Hotkey Prefix The prefix that a user types to control the current session.
Data Options:
• ^a number—To switch from one session to another, press ^a (Ctrl-a) and then
the required session number. For example, ^a 2 would switch you to session 2.
Pressing ^a 0 will return you to the IOLAN Menu.
• ^a n—Display the next session. The current session will remain active. The low-
est numbered active session will be displayed.
• ^a p—Display the previous session. The current session will remain active. The
highest numbered active session will be displayed.
• ^a m—To exit a session and return to the IOLAN. You will be returned to the
menu. The session will be left running.
• ^a l—(Lowercase L) Locks the serial port until the user unlocks it. The user is
prompted for a password (any password, excluding spaces) and the serial port is
locked. The user must retype the password to unlock the serial port.
• ^r—When you switch from a session back to the Menu, the screen may not be
redrawn correctly. If this happens, use this command to redraw it properly. This
is always Ctrl R, regardless of the Hotkey Prefix.
The User Hotkey Prefix value overrides the Serial Port Hotkey Prefix value. You can
use the Hotkey Prefix keys to lock a serial port only when the serial port’s Allow
Port Locking parameter is enabled.
Default: Hex 01 (Ctrl-a or ^a)
User Sessions
The Sessions tab is used to configure specific connections for users who are accessing the network
through the IOLAN’s serial port.
Users who have successfully logged into the IOLAN (User Service set to DSprompt) can start up to four
login sessions on network hosts. These users start sessions through the EasyPortMenu option Sessions.
Multiple sessions can be run simultaneously to the same host or to different hosts. Users can switch
between different sessions and also between sessions and the IOLAN using Hotkey commands (see Hot-
key Prefix) for a list of commands.
Users with Admin or Normal privileges can define new sessions and use them to connect to Network
hosts; they can even configure them to start automatically on login to the IOLAN. Restricted and Menu
users can only start sessions predefined for them in their user configuration.
Host The host that the user will connect to in this predefined session.
Default: None
TCP Port The TCP port that the IOLAN will use to connect to the host in this predefined
session.
Default: Telnet-23, SSH-22, Rlogin-513
Local
When Local authentication is selected, the user must either be configured in the IOLAN’s User List or you
must enable Guest users.
Local Authentication Parameter
Enable Guest Mode Allow users who are not defined in the Users database to log into the IOLAN with
any user ID and the specified password. Guest users inherit their settings from the
Default User’s configuration.
Default: Disabled
Guest Password The password that Guest users must use to log into the IOLAN.
Confirm Password Type the Guest Password in again to verify that it is correct.
Enable Login Once When this option is selected, only one user with the same username can be
signed in at one time. Should the same user with the same username attempt to
sign in again, their first session will be terminated and they will gain entry to their
new session.
Enable Password When this option is selected, the following password rules will apply. The
Rules password must be 8 characters long and contain at least one number.
Enable Account When this option is selected, the IOLAN’s internal local user database will provide
Lockout a 10 second delay after each invalid attempt. If 5 invalid attempts are made within
1 minute the user will be locked out from further attempts for 5 minutes.
Second Name of the secondary RADIUS authentication host, should the first RADIUS host
Authentication Host fail to respond.
Default: None
Secret The secret (password) shared between the IOLAN and the RADIUS authentication
host.
Authentication Port The port that the RADIUS host listens to for authentication requests.
Default: 1812
Secret The secret (password) shared between the IOLAN and the RADIUS accounting
host.
Account Port The port that the RADIUS host listens to for accounting requests.
Default: 1813
Enable Accounting Enables/disables whether or not the IOLAN validates the RADIUS accounting
Authenticator response.
Default: Enabled
Retry The number of times the IOLAN tries to connect to the RADIUS server before
erring out.
Range: 0-255
Default: 5
Timeout The time, in seconds, that the IOLAN waits to receive a reply after sending out a
request to a RADIUS accounting or authentication host. If no reply is received
before the timeout period expires, the IOLAN will retry the same host up to and
including the number of retry attempts.
Range: 1-255
Default: 3 seconds
Automatically When enabled, the IOLAN will send the IOLAN’s Ethernet 1 IPv4 address to the
determine NAS-IP- RADIUS server.
Address Default: Enabled
Use the following When enabled, the IOLAN will send the specified IPv4 address to the RADIUS
NAS-IP-Address server.
Default: Disabled
IP Address The IPv4 address that the IOLAN will send to the RADIUS server.
Default: 0.0.0.0
Automatically When enabled, the IOLAN will send the IOLAN’s IPv6 address to the RADIUS
determine NAS-IPv6- server.
Address Default: Enabled
Use the following When enabled, the IOLAN will send the specified IPv6 address to the RADIUS
NAS-IPv6-Address server.
Default: Disabled
IPv6 Address The IPv6 address that the IOLAN will send to the RADIUS server.
Field Format: IPv6 address
LDAP (Lightweight Directory Access Protocol) is an application protocol for querying and modifying direc-
tory services running over TCP/IP. It is also used as a method of authenticating users. Microsoft Active
Directory is an LDAP like directory service. It can be used for authenticating users in a similar fashion to
LDAP. In this manual, the use of LDAP is synonymous with Microsoft Active Directory.
Port The port that the LDAP/Microsoft Active Directory host listens to for
authentication requests.
Default: 389
Base The domain component (dc) that is the starting point for the search for user
authentication. You can enter up to 128 characters for the base.
User Attribute This defines the name of the attribute used to communicate the user name to the
server.
Options:
• OpenLDAP(uid)—Chose this option if you are using an OpenLDAP server. The
user attribute on this server is “uid”.
• Microsoft Active Directory(sAMAccountName)—Chose this option if your
LDAP server is a Microsoft Active Directory server. The user attribute on this
server is “sAMAccountName”.
• Other—If you are running something other than a OpenLDAP or Microsoft
Active Directory server, you will have to find out from your system administra-
tor what the user attribute is and enter it in this field.
Default: OpenLDAP(uid)
Encrypt Passwords Checking this parameter will cause the IOLAN to encrypt the password using MD5
Using MD5 digest digest before sending it to server. If this option is not checked, the password is
sent to the server in the clear.
Default: Disabled
Authenticate IOLAN This option will cause the Terminal Server to authenticate with the LDAP server
with LDAP server before the user authentication takes place. The user name/password to use for
this authentication is configured below.
Default: Disabled
Append Base to When checked, this causes the domain component configured in the “base”
Name parameter to be appended to the user name. This allows for a fully qualified
name to be used when authenticating the IOLAN.
Default: Enabled but if the base parameter is not configured, it does not modify
the name.
Confirm You must enter the exact same value as the password field. Since the password is
not echoed, this ensures that the field was entered correctly.
Default: Blank
TLS Port Specify the port number that LDAP/Microsoft Active Directory will use for TLS.
Default: 636
Directory with TLS, you need to download a CA list to the IOLAN that includes the certificate authority
(CA) that signed the LDAP certificate on the LDAP host by selecting Tools, Advanced, Keys and Certificates.
See Network Filtering for more information on the LDAP certificate.
TACACS+
TACACS+ is an authentication method that the IOLAN supports that can send back User information; see
for more information on the User parameters that can be sent back by TACACS+.
TACACS+ Authentication Parameters
Authentication/ The primary TACACS+ host that is used for authentication.
Authorization Default: None
Primary Host
Authentication/ The secondary TACACS+ host that is used for authentication, should the primary
Authorization TACACS+ host fail to respond.
Secondary Host Default: None
Authentication/ The port number that TACACS+ listens to for authentication requests.
Authorization Port Default: 49
Enable Authorization Enables authorization on the TACACS+ host, meaning that IOLAN-specific
parameters set in the TACACS+ configuration file can be passed to the IOLAN after
authentication.
Default: Disabled
Accounting The secondary TACACS+ host that is used for accounting, should the primary
Secondary Host accounting TACACS+ host fail to respond.
Default: None
Accounting Secret The TACACS+ shared secret is used to encrypt/decrypt TACACS+ packets in
communications between two devices. The shared secret may be any
alphanumeric string. Each shared secret must be configured on both client and
server sides.
Use Alternate Service The TACACS+ service name for Telnet or SSH is normally “raccess”. The service
Names name for Web Manager or Device Manager is “EXEC”. In some cases, these service
names conflicted with services used by Cisco devices. If this is the case, checking
this field will cause the service name for Telnet or SSH to be “perlecli” and the
service name for Web Manager or Device Manager to be “perleweb”.
Securid
Securid Authentication ParametersSecurid Reset Node
Primary/Master The first SecurID server that is tried for user authentication.
Host Default: None
Replica/Slave If the first SecurID server does not respond to an authentication request, this is the
Host next SecurID server that is tried for user authentication.
