Silex technology SX-500-1402 manual Https

Page 12

In particular, the WPA2-WPA transition mode is NOT FIPS 140-2 compliant. Only networks exclusively using WPA2 (AES-CCMP) encryption comply.

The current security settings for the device may be observed by logging into the unit web server and navigating to the network security page, which will show the currently active and configured values for the above parameters (and others). The settings may also be observed with the configuration console command SHOW NW. This should be done after configuration and before use to verify that the device is properly configured for the intended target environment.

The SX-500 is validated at level 1, which means it has no physical security beyond the physical protection of its metal case, and is presumed to be used in a secure environment. If the unit is to be left unused in an unsecured area, or is to be transported to a new location via unsupervised means, it is recommended that the Cryptographic Officer zeroize the device. This is done with the configuration console command ZEROKEYS. After zeroization the unit will need to be re- configured before wireless communication in FIPS compliant mode are possible.

The Cryptographic Officer must be aware that all configuration program inputs are in plaintext for purposes of FIPS 140-2 compliance regardless of the transport encoding used. The only FIPS 140-2 cryptographic protection claimed for this module is for the wireless link between the unit and an associated Access Point.

If WPA2-PSK mode is being used, the PSK must be entered by the Cryptographic officer on an isolated network with the machine containing Cryptographic Officer’s web browser directly connected to the SX-500 and not connected via a LAN. The same is true for entry of externally generated RSA private keys/public certificates.

The Crypographic officer must zeroize the module when transitioning the device configur- ation from a FIPS-140-2 approved mode to a non-approved mode. The Cryptographic Of- ficer should zeroize the module before resetting the configuration to factory defaults. If this is impossible, because the reason for resetting is the connection to the unit is im- possible, the unit must be zeroized after the configuration reset is complete and connec- tion has been restored.

There are two types of bypass states possible with the module (non-approved modes). The first is to use any wireless encryption/authentication combination not specified above as being FIPS 140-2 compliant and then reset the unit. The second is to configure the unit to not be in Ethernet to Wireless mode, plug in a wired Ethernet cable, and then reset the unit.

If WPA2-PSK mode is being used, the PSK must be entered by the Cryptographic officer on an isolated network with the machine containing Cryptographic Officer’s web browser directly connected to the SX-500 and not connected via a LAN. The same is true for entry of externally generated RSA private keys/public certificates.

In addition to the wireless security settings above, the following settings must be made for operation in FIPS 140-2 mode:

Item

Required Setting

 

 

HTTPS

Disabled (factory default)

 

 

S-Telnet

Disabled (factory default)

 

 

TCP data service SSL

Disabled (factory default)

 

 

Serial port console mode string

NULL (disabled – factory default)

 

 

Serial port filter

TRAP (factory default)

 

 

Introduction

Silex

Page 6

 

Part Number 140-00188-210A

 

