2: Introduction
EDS Device Servers User Guide 17
investment in serial technology, while taking advantage of the highest data-protection
levels possible.
SSH and SSL can:
Verify the data received came from the proper source
Validate that the data transferred from the source over the network has not
changed when it arrives at its destination (shared secret and hashing)
Encrypt data to protect it from prying eyes and nefarious individuals
Provide the ability to run popular M2M protocols over a secure SSH connection
In addition to keeping data safe and accessible, the EDS has robust defenses to hostile
Internet attacks such as denial of service (DoS), which can be used to take down the
network. Moreover, the EDS cannot be used to bring down other devices on the network.
The EDS can be used with Lantronix’s Secure Com Port Redirector (SCPR) to encrypt
COM port-based communications between PCs and virtually any electronic device.
SCPR is a Windows application that creates a secure communications path over a
network between the computer and serial-based devices that are traditionally controlled
via a COM port. With SCPR installed at each computer, computers that were formerly
“hard-wired” by serial cabling for security purposes or to accommodate applications that
only understood serial data can instead communicate over an Ethernet network or the
Internet.
The EDS also supports a variety of popular cipher technologies including:
Advanced Encryption Standard (AES)
Triple Data Encryption Standard (3DES)
RC4
Hashing algorithms such as Secure Hash Algorithm (SHA-1) and MD5
Troubleshooting Capabilities
The EDS offers a comprehensive diagnostic toolset that lets you troubleshoot problems
quickly and easily. Available from the Web Manager, CLI, and XML interfaces, the
diagnostic tools let you:
View critical hardware, memory, MIB-II, buffer pool, and IP socket information.
Perform ping and traceroute operations.
Conduct forward or backup DNS lookup operations.
View all processes currently running on the EDS, including CPU utilization and
total stack space available.