Default: None
UDP Port The port number that SecurID listens to for authentication requests.
Default: 5500
Encryption Type The type of encryption that will be used for SecurID server communication.
Data Options: DES, SDI
Default: SDI
Legacy If you are running SecurID 3.x or 4.x, you need to run in Legacy Mode. If you are
running SecurID 5.x or above, do not select Legacy Mode.
Default: Disabled
If you need to reset the SecurID secret, select Administration, Reset, Securid Secret.
Primary NIS Host The primary NIS host that is used for authentication.
Default: None
Secondary NIS Host The secondary NIS host that is used for authentication, should the primary NIS
host fail to respond.
Default: None
The IOLAN contains SSH Server software that you need to configure if the IOLAN is going to be accessed
via SSH. If you specify more than one Authentication method and/or Cipher, the IOLAN will negotiate with
the client and use the first authentication method and cipher that is compatible with both systems.
When you are using the SSH connection protocol, keys need to be distributed to all users and the IOLAN.
Below are a couple of example scenarios for key/certificate distribution.
Users Logging into the IOLAN Using SSH
This scenario applies to serial ports configured for Console Management using the SSH protocol. In the fol-
lowing example, users are connecting to the IOLAN via SSH from the LAN. Therefore, the following keys
need to be exchanged:
• Upload the IOLAN SSH Public Key to each user’s host machine who is connecting and logging
into the IOLAN using SSH.
• Download the SSH Public Key from each user’s host machine who is connecting and logging
into the IOLAN using SSH.
Lynn
Device Server Public
SSH Tracy
Network
Device Server Public
Device Server
Device Server Private Dennis
Server Key Device Server Public
Lynn Public Key
Tracy
Sales Server SSH
perle
Sales Server Private
Key Device Server
Sales Server Public
Key Dennis
HR Server Public Key
Lynn Private Key
HR Server
HR Server Private
Key
Allow SSH-1 Protocol Allows the user’s client to negotiate an SSH-1 connection, in addition to SSH-2.
Default: Disabled
RSA When a client SSH session requests RSA authentication, the IOLAN’s SSH server
will authenticate the user via RSA.
Default: Enabled
DSA When a client SSH session requests DSA authentication, the IOLAN’s SSH server
will authenticate the user via DSA.
Default: Enabled
Break String The break string used for inband SSH break signal processing. A break signal is
generated on a specific serial port only when the server's break option is enabled
and the user currently connected using reverse SSH has typed the break string
exactly.
Field Format: maximum 8 characters
Default: ~break, where ~ is tilde
Allow Compression Requests compression of all data. Compression is desirable on modem lines and
other slow connections, but will only degrade data transmission speeds on faster
networks.
Default: Disabled
Login Timeout Set the time to wait for the SSH client to complete the login. If the timer expires
before the login is completed, the session is terminated.
Default: 120 seconds
Values: 1-600 seconds
SSL/TLS
When SSL/TLS is configured, data is encrypted between the IOLAN and the host/device (which must also
support SSL/TLS). When you configure the SSL/TLS settings in the System section, you are configuring the
default global SSL/TLS settings; you are not configuring an SSL/TLS server.
You can create an encrypted connection using SSL/TLS for the following profiles: TruePort, TCP Sockets,
Terminal (the user’s Service must be set to SSL_Raw), Serial Tunneling, Virtual Modem, and Modbus.
When configuring SSL/TLS, the following configuration options are available:
• You can set up the IOLAN to act as an SSL/TLS client or server.
• There is an extensive selection of SSL/TLS ciphers that you can configure for your SSL/TLS con-
nection; see appendix on ciphers for a list of SSL/TLS ciphers.
Note: Some combinations of cipher groups are not available on FIPS firmware versions.
You can enable peer certificate validation, for which you must supply the validation criteria that was used
when creating the peer certificate (this is case sensitive).
Note: See Network Filtering for information about SSL/TLS support documents.
Cipher Suite Button Select this button to specify SSL/TLS connection ciphers.
Validate Peer Enable this option when you want the Validation Criteria to match the Peer
Certificate Certificate for authentication to pass. If you enable this option, you need to
download an SSL/TLS certificate authority (CA) list file to the IOLAN.
Default: Disabled
Validation Criteria Select this button to create peer certificate validation criteria that must be met for
Button a valid SSL/TLS connection.
SSL Certificate This is the SSL/TLS passphrase used to generate an encrypted RSA/DSA private key.
Passphrase This private key and passphrase are required for both HTTPS and SSL/TLS
connections, unless an unencrypted private key was generated, then the SSL
passphrase is not required. Make sure that you download the SSL private key and
certificate if you are using the secure HTTP option (HTTPS) or SSL/TLS. If both RSA
and DSA private keys are downloaded to the IOLAN, they need to be generated
using the same SSL passphrase for both to work.
Adding/Editing a Cipher
See Valid SSL/TLS Ciphers for a list of valid SSL/TLS ciphers.
Max Key Size The maximum key size value that will be used for the specified encryption type.
Data Options: 40, 56, 64, 128, 168, 256
Default: 256
Key Exchange The type of key to exchange for the encryption format.
Data Options:
• Any—Any key exchange that is valid is used (this does not, however, include
ADH keys).
• RSA—This is an RSA key exchange using an RSA key and certificate.
• EDH-RSA—This is an EDH key exchange using an RSA key and certificate.
• EDH-DSS—This is an EDH key exchange using a DSA key and certificate.
• ADH—This is an anonymous key exchange which does not require a private key
or certificate. Choose this key if you do not want to authenticate the peer
device, but you want the data encrypted on the SSL/TLS connection.
• ECDH-ECDSA—This is an ECDH key exchange using a ECDSA key and certificate.
Default: Any
HMAC Select the key-hashing for message authentication method for your encryption
type.
Data Options:
• Any
• MD5
• SHA1
• SHA256
• SHA384
Default: Any
State/Province An entry for the state/province; for example, IL. This field is case sensitive in order
to successfully match the information in the peer SSL/TLS certificate.
Data Options: Maximum 128 characters
Locality An entry for the location; for example, Chicago. This field is case sensitive in order
to successfully match the information in the peer SSL/TLS certificate.
Data Options: Maximum 128 characters
Organization An entry for the organization; for example, Accounting. This field is case sensitive
in order to successfully match the information in the peer SSL/TLS certificate.
Data Options: Maximum 64 characters
Organization Unit An entry for the unit in the organization; for example, Payroll. This field is case
sensitive in order to successfully match the information in the peer SSL/TLS
certificate.
Data Options: Maximum 64 characters
Common Name An entry for common name; for example, the host name or fully qualified domain
name. This field is case sensitive in order to successfully match the information in
the peer SSL/TLS certificate.
Data Options: Maximum 64 characters
Email An entry for an email address; for example, [email protected]. This field is
case sensitive in order to successfully match the information in the peer SSL/TLS
certificate.
Data Options: Maximum 64 characters
Note: If you are configuring IPsec and/or L2TP/IPsec, you must also enable the IPsec service found in Security,
Services navigation tree.
The information in this section applies only to setting up IPsec VPN tunnels, not L2TP/IPsec VPN tunnels.
The IOLAN can be configured as a VPN gateway using the IPsec protocol. You can configure the VPN con-
nection using two IOLANs as the local and remote VPN gateways or the IOLAN as the local VPN gateway
and a host/server running the VPN software as the remote VPN gateway.
If the VPN tunnel is being configured for an IPv6 network that is going through a router(s), the router(s)
must have manual IPv6 address entry capability.
VPN servers/clients can support various VPN parameters. However, the following parameters are
REQUIRED to be set to the following values to support a VPN tunnel between the IOLAN and a VPN
server/client:
perfect forward secrecy: no
protocol: ESP
mode: tunnel (not transport)
opportunistic encryption: no
aggressive mode: no
Authentication Specify the authentication method that will be used between VPN peers to
Method authenticate the VPN tunnel.
Data Options:
• Shared Secret—A text-based secret that is used to authenticate the IPsec tunnel
(case sensitive). This applies to all VPN tunnels (IPsec and L2TP/IPsec).
• RSA Signature—RSA signatures are used to authenticate the IPsec tunnel. When
using this authentication method, you must download the IPsec RSA public key
to the IOLAN and upload the IPsec RSA public key from the IOLAN to the VPN
gateway.
• X.509 Certificate—X.509 certificates are used to authenticate the IPsec tunnel.
When using this authentication method, you must include the signing author-
ity’s certificate information in the SSL/TLS CA list and download it to the IOLAN.
Default: Shared Secret
Secret/Remote Shared Secret—Specify the text-based secret that is used to authenticate the IPsec
Validation Criteria tunnel (case sensitive). This applies to all VPN tunnels (IPsec and L2TP/IPsec).
