Lantronix 900-598 manual Security in Detail, Public Key Infrastructure, Digital Certificates

Page 95

14: Security in Detail

Public Key Infrastructure

Public Key Infrastructure (PKI) is based on an encryption technique that uses two keys: a public key and private key. Public keys can be used to encrypt messages which can only be decrypted using the private key. This technique is referred to as asymmetric encryption, as opposed to symmetric encryption, in which a single secret key is used by both parties.

TLS (SSL)

Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), use asymmetric encryption for authentication. In some scenarios, only a server needs to be authenticated, in others both client and server authenticate each other. Once authentication is established, clients and servers use asymmetric encryption to exchange a secret key. Communication then proceeds with symmetric encryption, using this key.

SSH and some wireless authentication methods on the PremierWave XC make use of SSL. The PremierWave XC supports SSLv2, SSlv3, and TLS1.0.

TLS/SSL application hosts use separate digital certificates as a basis for authentication in both directions: to prove their own identity to the other party, and to verify the identity of the other party. In proving its own authenticity, the PremierWave XC will use its own "personal" certificate. In verifying the authenticity of the other party, the PremierWave XC will use a "trusted authority" certificate.

In short:

When using EAP-TLS, the PremierWave XC needs a personal certificate with matching private key to identify itself and sign its messages.

When using EAP-TLS, EAP-TTLS or PEAP, the PremierWave XC needs the authority certificate(s) that can authenticate those it wishes to communicate with.

Digital Certificates

The goal of a certificate is to authenticate its sender. It is analogous to a paper document that contains personal identification information and is signed by an authority, for example a notary or government agency. With digital certificates, a cryptographic key is used to create a unique digital signature.

Trusted Authorities

A private key is used by a trusted certificate authority (CA) to create a unique digital signature. Along with this private key is a certificate of authority, containing a matching public key that can be used to verify the authority's signature but not re-create it.

A chain of signed certificates, anchored by a root CA, can be used to establish a sender's authenticity. Each link in the chain is certified by a signed certificate from the previous link, with

