Commands for Users Logged Into the IOLAN

Show Line Users

Description

Shows the users who are on the line.

User Level

Admin

Syntax

show line users

SSH

Description

Starts an SSH session to the specified host/IP address.

User Level

Normal, Admin

Syntax

ssh <hostname/IP_address> [<TCP_port>]

 

[termtype <terminal_name>] [authentication rsa onoff]

 

[authentication dsa onoff]

 

[authentication keyboard-interactive onoff]

 

[compression onoff] [protocol ssh-1ssh-2ssh-2,1]

 

[ssh-1-cipher 3desdesblowfish]

 

[ssh-2-cipher-list <3des blowfish cast aes arcfour> end-list]

 

[user <name>] [verbose onoff]

Options

<hostname/IP_address>

 

The name (resolvable via DNS) or IP address of the host you wish to connect to with

 

SSH.

 

<TCP_port>

 

The port number the target host is listening on for incoming connections. The default

 

for SSH is port number 22.

 

termtype

 

Type of terminal attached to this line; for example, ANSI or WYSE60.

 

authentication rsa

 

An authentication method used by SSH version 1 and 2. When enabled, an SSH client

 

session will try to authenticate via RSA.

 

authentication dsa

 

An authentication method used by SSH version 2. When enabled, an SSH client session

 

will try to authenticate via DSA.

 

authentication keyboard-interaction

 

The user types in a password for authentication.Used for SSH2 only.

 

compression

 

Requests compression of all data. Compression is desirable on modem lines and other

 

slow connections, but will only slow down things on fast networks.

 

protocol

 

Specify whether you are using SSH-1, SSH-2, or a combination of the two protocols,

 

SSH-2, SSH-1.

 

ssh-1-cipher

Select the encryption method (cipher) that you want to use for your SSH version 1 connection:

z3DES

zBlowfish

User Commands 55

Page 57
Image 57
Perle Systems CSS manual Show Line Users, Authentication keyboard-interaction, Ssh-1-cipher, 3DES Blowfish

CSS specifications

Perle Systems, a well-established provider of networking and IoT solutions, offers the innovative Perle CSS (ClearSky Services) platform, designed to facilitate efficient and secure device management. This powerful solution aims to address the challenges of managing a diverse range of devices connected to the Internet, particularly in enterprise, industrial, and M2M (Machine-to-Machine) environments.

One of the main features of the Perle CSS is its robust device management capabilities. Administrators can remotely monitor, configure, and control devices in real-time. This means that troubleshooting can be conducted without the need for physical access, significantly reducing operational downtime. Additionally, the platform supports bulk provisioning, allowing organizations to onboard multiple devices simultaneously, which streamlines the deployment process.

Another notable feature is its security architecture. Perle Systems has integrated advanced security protocols to ensure the integrity and confidentiality of data transmitted between devices. The use of virtual private networks (VPNs), secure socket layer (SSL) encryption, and secure shell (SSH) protocols ensures that sensitive information remains protected from unauthorized access while in transit.

The Perle CSS also stands out for its compatibility with various communication protocols, including MQTT, RESTful APIs, and others. This interoperability allows organizations to integrate the CSS platform seamlessly with their existing systems, facilitating efficient data exchange and interoperability between different devices and applications.

Moreover, Perle CSS adopts a cloud-based architecture, which provides users with the flexibility to access device information from any location. This cloud integration enhances scalability, allowing businesses to expand their network capabilities without the need for extensive infrastructure investments.

The platform's user-friendly interface simplifies navigation, allowing users to manage devices effectively without requiring extensive technical expertise. With customizable dashboards and real-time analytics, administrators can gain valuable insights into device performance, network status, and usage patterns.

In summary, Perle Systems' CSS offers a comprehensive solution for managing connected devices in a secure and efficient manner. Its key features, including robust device management, advanced security, protocol compatibility, and a cloud-based architecture make it an ideal choice for enterprises looking to enhance their IoT capabilities and streamline operations in an increasingly connected world.