Button X.509 Certificate—Specify the remote X.509 certificate validation criteria that
must match for successful authentication (case sensitive). Note that all validation
criteria must be configured to match the X.509 certificate. If using an asterisk (*)
for wildcard matching, the Boot Action must be set to Add (Listen).
See Shared Secret Field Description for more information.
See Remote Validation Criteria Field Descriptions or more information on the X.509
certificate validation criteria.
Local Device When the VPN tunnel is established, one side of the tunnel is designated as Right
and the other as Left. You are configuring the IOLAN-side of the VPN tunnel.
Data Options: Left, Right
Default: Left
Local IP Address The IP address of the IOLAN. You can specify %defaultroute when the IP address
of the IOLAN is not always known (for example, when it gets its IP address from
DHCP). When %defaultroute is used, a default gateway must be configured in the
route table (Network, Advanced, Route List tab).
Field Format: IPv4 address, IPv6 address, FQDN, %defaultroute
Local Next Hop The IP address of the router/gateway that will forward data packets to the remote
VPN (if required). The router/gateway must reside on the same subnet at the
IOLAN. Leave this parameter blank if you want to use the Default Gateway
configured in the IOLAN.
Field Format: IPv4 or IPv6 address
Local Host/Network The IP address of a specific host, or the network address that the IOLAN will
Address provide a VPN connection to.
Field Format: IPv4 or IPv6 address
Local IPv4 Subnet The subnet mask of the local IPv4 network. Keep the default value when you are
Mask configuring a host-to-host VPN connection.
Default: 255.255.255.255
Local IPv6 Prefix Bits The prefix bits of the local IPv6 network. Keep the default value when you are
configuring a host-to-host VPN connection.
Default: 0
Remote IP Address The IP address or FQDN of the remote VPN peer. If you want to accept a VPN
connection from any VPN peer, you can enter %any in this field.
Field Format: IPv4 address, IPv6 address, FQDN, %any
Remote External IP When NAT Traversal (NAT_T) is enabled, the remote VPN’s public external IP
Address address or FQDN.
Field Format: IPv4 address, IPv6 address, FQDN
Remote Next Hop The IP address of the router/gateway that will forward data packets to the IOLAN
(if required). The router/gateway must reside on the same subnet at the remote
VPN.
Field Format: IPv4 or IPv6 address
Remote Host/ The IP address of a specific host or the network address that the IOLAN will
Network Address provide a VPN connection to. If the IPsec tunnel is listening for connections (Boot
Action set to Add), and the field value is left at 0.0.0.0, any VPN peer with a
private remote network/host that conforms to RFC 1918 (10.0.0.0/8, 172.16.0.0./
12, 192.168.0.0/16) will be allowed to use this tunnel if it successfully
authenticates.
Field Format: IPv4 or IPv6 address
Remote IPv4 Subnet The subnet mask of the remote IPv4 network. Keep the default value when you are
Mask configuring a host-to-host VPN connection.
Default: 255.255.255.255
Remote IPv6 Prefix The prefix bits of the remote IPv6 network. Keep the default value when you are
Bits configuring a host-to-host VPN connection.
Default: 0
State/Province An entry for the state/province; for example, IL. This field is case sensitive in order
to successfully match the information in the remote X.509 certificate.
Data Options: Maximum 128 characters, If using an asterisk (*) for wildcard
matching, the Boot Action must be set to Add (Listen).
Locality An entry for the location; for example, Chicago. This field is case sensitive in order
to successfully match the information in the remote X.509 certificate.
Data Options: Maximum 128 characters, If using an asterisk(*) for wildcard
matching, the Boot Action must be set to Add (Listen).
Organization An entry for the organization; for example, Accounting. This field is case sensitive
in order to successfully match the information in the remote X.509 certificate.
Data Options: Maximum 64 characters, If using an asterisk(*) for wildcard
matching the Boot Action must be set to Add (Listen).
Common Name An entry for common name; for example, the host name or fully qualified domain
name. This field is case sensitive in order to successfully match the information in
the remote X.509 certificate.
Data Options: Maximum 64 characters, If using an asterisk (*) for wildcard
matching, the Boot Action must be set to Add (Listen).
Email An entry for an email address; for example, [email protected]. This field is
case sensitive in order to successfully match the information in the remote X.509
certificate.
Data Options: Maximum 64 characters, If using an asterisk (*) for wildcard
matching, the Boot Action must be set to Add (Listen).
L2TP/IPsec
In order to create a VPN tunnel on Windows XP®, you must use the L2TP/IPsec protocol. When L2TP/IPsec
is enabled, the IOLAN will listen for L2TP/IPsec VPN tunnel requests.
When you enable L2TP/IPsec, you are requiring that all access to the IOLAN go through the L2TP/IPsec
tunnel, so you must configure any exceptions first see (L2TP/IPsec Exceptions) for more information on
exceptions) or you will not be able to access the IOLAN through the network unless you are configured to
go through the L2TP/IPsec tunnel (you can still access the IOLAN through the Console port).
L2TP/IPsec Authentication Parameters
Allow L2TP/IPsec When enabled, the IOLAN listens for L2TP/IPsec VPN tunnel connections. Note: to
connections allow non-VPN tunnel connections to the IOLAN, you must create entries in the
VPN Exceptions list.
Default: Disabled
Local IP Address If the IPsec local address is set to 0.0.0.0, the IOLAN will listen for L2TP/IPsec
connections on (the IP address of) the network interface associated with (ie: on
the same network as) the IOLAN’s default gateway. If no default gateway exists,
the IOLAN will not listen for L2TP/IPsec connections.
Default: 0.0.0.0
Authentication Specify the authentication method that will be used between VPN peers to
Method authenticate the VPN tunnel.
Data Options:
• Shared Secret—A text-based secret that is used to authenticate the IPsec tun-
nel (case sensitive).
• X.509 Certificate—X.509 certificates are used to authenticate the IPsec tunnel.
When using this authentication method, you must include the signing author-
ity’s certificate information in the SSL/TLS CA list and download it to the IOLAN.
Default: Shared Secret
IPv4 Remote IP Start Specify the first IPv4 address that can be assigned to incoming hosts through the
Address L2TP tunnel.
Field Format: IPv4 address
IPv4 Remote IP End Specify the end range of the IPv4 addresses that can be assigned to incoming
Address hosts through the L2TP tunnel.
Field Format: IPv4 address
Authentication Specify the authentication method that will be used for the L2TP tunnel.
Data Options: CHAP, PAP, Both
Default: Both
L2TP/IPsec Exceptions
Exceptions allow specific hosts or any host in a network to access the IOLAN outside of a VPN tunnel. This
is especially useful when allowing local network hosts access to the IOLAN when VPN tunnels have been
configured for remote user security.
Adding/Editing a VPN Exception
IP Address The IP address of the host that will communicate with the IOLAN outside of the
VPN tunnel.
Field Format: IPv4 or IPv6 address
Network The network address that will communicate with the IOLAN outside of the VPN
tunnel.
Field Format: IPv4 or IPv6 address
IPv4 Subnet Mask The IPv4 subnet mask for the IPv4 network.
Default: 0.0.0.0
IPv6 Prefix Bits The IPv6 prefix bits for the IPv6 network.
Range: 0-128
Default: 0
HTTP Tunneling
A HTTP tunnel is a firewall-safe communication channel between two IOLAN’s. HTTP tunnels can trans-
port arbitrary TCP/IP or UDP/IP data for applications such as Telnet/SSH or any other TCP application and
most UDP applications.
You can configure the IOLAN for:
• a serial-to-serial HTTP tunnel connection
• a serial-to-host HTTP tunnel connection
• a host-to-host HTTP tunnel connection
• Tunnel Relay connection
See Configuring a HTTP Tunnel for more information on setup requirements for these scenarios.
The information in this section applies only to setting up HTTP tunnels.
A minimum of two IOLAN’s must be configured to create a communication channel. One IOLAN must be
configured as the listener and the other IOLAN must be configured as the connecting IOLAN.
Configuring a HTTP Tunnel
Name Provide a name for this tunnel. This name must match the tunnel name on the
tunnel peer IOLAN DS.
Proxy Settings If a proxy server is being used, allows for the configuration of proxy specific
parameters.
Listen for Connections Listen for connection requests generated from the connecting IOLAN.
Shared Secret If a secret is defined, then both sides of the tunnel must set the same secret. A
secret is used to ensure that the Tunnel is being established with the correct peer.
HTTPS When enabled, secure access mode (HTTPS) will be used to establish the tunnel.
