Instruction Manual

Note that if you see:

config.users.total

it means you have 0 Users configured.

So, your new User will be the existing total plus 1; if the previous com- mand gave you 0, then you start with user number 1; if you already have 1 user your new user will be number 2 etc.

If you want a user named “user1” with a password of “secret” who will have access to serial port 5 from the network you need to issue the these commands (assuming you have a previous user in place):

#/bin/config –-set=config.users.user2.username=user1

#/bin/config –-set=config.users.user2.password=secret

#/bin/config –-set=”config.users.user2.description=The Second User”

#/bin/config –-set=config.users.user2.port5=on

#/bin/config –-set=config.users.total=2

The following command will synchronize the live system with the new configuration.

# /bin/config –-run=users

Trusted Networks

You can further restrict remote access to serial ports based on the source IP address. To configure this via the command line you need to do the following:

Determine the total number of existing trusted network rules (if you have no existing rules) you can assume this is 0.

#/bin/config –-get=config.portaccess.total

This command should display: config.portaccess.total 1

Note that if you see:

101

Page 108
Image 108
StarTech.com ECS0016 manual Trusted Networks, Config.users.total