Image 12
Contents SX-500-1402 Serial Device Server Trademarks Page Contents Figures Contents Silex Part Number 140-00188-210A Safety Precautions About This Reference GuideEmissions Disclaimer Revision History 2009.08.13 Lee Aydelotte Initial ReleaseIntroduction SX-500Logical Ports Port Name DescriptionLED FIPS-140-2 Interface Physical Logical InterfaceConfiguration Required SettingWPA2 AES-CCMP Https Physical Protection Secure OperationInstalling the Serial Device Server Hardware Verify Package ContentsInstalling the Serial Device Server RS-232 connector pinouts and cabling Monitoring Serial Device Server Status Status Monitors Function StateChapter Configuring the Serial Device Server Basic Configuration RequirementsTCP/IP Settings Wireless Configuration SettingsConfiguration Methods First-Time IP Address Configuration Ping ipaddress Using a Web Browser to Configure the Serial Device Server Silex Authentication Server Certificate You can skip the remainder of this chapter AD-HOC Disabled Init ExitChapter Using the Serial Device Server with Your Application Serial Port EmulatorRaw TCP connection Telnet ipaddress portnumberECable Mode RFC 2217 Remote Modem Control SupportPrint Server Mode Console Mode SwitchingAT Commands SET Port S1 Filter ATChapter Advanced Configuration Factory Default SettingsFactory Default Settings Parameter Description CTS/RTSModifying TCP/IP Settings Parameter Description Settings Default SettingUsing AT Modem Commands TCP/IP Settings ParameterDNS Standard AT Commands Supported AT Commands Parameter DescriptionParameter Command Description Extended AT Commands Parameter DescriptionAT#Cset nw ssid silex#Csave Response Codes Response Codes Numeric Code DescriptionChapter Troubleshooting Email Tech support support@silexamerica.com Chapter Product Specifications Product Specifications ComponentRadio Performance Specifications Parameter Parameter Specifications TCP Port ConnectionsTCP Port Connections Port Destination DeviceAppendix a Advanced Security Configuration PSKEAP Ttls LeapEncryption Mode Wireless Security Only Key Selection Wireless Security OnlyWEP Key Value Wireless Security Only Pre-Shared Key Wireless Security OnlyWireless Authentication Type Wireless Security Only Wired Authentication Type Wired Ethernet Networks OnlyAuthentication Attempts PasswordProduct Specifications Silex Part Number 140-00188-210A Appendix B Console Commands Wireless and Network Security CommandsNetwork Commands Description Signal Quality Signal Strength = Noise LevelCommand Description TLS PSKSET NW Ethauth Ttls TLS Peap SET NW KEY# Wifi RTS Threshold = CL NW BSsidSET NW RTS SET NW CertcnSET NW CERTCN2 SET NW CertexpSET NW Certkey SET NW IDSET NW Wpagroup Enable Disable SET NW Inap PAPMSCHAPV2SET NW Realm Port Commands SET NW ResetPort Commands Description XON/XOFFServer Information Commands Server Information Commands DescriptionCL Port S1 JOB SET Port S1 Size 7SET SERVEr NAme Name SET Snmp CONtact StringSET Snmp LOCation string SH SerialService Commands Service Commands DescriptionTwcffffff BINARYP1TEXTP1 TWCFFFFFFP14String Commands String CommandsTCP/IP Commands TCP/IP Commands DescriptionEnter LANGUAGE= POSTSCRIPT\0AAll hosts permitted access SET ARP ENable DIsableSET IP BAnner ENable DIsable SET IP Chksum ENable DIsableAuto Bootp Rarp Dhcp Static SET IP FTPSET IP Http SET IP LPDSET IP TCP SET IP TftpSH IP AutoXxxxxxS1A 9100 XxxxxxS1B 3001 Firmware Update Firmware Update Command DescriptionMiscellaneous Commands Help CommandsMiscellaneous Commands Description Console Commands Silex Part Number 140-00188-210A Appendix C Firmware Update Procedures Firmware Update Procedures Silex Part Number 140-00188-210A Appendix D Safety and Regulatory Notices Information for United States UsersInformation for Canadian Users IC notice SX-500  FCC ID N6C-SX10WGInformation for European Users SX-500 Declaration of Conformity CE SX-500Appendix E Silex Contact Information Silex Technology America, IncSilex Technology Europe GmbH Silex Technology Beijing, IncSilex Technology America, Inc

SX-500-1402 specifications

The Silex Technology SX-500-1402 is an advanced industrial wireless module designed for seamless integration into various applications requiring high-performance wireless connectivity. This module is particularly renowned for its robust features, making it ideal for use in automation, healthcare, and smart city applications.

One of the main features of the SX-500-1402 is its dual-band Wi-Fi capability, which operates on both 2.4 GHz and 5 GHz frequencies. This not only provides flexibility for different environments but also enhances the overall performance by reducing interference and optimizing data throughput. The module supports Wi-Fi 5 (802.11ac), enabling high-speed data transmission and ensuring reliable connectivity even in crowded environments.

Another key aspect of the SX-500-1402 is its compact size and lightweight design, offering an excellent solution for space-constrained applications. The module features a PCB form factor that facilitates easy integration into diverse devices while minimizing additional footprint.

The SX-500-1402 boasts advanced security features, including WPA3 support, ensuring encryption and secure data transmission across networks. This is a critical requirement for applications in healthcare and finance, where safeguarding sensitive information is paramount. Furthermore, the module supports secure boot and firmware updates, further enhancing its security posture.

In terms of power management, the Silex module is designed for energy efficiency, making it suitable for battery-powered applications. It features various power-saving modes that help to extend battery life without compromising performance, enabling devices to operate for longer periods without frequent recharging.

The SX-500-1402 also integrates seamlessly with diverse host interfaces, such as UART, SPI, and I2C, facilitating easy connectivity to microcontrollers and other devices. This versatility makes it an ideal choice for developers looking to prototype and bring their IoT solutions to market swiftly.

Key specifications of the SX-500-1402 include a maximum data rate of 867 Mbps in the 5 GHz band, operating temperature range from -20 to 70 degrees Celsius, and an extended range due to its MIMO (Multiple Input, Multiple Output) technology, which further enhances performance in environments with obstacles.

In summary, the Silex Technology SX-500-1402 is an exceptional choice for applications requiring reliable, high-speed wireless communication. With its advanced features, robust security measures, and versatile integration options, it stands out as a premier solution in the industrial wireless module landscape.