Restrict Access to this If enabled, tunnel connections will only be allowed to access local devices (serial
IOLAN only ports) on this IOLAN. Connection requests going to external IP hosts on the local
LAN will be not allowed.
Note: HTTPS mode requires that the SSL Passphrase is already defined in the IOLAN configuration and the
SSL/TLS certificate/private key and CA list must have already been downloaded to the IOLAN.
Port The HTTP/HTTPS port number of the Proxy server. Default: 8080.
Username The "username" which will be used by the Terminal Server to authenticate with
the proxy server (if authentication is required by the proxy server).
Password The "password" which will be used by the Terminal Server to authenticate with
the proxy server (if authentication is required by the proxy server).
Domain This field is only used if authentication is needed with the proxy server. If the
proxy server does not expect this field, it can be left blank.
Note: We support the following types of authentication; Local Windows account authentication (clear text, SPA)
and Digest authentication (MD5).
Ensure that your Proxy Server does not restrict HTTP-CONNECT messages to port 443 and allows
HTTP-CONNECT messages on Port 80
Maximum The maximum amount of time an HTTP connection will stay open in minutes. In
Connection Age most cases this value does not need to be changed.
Default: 1440 mins. (1 day).
Destination The address of an external host on the peer IOLAN’s LAN. If the destination is a
serial port on the Peer IOLAN or the peer IOLAN itself, select “Same as Tunnel”.
Predefined Services Select the service or services required. For predefined services, you must specify
an alias local IP address which will be used by the external host to access the
service.
Local Port The listening TCP/IP or UPD/IP port. This is the port the local host will be using.
Destination Port The port number used by the destination host or destination application.
Local IP Alias Users can access the HTTP tunnel through this IP address. Typically this field is
only needed if the IOLAN has a listener on the same local TCP port. If not entered,
the IP address of the IOLAN is used.
Delete button Highlight an HTTP Tunnel Destination entry and select the Delete button to
remove the entry from the list.
Note: When HTTP tunneling is used TCP and UDP ports 50,000 and above are reserved and should not be
configured by the user.
Network Services
Services and Daemons are based on your IOLAN model. Network services can be enabled and disabled.
Enable/Disable Services
Telnet Server Telnet daemon process in the IOLAN listening on TCP port 23.
Default: Enabled
TruePort Full Mode The TruePort daemon process in the IOLAN that supports TruePort Full Mode on
UDP port 668. You can still communicate with the IOLAN in Lite Mode when this
service is disabled.
Default: Enabled
SNMP SNMP daemon process in the IOLAN listening on UDP port 161 and sending traps
on UDP port 162.
Default: Enabled
DeviceManager DeviceManager daemon process in the IOLAN. If you disable this service, you will
not be able to connect to the IOLAN with the DeviceManager application. The
DeviceManager listens on port 33812 and sends on port 33813.
Default: Enabled
WebManager Secure WebManager daemon process in the IOLAN listening on port 443.
(HTTPS) Default: Enabled
If you are using the WebManager in secure mode (HTTPS), you need to download
the SSL/TLS private key and certificate to the IOLAN. You also need to set the SSL
Passphrase parameter with the same password that was used to generate the key.
See ESP Phase 2 Proposals for more information.
SSH Server SSH daemon process in the IOLAN listening on TCP port 22.
Default: Enabled
NTP/SNTP Client Simple Network Time Protocol client process in the IOLAN. NTP/SNTP client listens
on UDP port 123.
Default: Enabled
Dynamic Routing Dynamic Routing daemon process in the IOLAN listening on port 520/521.
(RIP) Default: Enabled
IPsec IPsec daemon process in the IOLAN listening and sending on UDP port 500.
Default: Disabled
Note: TCP ports 2601, 2602 and 2603 are used internally by the IOLAN.
Network Filtering
Allow Ping By default the IOLAN will respond to pings.
Responses Default: Enabled
File Name The file that you are going to download/upload to/from the IOLAN via TFTP.
Key Type Specify the type of authentication that will be used for the SSH session. The
following list details the keys that support each key type.
Data Options:
• RSA—Server SSH Public Key, SSH User Public Key, SSH User Private Key, SSH Host
Public Key
• DSA—Server SSH Public Key, SSH User Public Key, SSH User Private Key, SSH
Host Public Key
User Name The name of the user for whom you are downloading the SSH User Public or
Private Key to the IOLAN.
Host Name The name of the host for which you are downloading the SSH Host Public or
Private Key to the IOLAN.
IPsec Tunnel Name Select the IPsec tunnel that the RSA public key is being used to authenticate.
Clustering Parameters
Server Name Specify a name for the slave IOLAN in the clustering group. This name does not
have to correspond to the proper host name, as it is just used within the IOLAN.
Field Format: Maximum 15 alphanumeric characters, including spaces
IP Address Specify the IP address of the slave IOLAN in the clustering group.
Field Format: IPv4
Number of Ports Specify the number of ports in the Slave IOLAN that you are adding to the
clustering group.
Data Options: 1, 2, 4, 8, 16, 24, 36, 48
Default: 1
Starting Slave TCP Specify the first TCP Port number (as specified in the slave IOLAN’s serial port
Port configuration) on the slave host.
Default: 10001, and increments by one for each serial port
Starting Master TCP Specify the TCP port number you want to map the first slave IOLAN DS Port
Port number to. This number should not be a port number that is already in use by the
master IOLAN.
Default: 1024, and then increments by one for each new slave entry
Protocol Specify the protocol that will be used to access the slave IOLAN port.
Data Options: SSH, Telnet
Field Format: Telnet
Slave TCP Port Specify the TCP Port number configured on the Slave IOLAN that is associated to
the port number you are configuring.
Range: 1-99999
Master TCP Port Specify the TCP port number you want to map to the Slave IOLAN TCP Port. User’s
will use this TCP port number to access the Slave IOLAN’s port.
Default: 1024, and then increments by one for each new slave entry
Protocol Specify the protocol that will be used to access the port.
Data Options: SSH, Telnet
Default: Telnet
To An email address or list of email addresses that will receive the email notification.
Subject A text string, which can contain spaces, that will display in the Subject field of the
email notification.
From This field can contain an email address that might identify the IOLAN name or
some other value.
Reply To The email address to whom all replies to the email notification should go.
Outgoing Mail Server The SMTP host (email server) that will process the email notification request. This
can be either a host name defined in the IOLAN host table or the SMTP host IP
address.
HTTP Tunnel Specify the HTTP tunnel to be used for this connection.
Password Enter the password associated with the user configured in “Username”. Maximum
size of password is 64 characters.
Verify Peer When checked this will enable the validation of the certificate presented by the
Certificate email server. To validate the certificate, you will need to download the appropriate
CA list into the IOLAN. If the certificate is not found to be valid, the
communication with the email server will be terminated. No authentication will
take place and the email message will not be forwarded to the email server. If this
option is not checked, the certificate validation will still be attempted but if it fails,
a syslog message will be generated but the authentication and forwarding of the
email will still take place.
Default: Enabled if SSL or TLS encryption is selected. Disabled if no encryption is
selected.
TCP Port This is the TCP port used to communicate with the email server.
Default: 25 for non-SSL, 465 if SSL/TLS is used
NTLM Domain This field is only used if SPA authentication is performed with the email server. It
may or may not be required. If the email server does not expect this field, it can
be left blank.
Syslog
The IOLAN can be configured to send system log messages to a syslog daemon running on a remote host if
the Syslog service is activated. You can configure a primary and secondary host for the syslog information
and specify the level for which you want syslog information sent.
Note: You must ensure that the Syslog Client service in the Security, Services window is enabled (by default it
is enabled) for these settings to work.
Syslog Parameters
Primary Host The first preconfigured host that the IOLAN will attempt to send system log
messages to; messages will be displayed on the host’s monitor.
Default: None
Secondary Host If configured, the IOLAN will attempt to send system log messages to this syslog
host as well as the primary syslog host defined. Messages will be displayed on the
host’s monitor.
Default: None
Management
If you are using SNMP to manage/configure the IOLAN, or to view statistics or traps, you must set up a
User in SNMP version 3 or a Community in SNMP version 1,2 to allow your SNMP manager to connect to
the IOLAN; this can be done in the DeviceManager, WebManager and CLI. You must then load the perle-
sds.MIB (found on the Perle website at www.perle.com)file into your SNMP manager before you connect
to the IOLAN.
Note: Ensure that the SNMP service found in the Security, Services page is enabled (by default it is enabled).
SNMP Parameters
Contact The name and contact information of the person who manages this SMNP node.
Community The name of the group that devices and management stations running SNMP
belong to. Community only applies to SNMP v1 and v2c.