PremierWave XC User Guide

95

Image 95
Contents XC User Guide Disclaimer WarrantyCopyright & Trademark ContactsRevision History FCC Part 15.21 StatementFCC RF Radiation Exposure Statement Introduction Table of ContentsUsing This Guide Installation of PremierWave XCLine and Tunnel Settings Using DeviceInstallerConfiguration Using Web Manager Network SettingsSecurity Settings Terminal and Host SettingsServices Settings Advanced Settings Maintenance and Diagnostics SettingsBranding the PremierWave XC 100 EventsSecurity in Detail Updating FirmwareAppendix C Compliance 107 Troubleshooting 102List of Tables List of FiguresList of Tables Chapter Description Using This GuidePurpose and Audience Summary of ChaptersDocument Description Additional DocumentationApplications Key FeaturesIntroduction Protocol Support Troubleshooting CapabilitiesConfiguration Methods IP Address Addresses and Port NumbersProduct Information Label Hardware AddressProduct Label User-Supplied Items Installation of PremierWave XCPackage Contents PremierWave XC Male DB9 DTE Serial Ports Hardware ComponentsBack Panel Reset ButtonSerial PowerTop Panel Side Panel Connector DescriptionBottom Panel Installing the PremierWave XCPremierWave XC Connections 11 PremierWave XC Dimensions Device Detail Summary Using DeviceInstallerAccessing PremierWave XC using DeviceInstaller Current Settings Description Firmware Upgradable Telnet SupportedTelnet Port Web PortAccessing Web Manager Configuration Using Web ManagerDevice Status Device StatusLayout of a typical Web Manager page is below Web Manager Page ComponentsWeb Manager Description See Navigating the Web ManagerSyslog NetworkProtocol Stack Query PortTo Configure WAN Connection Settings Network SettingsWAN Connection Settings Ddns SettingsNetwork Interface Description Settings Network 1 Interface SettingsTo View or Configure Ddns Settings Setting / Field DescriptionDhcp Client ID Default GatewayDhcp Client HostnameTo View Network 1 Interface Status Network 1 Link SettingsTo Configure Network 1 Interface Settings Network 1 Ethernet eth0 Description Link SettingsNetwork 2 Interface Status Network 2 SMS Outbound SettingsTo Configure Network 1 Link Settings Network 2 wwan0 Description SMS Outbound SettingsTo Configure Network 2 SMS Outbound Settings Network 2 SMS Inbound SettingsNetwork 2 wwan0 Description Roam Settings Network 2 Roam SettingsTo Configure Network 2 SMS Inbound Settings Network 2 wwan0 Description SMS Inbound SettingsNetwork 2 wwan0 Description GSM/GPRS Settings Network 2 GSM/GPRS Bands SettingsTo Configure Network 2 Roam Settings To Configure Network 2 GSM/GPRS bands SettingsNetwork 2 wwan0 Description SIM Pin Settings Network 2 SIM Pin SettingsTo Configure Network 2 SIM Pin Settings Enter Access Point Name APN Network 2 APN Configuration SettingsTo Configure Network 2 APN Configuration Settings Network 2 wwan0 Description APN Configuration SettingsNetwork 2 SMS Statistics Network 2 Carrier Connection SettingsTo Configure Network 2 Carrier Connection Settings Network 2 wwan0 Description Carrier Connection Settings6Network Settings Line Settings Description Line and Tunnel SettingsLine Settings ConfigurationLine Command Description Mode Settings Command ModeEcho Serial String To Configure Line SettingsStatistics To View Line Statistics Serial StringTunnel Serial Description Settings Tunnel SettingsSerial Settings Tunnel Packing Description Mode Settings To Configure Tunnel Serial SettingsPacking Mode Local Port To Configure Tunnel Packing Mode SettingsAccept Mode Tunnel Accept Mode Description SettingsTo Configure Tunnel Accept Mode Settings Reconnect Timer Connect ModeTunnel Connect Description Mode Settings Connect To Configure Tunnel Connect Mode SettingsFlush Serial Data Email onTunnel Disconnect Mode Description Settings Disconnect ModeTo Configure Tunnel Disconnect Mode Settings Modem Emulation Tunnel Modem Emulation Description SettingsTo View Tunnel Statistics To Configure Tunnel Modem Emulation SettingsStatistics Terminal on Network Description Line Settings Terminal and Host SettingsTerminal Settings To Configure the Terminal Line Connection Host ConfigurationTo Configure the Terminal Network Connection Remote Address To Configure Host SettingsHost Settings Description SSH UsernameTo View or Configure DNS Settings Services SettingsDNS Settings Syslog Settings Description FTP SettingsSyslog Settings To Configure FTP SettingsHttp Settings Description Http SettingsTo View or Configure Syslog Settings Enter the Uniform Resource Identifier URI To Configure Http SettingsHttp Authentication Description Settings Auth Type To Configure Http AuthenticationRSS Settings Description RSS SettingsTo Configure RSS Settings Certificate and Key Generation Security SettingsSSL Settings Certificate Generation Description SettingsTo Create a New Credential New Certificate Certificate Upload SettingsTo Configure an Existing SSL Credential Upload Certificate Description SettingsAuthority Trusted Authorities Description SettingsTrusted Authorities To Upload an Authority CertificateFile Display Maintenance and Diagnostics SettingsFilesystem Settings File Display Commands DescriptionFile Transfer File Modification Description CommandsFile Transfer Settings Description File ModificationTo Transfer or Modify Filesystem Files Protocol Stack SettingsTo Configure IP Network Stack Settings Protocol Stack Description IP SettingsMAC Address To Configure Icmp Network Stack SettingsTo Configure ARP Network Stack Settings Protocol Stack Description Icmp SettingsProtocol Stack Description Snmp Settings To Configure Smtp Network Stack SettingsTo Configure Snmp Network Stack Settings Query Port To Configure Query Port SettingsQuery Port Settings Description To View the List of IP Sockets DiagnosticsHardware To View Hardware Information IP SocketsTo Perform a Traceroute Diagnostics Description Traceroute SettingsTo Ping a Remote Host TracerouteMemory To Configure the Diagnostic Log OutputDiagnostics Description Log Settings LogTo View Route Information ProcessesTo View Process Information RouteSystem Settings Description System SettingsTo Reboot or Restore Factory Defaults Email Configuration Description Settings Advanced SettingsEmail Settings To View, Configure and Send EmailCommand Line Interface Description Configuration Settings Command Line Interface SettingsBasic CLI Settings To View and Configure Basic CLI SettingsTelnet Settings Description Telnet SettingsTo Configure Telnet Settings XML Export Configuration XML SettingsSSH Settings To Configure SSH SettingsXML Export Configuration Description Settings To Export Configuration in XML FormatXML Export Status XML Import ConfigurationImport Configuration from External File XML Export Status Settings DescriptionImport Configuration from Description Filesystem Settings Failover SettingsImport Configuration from the Filesystem To Import Configuration in XML FormatFailover Settings Description To Configure Failover SettingsRelay Output Settings Description Relay Output SettingsTo Configure Relay Output Settings Event Alerts Event Alert Settings DescriptionEvents Event OverviewTo Configure Main Power Fail Settings To Configure Input 1 SettingsTo Configure Input 2 Settings To Configure Wwan0 Link Down Settings To Configure Backup Power Fail SettingsTo Clear Events To Configure Ethernet Link Down SettingsEvents Status and Clearing Events Trusted Authorities Security in DetailPublic Key Infrastructure Digital CertificatesOpenSSL Obtaining CertificatesSelf-Signed Certificates Certificate FormatsFree Radius Steel Belted RadiusTo upload new firmware Updating FirmwareObtaining Firmware Loading New Firmware through Web ManagerLoading New Firmware through FTP Short and Long Name Customization Branding the PremierWave XCWeb Manager Customization To Customize Short or Long Names Name Settings DescriptionProblem/Message Reason Solution TroubleshootingDiagnostic LED States Problems and Error MessagesTroubleshooting Technical Support US Appendix a Technical SupportConversion Table Appendix B Binary to Hexadecimal ConversionsConverting Binary to Hexadecimal Scientific CalculatorAppendix B Binary to Hexadecimal Conversions Product Name Model Appendix C ComplianceManufacturers Contact Device Label with CE Mark and FCC IDSLB SLC SLP RoHS Notice

