Authentication Commands

Authentication Commands

Set Authentication

Description

Sets the authentication method for the IOLAN.

User Level

Admin

Syntax

set authentication type primarysecondary

 

nonelocalradiuskerberosldaptacacs+securidnis

 

[secondary-as-backup onoff] [auth-admin-user-local onoff]

Options

primary

 

The first authentication method that the IOLAN attempts. Some type of authentication

 

must be done by the IOLAN, therefore, None is not a valid option for the Primary

 

Authentication Method.

 

secondary

 

If the Primary Authentication Method fails, the next authentication method that the

 

IOLAN attempts. You can choose to use authentication methods in combination. For

 

example, you can specify the Primary Authentication Method as Local and the

 

Secondary Authentication Method as RADIUS. Therefore, some users can be defined

 

in the IOLAN (Local) others in RADIUS.

 

nonelocalradiuskerberosldaptacacs+securidnis

 

Specify the authentication method that the IOLAN will use to authenticate users (this

 

must already be set up in your network).

 

secondary-as-backup

 

When enabled, the Secondary Authentication method will be tried only when the

 

IOLAN cannot communicate with the Primary Authentication server.

 

auth-admin-user-local

 

When enabled, the IOLAN will only authenticate the admin user in the local user

 

database, regardless of any external authentication methods configured. When disabled,

 

a user called admin must exist when only external authentication methods are

 

configured, or you will not be able to access the IOLAN as the admin user, except

 

through the console port. The default is on.

Set Authentication Local

Description

Configures local authentication settings. When you configure the IOLAN to

 

authenticate users locally, you can require that the users be configured in the User table.

 

You can also enable the Guest mode. This mode allows users to log into the IOLAN

 

using any user name, but they will only get authenticated if they match the password

User Level

configured for the Guest account.

Admin

Syntax

set authentication local [guest-mode onoff] [password <text>]

Options

guest-mode

 

Allow users who are not defined in the User database to log into the IOLAN with any

 

user ID and the specified password. Guest users inherit their settings from the Default

 

User’s configuration.

 

password

 

The password that Guest users must use to log into the IOLAN.

Server Commands 35

Page 35
Image 35
Perle Systems CSS manual Authentication Commands, Set Authentication Local

CSS specifications

Perle Systems, a well-established provider of networking and IoT solutions, offers the innovative Perle CSS (ClearSky Services) platform, designed to facilitate efficient and secure device management. This powerful solution aims to address the challenges of managing a diverse range of devices connected to the Internet, particularly in enterprise, industrial, and M2M (Machine-to-Machine) environments.

One of the main features of the Perle CSS is its robust device management capabilities. Administrators can remotely monitor, configure, and control devices in real-time. This means that troubleshooting can be conducted without the need for physical access, significantly reducing operational downtime. Additionally, the platform supports bulk provisioning, allowing organizations to onboard multiple devices simultaneously, which streamlines the deployment process.

Another notable feature is its security architecture. Perle Systems has integrated advanced security protocols to ensure the integrity and confidentiality of data transmitted between devices. The use of virtual private networks (VPNs), secure socket layer (SSL) encryption, and secure shell (SSH) protocols ensures that sensitive information remains protected from unauthorized access while in transit.

The Perle CSS also stands out for its compatibility with various communication protocols, including MQTT, RESTful APIs, and others. This interoperability allows organizations to integrate the CSS platform seamlessly with their existing systems, facilitating efficient data exchange and interoperability between different devices and applications.

Moreover, Perle CSS adopts a cloud-based architecture, which provides users with the flexibility to access device information from any location. This cloud integration enhances scalability, allowing businesses to expand their network capabilities without the need for extensive infrastructure investments.

The platform's user-friendly interface simplifies navigation, allowing users to manage devices effectively without requiring extensive technical expertise. With customizable dashboards and real-time analytics, administrators can gain valuable insights into device performance, network status, and usage patterns.

In summary, Perle Systems' CSS offers a comprehensive solution for managing connected devices in a secure and efficient manner. Its key features, including robust device management, advanced security, protocol compatibility, and a cloud-based architecture make it an ideal choice for enterprises looking to enhance their IoT capabilities and streamline operations in an increasingly connected world.