Internet Address The IP address of the SNMP manager that will send requests to the IOLAN. If the
address is 0.0.0.0, any SNMP manager with the Community name can access the
IOLAN. If you specify a network address, for example 172.16.0.0, any SNMP
manager within the local network with the Community name can access the
IOLAN.
Field Format: IPv4 or IPv6 address
V3 Read-write User This user can view and edit SNMP variables.
V3 Read-Write Select the security level for the Read-Writer user. This must match the
Security Level configuration set up in the SNMP manager.
Data Options:
• None—No security is used.
• Auth—User authentication is used.
• Auth/Priv—User authentication and privacy (encryption) settings are used.
Default: None
V3 Read-Only Select the security level for the Read-Only user. This must match the configuration
Security Level set up in the SNMP manager.
Data Options:
• None—No security is used.
• Auth—User authentication is used.
• Auth/Priv—User authentication and privacy (encryption) settings are used.
Default: None
V3 Read-Only Auth Specify the authentication algorithm that will be used for the read-only user.
Algorithm Data Options: MD5, SHA
Default: MD5
Trap Type Select between Trap and Inform. Inform requires the host receiving the trap to
acknowledge the receipt of the trap.
Community The name of the group that devices and management stations running SNMP
belong to. Community only applies to SNMP v1 and v2c
HTTP Tunnel Specify the HTTP tunnel to be used for this connection.
Timeout This is only used for Inform traps. Select the number of seconds to wait for the
acknowledgment of the trap.
Default: 1 second
Retries
V3 Trap User This field identifies the system sending the traps to the host receiving the traps.
Same user name is used for all traps sent by this system.
V3 Trap Security Select the security level for the V3 traps. This must match the configuration set up
Level in the SNMP manager.
Data Options:
• None—No security is used.
• Auth—Trap authentication is used.
• Auth/Priv—Trap authentication and privacy (encryption) settings are used.
Default: None
V3 Trap Auth Specify the authentication algorithm that will be used for the read-only user.
Algorithm Data Options: MD5, SHA
Default: MD5
V3 Trap Auth Type in the password associated with traps sent from this host.
Password
V3 Trap Confirm Re-enter the password associated with traps sent from this host.
Password
V3 Trap Privacy Specify the privacy algorithm (encryption) which will be used with traps.
Algorithm Data Options: DES, AES
Default: DES
V3 Trap Privacy Type in the password associated with the encryption method being used for traps.
Password
V3 Trap Confirm Re-type the password associated with the encryption method being used for traps.
Password
V3 Use Default When this field is selected, the firmware will use the default Engine ID. The default
EngineID Engine ID is the MAC address of the Ethernet interface to ensure that the Engine
ID is unique to this agent.
V3 Create EngineID The string entered in this field will be combined with the defined string in hex of
Using String 800007AE04 to form the Engine ID. Ensure each string is unique for each IOLAN on
your network.
Custom App/Plugin
You can create custom applications for the IOLAN by using the Perle SDK. See the SDK Programmer’s
Guide (the SDK and guide are accessible via a request form located on the Perle website at
www.perle.com/supportfiles/SDK_Request.shtml) for information about the functions that are sup-
ported. You must download the program and any ancillary files to the IOLAN and set the Serial Port Profile
to Custom App/Plugin to run a custom application. You must also specify the program executable in the
Command Line parameter.
A custom application or plugin can be run on the serial port. In this situation, the application will start
once the serial port is activated and operate solely on the context of that serial port and any network
communications related to that serial port. You could run a different custom application on each serial
port. The serial port custom application or plugin is configured by specifying the Custom App/Plugin pro-
file for the serial port.
The system level custom application or plugin will begin execution immediately following the system
startup. It runs on the context of the whole system and can access network communications as well as
any or all serial ports.
Custom App Parameters
Command Line The name of the application that has been already been downloaded to the
IOLAN, plus any parameters you want to pass to the program. For example, using
sample outraw program (this is sample program supplied with the SDK), you
would type:
outraw -s 0 192.168.2.1:10001 Acct:10001
if you were starting the application on the Server (notice the -s 0 parameter
specifies serial port 1 to this particular application).
Field Format: Maximum of 80 characters
Enable status auto- When enabled, the auto scroll feature on the front panel will scroll using the idle
scroll timeout and scroll delay options.
Default: Enabled
Custom Text Custom text may be entered here and is displayed on the front panel display.
Default: Perle Systems Ltd. IOLAN SCG
Keypad Locked When the keypad has been locked, there is no access from the front panel display.
Enable Pin When a pin is enabled, the user will be prompted to enter this pin when accessing
the Configuration and Administration menus on the front panel display.
Advanced Options
Review the configuration options in the Advanced page to determine if any of them apply to your
implementation.
Login Settings
Use System Name in Displays the System Name field value instead of default product name. When
Prompts enabled, the Server Name is displayed in the IOLAN login prompt, CLI prompt, and
WebManager login screen.
Default: Disabled
Display Login Banner This parameter concerns the banner information (product name/software
version). This banner information is presented to a user with a login prompt. For
security reasons, you can turn off the display of this information.
Default: Disabled
Use Custom Login When set, and a custom language file is in use, the login prompt and password
Prompt prompt will use the string defined in the language file as the login prompt and
password prompt instead of the default prompt,
login:
password:
Default: Disabled
Use a Generic When set, and the user connects to the IOLAN using WebManager, the
WebManager Login WebManager login screen that is displayed is generic — the Perle banner, IOLAN
Screen model name, and firmware version are not displayed to the user.
Default: Disabled
Password Retry Limit The number of attempts a user is allowed to enter a password for a serial port
connection from the network, before the connection is terminated and the user
has to attempt to login again. For users logging into the serial port, if this limit is
exceeded, the serial port is disabled for 5 minutes. A user with Admin level rights
can restart the serial port, bypassing the timeout, by issuing a kill on the disabled
serial port.
Default: 3
EasyPort Web Select Java if communication is via port 23(Telnet) or port 22(SSH) and the IOLAN
is not restricted by a firewall.
Select Javascript if you need to communicate through a firewall on port 8080 using
EasyPort Web.
Disable Caching When this option is selected, the Web Manager will no longer cache web pages.
Default: Caching
Bootup Files
You must have a SFTP/TFTP server running on any host that you are downloading files from. When you
specify the file path, the path must be relative to the default path set in your SFTP/TFTP server software.
Bootup File Parameters
Firmware Host The host name or IP address of the server that contains the firmware file. If you
use a host name, it must exist in the IOLAN’s host table or be resolved by DNS.
Field Format: Resolvable host name, IPv4 address, IPv6 address
Firmware File The path and file name, relative to the default path of your TFTP server software,
of the update software for the IOLAN that will be loaded when the IOLAN is
rebooted.
Firmware, Use SFTP Check this box if you wish to use SFTP (Secure File Transfer Protocol) instead of
TFTP (Trivial File Transfer Protocol). The IOLAN will use the SFTP server
information entered under the SFTP tab.
Configuration Host The host name or IP address of the server that contains the configuration file. If
you use a host name, it must exist in the IOLAN’s host table or be resolved by DNS.
Field Format: Resolvable host name, IPv4 address, IPv6 address
Configuration, Use Check this box if you wish to use SFTP (Secure File Transfer Protocol) instead of
SFTP TFTP (Trivial File Transfer Protocol). The IOLAN will use the SFTP server
information entered under the SFTP tab.
Filename The path and file name, relative to the default path of your TFTP server software,
of the file that contains a string that is displayed when a user connects to the
IOLAN. The IOLAN will look for the file internally (it must already be downloaded),
if only the file is specified (no TFPT host) or the file cannot be found on the
specified TFPT host.
HTTP Tunnel Specify the HTTP tunnel to be used for this connection.
Use SFTP Check this box if you wish to use SFTP (Secure File Transfer Protocol) instead of
TFTP (Trivial File Transfer Protocol). The IOLAN will use the SFTP server
information entered under the SFTP tab.
Display MOTD in When enabled, displays the Message of the Day to users who are logging into
WebManager/ WebManager or EasyPort Web.
EasyPort Web Default: Disabled
TFTP Parameters
Retry The number of times the IOLAN will retry to transmit a TPFT packet to/from a host
when no response is received. A value of 0 (zero) means that the IOLAN will not
attempt a retry should TFTP fail.
Range: 0-5
Default: 5
Timeout The time, in seconds, that the IOLAN will wait for a successful transmit or receipt
of TFTP packets before retrying a TFTP transfer.
Range: 3-10
Default: 3 seconds
FTP Host Select the host entry from the IOLANs host table which corresponds to the FTP
server.
HTTP Tunnel Specify the HTTP tunnel to be used for this connection.
Cycle Turns all the RPS plugs off and then on.