900-598 specifications

The Lantronix 900-598 is a powerful and versatile device designed to facilitate robust data communication and management for industrial and commercial applications. At the heart of the 900-598 lies its advanced networking capabilities, making it an essential tool for IoT implementations, operational efficiency, and remote device management.

One of the main features of the Lantronix 900-598 is its ability to provide secure and reliable connectivity. The device supports various communication protocols, including serial and Ethernet, enabling seamless integration with a wide array of devices across diverse environments. This flexibility allows users to connect legacy equipment to modern networks, thereby extending the life of existing technologies while enhancing operational capabilities.

The Lantronix 900-598 is equipped with robust security measures to protect sensitive data during transmission. It supports encryption protocols, such as SSL and SSH, ensuring that data remains confidential and secure from unauthorized access. This security is crucial for industries dealing with sensitive information, such as healthcare, finance, and manufacturing, where data breaches can have severe repercussions.

Another notable characteristic of the 900-598 is its ease of use. The device features a user-friendly interface that simplifies setup and configuration. Additionally, it supports remote access and management, allowing users to monitor and control devices from virtually anywhere. This remote management capability is particularly advantageous for organizations with distributed operations, enabling them to maintain oversight without needing to be physically present at each location.

In terms of performance, the Lantronix 900-598 offers high-speed data transfer rates, which are essential for real-time applications. It is designed to handle large volumes of data efficiently, making it suitable for applications that require quick responses and minimal latency. The device ensures reliable operation through features like error correction and data integrity monitoring.

Lastly, the Lantronix 900-598 is built to withstand challenging environmental conditions, thanks to its rugged design. This durability makes it suitable for deployment in harsh industrial settings, where exposure to dust, moisture, and extreme temperatures is common.

In conclusion, the Lantronix 900-598 stands out as an advanced solution for data communication and device management. Its combination of secure connectivity, ease of use, high performance, and durability makes it an excellent choice for businesses looking to modernize their operations and embrace the future of IoT and remote management. With its extensive features and robust technologies, the 900-598 is poised to enhance productivity and streamline processes across various industries.