Line Service Commands

ruser

This field is used to authenticate a user connecting to this line. It is used in conjunction with the rpassword field. By specifying a name here, this line becomes dedicated to that user only. If left blank, the internal user database will be used to authenticate the connection and any user configured will be able to access this line. You can enter a maximum of sixteen alphanumeric characters.

This option does not work with external authentication.

authentication

The type of authentication that will be done on the link: None, PAP, or CHAP. The default is CHAP. You can use PAP or CHAP to authenticate a port or user on the IOLAN, from a remote location, or authenticate a remote client/device, from the IOLAN (not commonly used for Dial Out).

PAP is a one time challenge of a client/device requiring that it respond with a valid username and password. A timer operates during which successful authentication must take place. If the timer expires before the remote end has been authenticated successfully, the link will be terminated.

CHAP challenges a client/device at regular intervals to validate itself with a username and a response, based on a hash of the secret (password). A timer operates during which successful authentication must take place. If the timer expires before the remote end has been authenticated successfully, the link will be terminated.

When setting either PAP and CHAP, make sure the IOLAN and the remote client/device have the same setting. For example, if the IOLAN is set to PAP, but the remote end is set to CHAP, the connection will be refused.

tr-retry

The maximum number of times a terminate request packet will be re-sent before the link is terminated.

tr-tmout

The maximum time, in seconds, that LCP (Link Control Protocol) will wait before it considers a terminate request packet to have been lost.

user

This field is used by a remote peer to authenticate a PPP connection on this line. It is used in conjunction with the password field. You can enter a maximum of sixteen alphanumeric characters.

vj-comp

This determines whether Van Jacobson Compression is used on this link. The default is On. If your user is authenticated by the IOLAN, this VJ compression value will be overridden if you have set the User Framed Compression On. If your user is authenticated by RADIUS and the RADIUS parameter Framed-Compressionis set in the RADIUS file, the IOLAN will use the value in the RADIUS file in preference to the value configured here.

Line Commands 83

Page 85
Image 85
Perle Systems CSS manual Ruser, Authentication, Tr-retry, Tr-tmout, Vj-comp

CSS specifications

Perle Systems, a well-established provider of networking and IoT solutions, offers the innovative Perle CSS (ClearSky Services) platform, designed to facilitate efficient and secure device management. This powerful solution aims to address the challenges of managing a diverse range of devices connected to the Internet, particularly in enterprise, industrial, and M2M (Machine-to-Machine) environments.

One of the main features of the Perle CSS is its robust device management capabilities. Administrators can remotely monitor, configure, and control devices in real-time. This means that troubleshooting can be conducted without the need for physical access, significantly reducing operational downtime. Additionally, the platform supports bulk provisioning, allowing organizations to onboard multiple devices simultaneously, which streamlines the deployment process.

Another notable feature is its security architecture. Perle Systems has integrated advanced security protocols to ensure the integrity and confidentiality of data transmitted between devices. The use of virtual private networks (VPNs), secure socket layer (SSL) encryption, and secure shell (SSH) protocols ensures that sensitive information remains protected from unauthorized access while in transit.

The Perle CSS also stands out for its compatibility with various communication protocols, including MQTT, RESTful APIs, and others. This interoperability allows organizations to integrate the CSS platform seamlessly with their existing systems, facilitating efficient data exchange and interoperability between different devices and applications.

Moreover, Perle CSS adopts a cloud-based architecture, which provides users with the flexibility to access device information from any location. This cloud integration enhances scalability, allowing businesses to expand their network capabilities without the need for extensive infrastructure investments.

The platform's user-friendly interface simplifies navigation, allowing users to manage devices effectively without requiring extensive technical expertise. With customizable dashboards and real-time analytics, administrators can gain valuable insights into device performance, network status, and usage patterns.

In summary, Perle Systems' CSS offers a comprehensive solution for managing connected devices in a secure and efficient manner. Its key features, including robust device management, advanced security, protocol compatibility, and a cloud-based architecture make it an ideal choice for enterprises looking to enhance their IoT capabilities and streamline operations in an increasingly connected world.