Reset to Default Resets all the RPS plugs to the default state as configured in the Power
State Management profile settings.
Plug Control Displays a window that allows you to manage the individual plugs on the RPS.
Plug Control
When you select the Plug Control button, you can power on/off individual plugs.
The “Power Status” field above can contain the following values;
• On - Power is currently being applied to the plug.
• Off - Power is currently not being applied to the plug.
The “Monitor Host Status” field above can contain the following values;
• Disabled - Feature is currently disabled.
• Discovering- Host has never responded to a PING. After a PING response is received once, the
status will not return to “discovering until a reboot is performed or a “kill line” is issued on this
port.
Monitor Host If host monitoring has been enabled on this plug, these buttons control the state
of the feature as follows;
On Button - Enables the host monitor function.
Off Button - Disables the host monitor function.
Reset Statistics Button - Resets the “# reboots” and “Last Reboot” fields
Power Plug Status Displays a window that provides the plug status for every plug associated with the
serial port.
WLAN Control
Scan
Scan The IOLAN will scan the network for any broadcasting AP with the same SSID and
security type.
SSID Name or the network name assigned to the IOLAN when in Soft-AP mode.
RSSI A measurement of the power level of the received radio signal (in dBm) of the
currently associated AP averaged over time. Values less than or equal to 95 dBm
have no signal strength. Values greater than or equal to 35 dBm are at 100 percent
signal strength.
BSSID Shows whether the IOLAN is connected to this BSSID (Access Point’s MAC
Address).
Channel Displays the channel number that the IOLAN is using to connect to the AP.
Value: (1-11 channels use 2.4GHz) and (36, 40, 44, 48 channels use 5GHz).
Network type scan The network type displayed will be Infrastructure or Ad Hoc. The IOLAN cannot
connect to Ad Hoc networks.
Security Displays the security type used for this connection between the IOLAN and the AP.
Start WPS
Start WPS The IOLAN will scan (120 seconds) all networks to find the closest AP that is
currently in WPS mode. The IOLAN will exchange credentials with that AP and
then create an internal wireless profile (association) and will then exit WPS mode.
Restart WLAN
Restart All WLANs will be stopped and any new configured WLAN parameters will be
applied before the WLANs are restarted.
WWAN Control
Restart WWAN
Restart Restart the WWAN connection.
Note:1-10 key ID entries are allowed in this NTP/SNTP key file. Both MD5 and SHA1 are
supported. Key ID 0 is excluded.
1. In the Backup group box, select the format (Binary or Text) in which you want to save the file.
Either file format can be imported into the DeviceManager and downloaded to the IOLAN in
the future.
2. Select the Backup Configuration button.
Downloading Configuration Files
You can download a configuration file to the IOLAN by doing the following:
In DeviceManager:
1. Connect to the IOLAN to retrieve the current configuration file.
2. Open the configuration file you want to download to the IOLAN by selecting File, Import
Configuration from a File and then browsing to the configuration file. This will replace the
retrieved configuration file.
3. Select Tools, Download Configuration to IOLAN or select the Download All Changes
button.
4. Reboot the IOLAN.
5. In WebManager:
6. In the navigation tree, select the Administration option.
7. In the configuration area, select the Backup/Restore button.
8. Select the tab corresponding to the transfer method you wish to use. The options are;
• Web - Uses HTTP to transfer the data
• TFTP - Uses Trivial File Transfer Protocol to transfer the data
Server Name The name of the IOLAN. The IOLAN name that you put in this field is passed into
the configuration before it is downloaded to the IOLAN and cannot be left blank.
Reboot Server Determines whether or not the IOLAN is rebooted after it has received the new
configuration. The new configuration definitions will not go into effect until the
IOLAN is rebooted.
3. Select Add to add the IOLAN to the download list. You can also select on the IOLAN entry
and edit any information and then select Update to make the edits permanent.
4. Select the Download> button to start the download process. A status window will display with
the configuration download status.
Less than 3 seconds Blinking amber Reboots. All configuration and files will
remain the same.
Between 3 and 10 seconds Blinking amber, then Reboots and resets the configuration
turns solid amber to the factory default (either the Perle
when you release the or custom default configuration). All
RESET button configuration, user IDs, passwords and
security certificates are deleted.
Over 10 seconds Blinking amber, then Reboots and resets the configuration
turns solid amber to the Perle factory default configura-
when you release the tion. All configuration, user IDs, pass-
RESET button words and security certificates are
deleted, even if a custom default
configuration has been defined.
Time The IOLAN’s internal clock time, based on your PC’s time zone. For example, if your
PC’s time zone is set to Pacific Standard Time (GMT -8:00) and the IOLAN’s time
zone is set to Eastern Standard Time (GMT -5:00), the IOLAN’s time is three hours
ahead of your PC’s time. If you set the IOLAN’s time to 2:30 pm, the IOLAN’s actual
internal clock time is 5:30 pm.
Use the PCs Date/ When enabled, sets the IOLAN’s time to the PCs time.
Time Default: Enabled
This option is unique to the DeviceManager.
Note: If you download a new software version, you can continue to use your language
unchanged; however, we recommend translating the new strings, which will be added to
the end of the language file. A Reset to Factory Defaults will reload the Customlang
as English.
On successful download, the Customlang in the IOLAN will be overwritten by the new
language.
Translation Guidance
To help you with your translation, of supplied ASCII text language files we offer the following guidance:
• The IOLAN will support languages other than English (and the supplied German and French
languages). The English language file, english.txt, displays the character length of each line
at the beginning of the line. If a translated line goes over that character length, it will be dis-
played truncated in the CLI.
• Translate line for line, do not omit lines if you do not know the translation; leave the original
untranslated text in place. Also, you must maintain the same sequential order of lines. It is a
good practice to translate the file using a text editor that displays line numbers, so you can
periodically verify that the line sequence has not changed from the original file (by comparing
it to the original file).
• Keep all translations in quotes, otherwise the line will not display properly.
• Each line must end with a carriage return.
• If a line contains only numbers, for example 38400, leave that line in place, unchanged (unless
you are using a different alphabet).
Updating Language Files
Updated language files can be found on the Perle website at www.perle.com.
Note: The upgrade of your software (firmware) will not change the display of the language in the CLI.
For example:
term=AT386 | at386| 386AT |386at |at/386 console
acsc=jYk?lZm@qDtCu4x3
bold=\E[1m
civis=
clear=\E[2J\E[H
cnorm=
cup=\E[%i%p1%02d;%p2%02dH
rev=\E4A
rmacs=\E[10m
rmso=\E[m
smacs=\E[12m
smso=\E[7m
page=
circ=n
Note: As you can see from the example, capabilities which are not defined in the terminfo file must still be
included (albeit with no value). Each entry has an 80 character limit.
On some versions of UNIX, some of the capabilities are appended with a millisecond delay (of the form
$<n>). These are ignored by the IOLAN and can be left out.
The ‘acsc’ capability, if defined, contains a list of character pairs. These pairs map the characters used by
the terminal for graphics characters to those of the standard (VT100) character set.
(where x must be substituted by the character used by the terminal). These are the box-drawing characters
used to display the forms and menus of Menu mode. They must be entered in this order.
The last two capabilities will not be found in the terminfo file. In the page field you must enter the escape
sequence used by the terminal to change screens. The circ field defines whether the terminal can use
previous page and next page control sequences. It must be set to y or n. These capabilities can be found
in the documentation supplied with the terminal.
Accounting Message
This section describes the attributes which will be included by the IOLAN when sending an accounting
message to the RADIUS server.
Type Name Description
1 User-Name The name of the user to be authenticated.
4 NAS-IP-Address IP Address of IOLAN LAN interface.
5 NAS-Port If the user is connected to a physical port then the
port number of the port is sent. If the user is
connected to the IOLAN itself then a port number
of 0 is sent.
# Perle Extensions
...
TACACS+
Although TACACS+ can be used strictly for external authentication, it can also be used to
configure Serial Port and User parameters. Therefore, when a user is being authenticated using
TACACS+, it is possible that the user’s configuration is a compilation of the parameters passed
back from the TACACS+ authentication server, the User’s IOLAN parameters if the user has
also been set up as a local user in the IOLAN, and the Default User’s parameters for any
parameters that have not been set by either TACACS+ or the User’s local configuration.
User and Serial Port parameters can be passed to the IOLAN after authentication for users
accessing the IOLAN from the serial side and users accessing the IOLAN from the Ethernet side
connections.
