Configuring Users

netmask

This is used for the PPP or SLIP Service types. Only used for IPv4. If the remote user is on a subnet, enter the network’s subnet mask. For example, a subnet mask of 255.255.0.0.

password

The password the user will need to enter to login to the IOLAN. This case-sensitive field accepts a maximum of 16 characters.

line-access

Specifies the user access rights to each IOLAN device line. Options are:

zRead/Write—Users are given read and write access to the line.

zRead In—Users are given access to read only outbound data, data that is going from the IOLAN to the device.

zRead Out—Users are given access to read only inbound data, data that is going from the device to the IOLAN.

Users can read data going in both directions by selecting both the Read In and Read Out options. The onoff option is only for 1-port models. You can disable line access in 2-port + models by specifying 0 (zero).

phone-number

The phone number the IOLAN will dial to callback the user (you must have set Callback to On). Enter the number without spaces. To change the phone number, overwrite the previous entry; to clear the phone number, set it to "" (double quotes without a space).

routing

Determines the routing mode used for RIP packets on the PPP and SLIP interfaces for this user. Values are:

zNone—RIP packets are neither received nor sent by the IOLAN.

zSend—RIP packets can only be sent by the IOLAN.

zListen—RIP packets can only be received by the IOLAN.

zSend and Listen—RIP packets are sent and received by the IOLAN.

service

The type of service that the user will use.

sess-timer

The amount of time, in seconds, that the Session Timer will run. Use this timer to forcibly close a user’s session (connection). When the Session Timer expires, the IOLAN will end the connection. The default value is 0 (zero), meaning that the session timer will not expire (the session is open permanently, or until the user logs out). The maximum value is 4294967 seconds. The User Session Timer will override the Line Session Timer, with the exception of reverse SSH or reverse Telnet sessions.

port

.For outbound User Services such as Telnet, SSH, TCP clear or SSL raw, this is the target port number. The default value will change based on the type of Service selected; the most common known port numbers are used as the default values.

access-clustered-ports

When enabled, allows the user access to IOLANs that have been configured in the clustering group. The default is on.

User Commands 65

Page 67
Image 67
Perle Systems CSS manual Netmask

CSS specifications

Perle Systems, a well-established provider of networking and IoT solutions, offers the innovative Perle CSS (ClearSky Services) platform, designed to facilitate efficient and secure device management. This powerful solution aims to address the challenges of managing a diverse range of devices connected to the Internet, particularly in enterprise, industrial, and M2M (Machine-to-Machine) environments.

One of the main features of the Perle CSS is its robust device management capabilities. Administrators can remotely monitor, configure, and control devices in real-time. This means that troubleshooting can be conducted without the need for physical access, significantly reducing operational downtime. Additionally, the platform supports bulk provisioning, allowing organizations to onboard multiple devices simultaneously, which streamlines the deployment process.

Another notable feature is its security architecture. Perle Systems has integrated advanced security protocols to ensure the integrity and confidentiality of data transmitted between devices. The use of virtual private networks (VPNs), secure socket layer (SSL) encryption, and secure shell (SSH) protocols ensures that sensitive information remains protected from unauthorized access while in transit.

The Perle CSS also stands out for its compatibility with various communication protocols, including MQTT, RESTful APIs, and others. This interoperability allows organizations to integrate the CSS platform seamlessly with their existing systems, facilitating efficient data exchange and interoperability between different devices and applications.

Moreover, Perle CSS adopts a cloud-based architecture, which provides users with the flexibility to access device information from any location. This cloud integration enhances scalability, allowing businesses to expand their network capabilities without the need for extensive infrastructure investments.

The platform's user-friendly interface simplifies navigation, allowing users to manage devices effectively without requiring extensive technical expertise. With customizable dashboards and real-time analytics, administrators can gain valuable insights into device performance, network status, and usage patterns.

In summary, Perle Systems' CSS offers a comprehensive solution for managing connected devices in a secure and efficient manner. Its key features, including robust device management, advanced security, protocol compatibility, and a cloud-based architecture make it an ideal choice for enterprises looking to enhance their IoT capabilities and streamline operations in an increasingly connected world.