Service = EXEC
{
priv-lvl = x # x = 12-15 (Admin)
# x = 8-11 (Normal)
# x = 4-7 (Restricted)
# x = 0-3 (Menu)
Perle_User_Service = x # x = 0 Telnet
# x = 1 Rlogin
# x = 2 TCP_Clear
# x = 3 SLIP
# x = 4 PPP
# x = 5 SSH
# x = 6 SSL_RAW
# If not specified, command prompt
}
service = telnet
{
addr = x.x.x.x # ipv4 or ipv6 addr
port = x # tcp_port #
}
service = rlogin
{
addr = x.x.x.x # ipv4 or ipv6 addr
}
service = tcp_clear
{
addr = x.x.x.x # ipv4 or ipv6 addr
port = x # tcp_port #
}
service = slip
{
routing=x # x = true (Send and Listen)
# x = false (None)
addr = x.x.x.x # ipv4 addr
}
service = ssh
{
addr = x.x.x.x # ipv4 or ipv6 addr
port = x # tcp_port #
}
service = ssl_raw
{
addr = x.x.x.x # ipv4 or ipv6 addr
port = x # tcp_port #
}
Perle_Clustered_Port_Access=x # x = 0 (Disabled)
# x = 1 (Enabled)
}
Note: Users who are accessing the IOLAN through WebManager or DeviceManager and are being
authenticated by TACACS+ must have the Admin privilege level and the TACACS+ service
level must be set to EXEC.
Network
IOLAN Settings
Update DynDNS.com
with new Public IP
DynDNS.com address
NAT
Network
IP:
IOLAN Settings
Default Gateway:
192.168.1.1
Power Management
If you have purchased a Perle RPS (Remote Power Switch) and have it connected to a IOLAN’s serial port,
you can manage the plugs on the RPS through the DeviceManager, CLI, or the WebManager’s EasyPort
Web.
In the following example, in the following scenario, the Perle RPS is connected to serial port 1 and there
are various other Unix servers connected to the other serial ports. Each Unix server and its monitor is
plugged into the RPS so that they can be managed through the power switch if, for example, the server
should become remotely inaccessible.
Engineering
172.16.54.161
4:Unixware
2: Linux
3: Solaris
The Line settings for serial line 1 are set to Service Power Management. The Power Management settings
are configured to reflect the device (by device name) plugged into each RPS plug and its associated serial
line (this allows a user to connect directly to a port and manage the power for all the devices associated
with that port).
From EasyPort Web, a user can either manage the entire RPS unit by selecting the Manage RPS button for
Serial Port 1:
Or a user can mange the plugs associated with a serial line by selecting on the Device Power button for
that serial.
perle
Network
After configuring the Server parameters (Server Name, IP Address, Ethernet and Serial interfaces, etc.), the
Line Service is set to Sil Raw, which creates an automatic, continuous connection between the Card
Reader and its associated application on the Security host (though the IOLAN), by specifying the Security
host name (which must already be configured in the IOLAN’s Host Table) and TCP/IP port number. There-
fore, the Card Reader can make a request to the Security host card reader application for employee verifi-
cation, also logging access time, employee name, etc., and the Security host application can send back a
code that does or does not unlock the door.
Creating User Sessions
Sessions are defined for users who are coming in through a serial device and are connecting to a host on
the LAN.
Users who have successfully logged into the IOLAN (User Service set to DSprompt) can start up to four
login sessions on LAN hosts. These users start sessions through the Menu option Sessions.
Multiple sessions can be run simultaneously on the same host or on different hosts. Users can switch
between different sessions and also between sessions and the IOLAN using hotkey commands.
Users with Admin or Normal privileges can define new sessions and connect through them, even configure
them to start automatically on login to the IOLAN. Restricted and Menu users can only start sessions pre-
defined for them by the Admin user.
Users can be configured to have access to a specific port and access modes for this port, such as Read/
Write (RW), Read Input (RI), Read Output and Read Both (RI & RO).
Configuring Modbus
This sections provides a brief overview of the steps required to configure the IOLAN for your Modbus
environment.
Configuring a Master Gateway
To configure a Master Gateway (Modbus Master connected to the serial side of the IOLAN), do the
following:
1. Set the serial port that is connected to the serial Modbus Master to the Modbus Gateway
profile.
2. In the Modbus Gateway profile on the General tab, set the Mode to Modbus Master.
3. Still on the General tab, select the Destination Slave IP Mappings button to map the Modbus
Slave’s IP addresses and their UIDs that the serial Modbus Master will attempt to
communicate with.
4. For specialized configuration options, select the Advanced tab and configure as required.
Configuring a Slave Gateway
To configure a Slave Gateway (Modbus Master resides on the TCP/Ethernet network), do the following:
1. Set the serial port that is connected to the serial Modbus Slave(s) to the Modbus Gateway
profile.
2. In the Modbus Gateway profile on the General tab, set the Mode to Modbus Slave.
Modbus
Serial
Master
EIA-232
TCP
Network
IOLAN EIA-422/485
Modbus Master
Modbus
Modbus
Modbus Master
Serial Modbus
Slave Gateway
EIA-232
TCP
Network
IOLAN EIA-422/485
Modbus Slave
IP: 10.10.10.12
UID: 23
Master
TCP Serial EIA-232
Network
IOLAN
EIA-422/485 Modbus Master
IP: 10.10.10.10
The IOLAN will send a request and expect a response from the Modbus Slave with an IP Address of
10.10.10.11 on Port 502 with UID 22 and from the Modbus Slave with and IP Address of 10.10.10.12 on
Port 502 with UID 23 (remember when Type is set to Host, the IOLAN increments the last octet of the IP
address for each UID specified in the range).
Modbus Slave Settings
Modbus Master
Slave Gateway
TCP Serial Port 1
Network
EIA-422/485
IOLAN
IP: 10.10.10.10
Modbus
Modbus Master UID: 7
Modbus
UID: 6 Modbus
UID: 8
To configure the Modbus Gateway on serial port 1, do the following:
1. Select the Modbus Gateway profile for serial port 1.
2. On the General tab, enable the Modbus Slave parameter.
3. On the General tab, specify the UID Range as 6-8 as shown below:
Select the Advanced Slave Settings button to verify that the default settings are acceptable.
perle
IOLAN
Local Host
204.16.0.0
Example shows IOLAN
configuration Network
perle
Remote Host
204.16.25.72
If you want to configure a serial port to use PPP dial on demand, do the following:
1. Create an entry for the modem and its initialization string (Serial, Advanced, Modems tab).
2. Set the serial port to Remote Access (PPP).
3. In Remote Access (PPP), select the Advanced tab. Enable the Connect option and select Dial
Out. Set the Modem parameter to the modem you just added. Enter the Phone number that
the modem will be calling.
4. Still on the Advanced tab, set the Idle Timeout parameter to a value that is not zero (setting
this value to zero creates a permanent connection).
5. On the General tab, enter one of the following:
• A Local and/or Remote IPv4 Address
• A Local and/or Remote IPv6 Interface Identifier
Note: .that this IP address or interface identifier should be on its own unique network; that is not part of the
local or remote networks.
In this example, the local network has an IPv4 address of 172.16.0.0/16 and the remote network has an
IPv4 address of 204.16.0.0/16, so we arbitrarily assigned the PPP IPv4 Local IP Address as 195.16.20.23
and the PPP IPv4 Remote IP Address as 195.16.20.24.
Next you need to create a gateway and destination route entry. Select Network, Advanced, and the Route
List tab.
For the destination, if you want the connection to be able to reach any host in the remote network, set
the Type to Network and specify the network IP address and subnet/prefix bits; if you want the connection
to go directly to a specific remote host, set the Type to Host and specify the host’s IP address.
We also need to create a Gateway entry using the same PPP IPv4 local IP address. Any traffic that goes
through the gateway will automatically cause PPP to dial out:
Internet
172.16.45.1 172.16.45.9 192.168.45.9
Left IPsec Tunnel--Encrypted Data 192.168.45.4
Unencrypted
Data
192.168.45.8 192.168.45.1
or just
<keydata>
For example:
Note that the pound sign (#) indicates a comment line and all characters in that line are
ignored. The key value itself should not have an carriage returns.
2. In the DeviceManager, select Tools, Advanced, Keys and Certificates. In the WebManager,
select Tools, Administration, Keys/Certificates. Download the RSA signature public file (for the
Remote VPN Gateway) to the DeviceManager, specifying the IPsec tunnel it’s for:
In the same Keys and Certificates window, upload the IOLAN’s RSA signature public key:
Install the IOLAN’s public key in the remote VPN gateway for the Serial_Devices IPsec tunnel.
Enable the IPsec service found in Security, Services.
Network-to-Network
The following examples shows how to configure a network-to-network IPsec tunnel. This example uses
the X.509 Certificate authentication method, so it includes the configuration requirements for the X.509
certificate. NAT Traversal (NAT_T) is enabled in this example (on both sides) because the VPN tunnel is
going private network to public network to private network. Notice also that the serial devices connected
to the IOLAN can be accessed by the VPN tunnel, since they are included in the network configuration as
part of the 172.16.45.0 subnetwork.
192.168.45.8 192.168.45.1
172.16.45.23 172.16.45.8
2. Select the Remote Validation Criteria button and enable and populate the fields that are
required for the remote X.509 certificate validation. If you just want to validate the X.509
certificate signer, you do not need to enable any of the remote validation criteria fields.
3. If the signer of the remote X.509 certificate has not already been included in the CA list file
that has already been downloaded to the IOLAN, you need to add (append) the signer of the
X.509 certificate to the CA list file and then download the file to the IOLAN by selecting Tools,
Advanced, Keys and Certificates. In the Keys and Certificates window, select Download SSL/
TLS CA and the file name and select OK. Note that this file must be a concatenation of all
certificate signers required for any SSL/TLS, LDAP, SSH, and/or IPsec connections.
4. Enable the IPsec service found in Security, Services.
172.16.45.23 192.168.45.8
%defaultroute is entered for the Local IP Address because the IP address is DHCP assigned and is
therefore subject to change.
%defaultroute is entered for the Local IP Address because the IP address is DHCP assigned and is there-
fore subject to change.
%any is entered for the Remote IP Address to indicate that it will accept a VPN connection from any host/
network; this is necessary because the Left IOLAN VPN gateway is DHCP assigned and cannot be known.
Also note that Boot Action on the Left IOLAN VPN gateway is set to Start, meaning that it will try to initiate
the VPN connection, while the Boot Action on the Right IOLAN VPN gateway is set to Add, which will listen
for a VPN connection request.
Enable the IPsec service found in Security, Services.
VPN Client-to-Network
The following example shows how to configure a VPN client-to-network IPsec tunnel. In this example, the
IOLAN will accept VPN connections from multiple VPN clients on private networks that want to access the
public 199.24.0.0 subnetwork through the VPN gateway. NAT Traversal (NAT_T) is disabled in this example
(on both sides) because the VPN tunnel is going private network to public network.
Initiate Communication
VPN Client Broadband
Router Router
Internet Right
172.16.45.45 172.16.45.9 199.24.10.1 199.24.10.10
IPsec Tunnel--Encrypted Data
Unencrypted
Data
199.24.45.87 199.24.45.1
Configure the IPsec tunnel in the IOLAN:
The Remote IP Address field is set to any to allow any VPN client to communicate in the IPsec tunnel that
can validate the Secret. Also, the Remote Host/Network field is configured for 0.0.0.0 to allow any remote
peer private IP address (RFC 1918—10.0.0.0/8, 172.16.0.0./12, 192.168.0.0/16) access to the IPsec tunnel.
Lastly, the Boot Action is set to Add to listen for an IPsec tunnel connection.
Serial-to Serial
The following example will demonstrate how to set up a serial device (VT100 Terminal) to serial device
(Linux host, console port) connection via an HTTPS tunnel. HTTPS will be used because data security is
required. Because IOLAN 1 is behind the firewall, it will need to initiate the HTTP tunnel connection.
See parameters for
Configure a “Listen for connection” HTTP tunnel on IOLAN 2
On IOLAN 1, under Serial port configuration, select serial ports and configure for Terminal profile.
Protocol - Telnet
Select tunnel1
On IOLAN 2, under serial port configuration, select serial port and configure for Console Management
profile.
Protocol - Telnet
TCP port number
must match TCP
port number on
IOLAN 1
Serial-to Host
The following example will demonstrate how to setup a serial device (Point of Sale terminal) to an IP host
(100.10.60.3) connection via an HTTP tunnel. Because IOLAN 1 is behind the firewall, it will need to
initiate the tunnel connection to IOLAN 2. At the application level, the serial device will initiate the con-
nection with the IP host.
For more HTTP tunneling configuration parameters see Configuring HTTP Tunnels.
System/Device
TCP Sockets Point of Sale
IOLAN 1 IOLAN 2
10.10.50.2 100.10.50.1
10.10.60.3 Serial Device
HTTP Tunnel Data
IP address of IOLAN 2
For more HTTP tunneling configuration parameters see Configuring HTTP Tunnels.
10.10.50.2 100.10.50.1
10.10.100.2 100.10.50.60
IP address of IOLAN 2
Select predefined
tunnel entry
IP address of TFTP
Server
Select UDP
Destination Port
number for TFTP
packets
Tunnel Relay
The following example will demonstrate how to setup an IP host (10.10.10.10) to an IP Host (10.10.11.11)
connection using HTTP tunnels when both hosts are sitting behind a firewall. To do this, a third IOLAN
which is not behind a firewall is required.
Because IOLAN 1 and IOLAN 3 are both behind a firewall, each will need to initiate a connection to
IOLAN2 who is in the open.
For more Tunnel Relay configuration parameters see Serial Tunneling General Parameters.
IP address of IOLAN 2
IP address of IOLAN 2
IP address of IOLAN 2
Select tunnel1
Select TCP
Select tunnel2
IP address of final
destination Telnet host
Select TCP
Destination port set
to 23 for Telnet
protocol
Key- Key-
Full Name Exchange Auth Encryption Size HMAC
EDCHE-ECDSA-AES256- Kx=ECDH Au=ECDSA Enc=AES- 256 Mac=SHA384
GCM-SHA384 GCM
ECDHE-ECDSA-AES256- Kx=ECDH Au=ECDSA Enc=AES 256 Mac=SHA384
SHA384
ECDHE-ECDSA-AES256- Kx=ECDH Au=ECDSA Enc=AES 256 Mac=SHA1
SHA
DHE-DSS-AES256-GCM- Kx=DH Au=DSS Enc=AES- 256 Mac=SHA384
SHA384 GCM
DHE-RSA-AES256-GCM- Kx=DH RSA Enc=AES- 256 Mac=SHA384
SHA384 GCM
DHE-RSA-AES256- Kx=DH RSA Enc=AES 256 Mac=SHA256
SHA256
AES256-GCM-SHA384 Kx=RSA RSA Enc=AES- 256 Mac=SHA384
GCM
AES256-SHA256 Kx=RSA RSA Enc=AES 256 Mac=SHA256
DHE-DSS-AES256- Kx=DH DSS Enc=AES 256 Mac=SHA256
SHA256
DHE-RSA-AES256-SHA Kx=DH RSA Enc=AES 256 Mac=SHA1
DHE-DSS-AES256-SHA Kx=DH DSS Enc=AES 256 Mac=SHA1
ADH-AES256-GCM- Kx=DH None Enc=AES- 256 Mac=SHA384
SHA384 GCM
ADH-AES256-SHA256 Kx=DH None Enc=AES 256 Mac=SHA256
ADH-AES256-SHA Kx=DH None Enc=AES 256 SHA1
AES256-SHA Kx=RSA Au=RSA Enc=AES 256 Mac=SHA1
ECDHE-RSA-AES128- Kx=ECDH Au=RSA Enc=AES- 128 Mac=SHA256
GCM-SH256 GCM
Network Serial
perle
Decoder
If you are using Port Buffering NFS Encryption, you need to run the Decoder utility to view the port buffer-
ing logs. See the Readme file to install the Decoder utility on any of the following 32-bit platforms.
• Windows® 2000 and greater platform
Note: The Windows/DOS platform restricts the converted readable file to an 8.3 filename limitation.
• DOS
• Solaris x86
• Solaris Sparc 32-bit/64-bit
• Linux x86 v2.4.x
The following procedure will allow you to use the Modbus remapping feature:
Create a configuration file
• The file must be called "modbus.remap"
• One translate rule per line
• The fields on a line are separated by a comma
Line format for one UID is:
• port,master_uid,slave_uid
• port: is the IOLAN port number that the slave is connected to
• master_uid: is the UID that the TCP Modbus Master uses
• slave_uid: is the UID that the Modbus slave uses
Line format for UID ranges is:
• port,master_start-master_end,slave_start-slave_end
• port: is the IOLAN port number that the slave is connected to
• master_start: is the first master UID in the range
• master_end: is the last master UID in the range
• slave_start: is the first slave UID in the range
• slave_end: is the last slave UID in the range
Configuring the Modbus UID Remapping Feature
1. On the serial port Modbus Gateway, configure Modbus slave. Configuration parameters such
as “UID range” and UID Address Mode will be ignored in this mode of operation
2. Download the "modbus_remap" file that you created to the IOLAN using:
3. Device Manager: use "tools-advanced-custom files" dialog "download other file"
4. Web Manager: use "administration-custom files" page "other file"
• CLI: use the command "netload customapp-file" command
• See all network problems at a glance and take appropriate action