37.3 Managing SSL VPN settings via the CLI. Westermo RFI-219-F4G-T7G, Viper-212A-T5G-P8-HV, RFI-219-F4G-T7G-F8, RFI-211-F4G-T7G, L106-F2G, Viper-212A, L205-S1, Viper-112A-T5G, L110-F2G, Viper-112A-T3G
Add to my manuals
1088 Pages
advertisement
Westermo OS Management Guide
Version 4.22.0-0
37.3
Managing SSL VPN settings via the CLI
The WeOS unit can be configured as SSL VPN server gateway (waiting for clients to connect), or as an SSL VPN client (initiating connections). We start out by shown the CLI commands available when configuring an SSL VPN server gateway
(”[no] server” command set to ”server”).
Default Section Command
General SSL VPN Server Gateway Settings tunnel
[no] ssl <INDEX> server
[no] enable
[no] description <STRING>
[no] type <layer2|layer3>
[no] push-network <NETWORK/LEN>
[no] pool start <IPADDR> <num
<NUM>|end <IPADDR>>
[netmask NETMASK]
[no] cn-binding <IDX>
[no] common-name <STRING>
[no] address <IPADDR/LEN>
Server
Enabled empty layer3
Disabled
Disabled
Authentication Settings
[no] certificate
[no] ca-certificate
[no] tls-auth label <KEY LABEL>
Empty
Empty
Empty
[direction <0|1>]
[no] aaa-method <remote-server <ID> Disabled
| server-group <ID> | local <ID>>
Data Security Settings
[no] crypto <aes128-cbc|. . . >
[no] auth <sha1|md5>
Additional/Advanced Settings
[no] protocol <tcp|udp> aes128-cbc sha1
UDP
Continued on next page
© 2017 Westermo Teleindustri AB 939
Westermo OS Management Guide
Version 4.22.0-0
Command
[no] port
[no] outbound
[no] keepalive <interval <SEC> restart <SEC>>
[no] compression [adaptive]
[no] renegotiation-timeout <SEC>
[no] client-to-client
[no] duplicate-cn
[no] max-clients <NUM>
Show SSL VPN Status show tunnel ssl [ID]
See also (Interface and Firewall Settings) iface ssl<ID> inet <static|dynamic|dhcp>
Various Interface settings ip
[no] firewall
Various Firewall/NAT settings
Continued from previous page
Default
1194
Auto interval 10 restart 60
Adaptive
3600
Disabled
Disabled
25
Section
Dynamic (SSL)
. . .
See
Disabled
. . .
See
The table below shows the available CLI commands when configuring the WeOS unit as SSL client (”[no] server” command set to ”no server”).
Default Section Command
General SSL VPN Settings tunnel
[no] ssl <INDEX> no server
[no] enable
[no] description <STRING>
[no] type <layer2|layer3>
[no] peer <ADDRESS|DOMAIN>
Server
Enabled empty layer3 empty
Continued on next page
940 © 2017 Westermo Teleindustri AB
Westermo OS Management Guide
Version 4.22.0-0
Command
Authentication Settings
[no] certificate
[no] ca-certificate
[no] tls-auth label <KEY LABEL>
[direction <0|1>]
[no] identity <USERNAME> password <PASSWORD>
Data Security Settings
[no] crypto <aes128-cbc|. . . >
[no] auth <sha1|md5>
Additional/Advanced Settings
[no] protocol <tcp|udp>
[no] port
[no] outbound
[no] keepalive <interval <SEC> restart <SEC>>
[no] compression [adaptive]
[no] renegotiation-timeout <SEC>
[no] pull
Continued from previous page
Default
Empty
Empty
Empty
Disabled aes128-cbc sha1
UDP
1194
Auto interval 10 restart 60
Adaptive
3600
Enabled
Section
Show SSL VPN Status show tunnel ssl [ID]
See also (Interface and Firewall Settings) iface ssl<ID> inet <static|dynamic|dhcp> Dynamic (SSL)
Various Interface settings . . .
See
ip
[no] firewall
Various Firewall/NAT settings
Disabled
. . .
See
© 2017 Westermo Teleindustri AB 941
Westermo OS Management Guide
Version 4.22.0-0
37.3.1
Managing SSL VPN Tunnels
Syntax [no] ssl <INDEX> where INDEX is a number greater or equal to 0.
Context
context
Usage Create, delete, or modify an SSL VPN tunnel. Use ”ssl <INDEX>” to create a new SSL tunnel, or to enter the configuration context of an existing
SSL tunnel. (To find the index of configured tunnels, use ”show tunnel” as described in
Use ”no ssl <INDEX>” to remove a specific SSL VPN tunnel, or ”no ssl” to remove all configured SSL VPN tunnels.
Use ”show ssl <INDEX>” to show all settings of a specific SSL tunnel (also available as ”show” command within the
context).
Note
Tunnels which are not intended to be used should either be deleted or
Default values Not applicable.
37.3.2
Change tunnel mode (Server/Client)
Syntax [no] server
Context
context
Usage Set the tunnel in server or client mode, use ”no server” for client mode.
Default values Server
37.3.3
Enable/disable a SSL VPN tunnel
Syntax [no] enable
Context
context
Usage Enable or disable a SSL VPN tunnel. A disabled tunnel will be deactivated, but keeps its configuration settings.
Use ”enable” to enable and ”no enable” to disable an SSL VPN tunnel.
942 © 2017 Westermo Teleindustri AB
Westermo OS Management Guide
Version 4.22.0-0
Use ”show enable” to show whether this SSL VPN tunnel is enabled or disabled.
Note
Tunnels which are not intended to be used should either be deleted
Default values Enabled
37.3.4
SSL VPN Description Setting
Syntax [no] description <STRING>
Context
context
Usage Set or remove the SSL VPN description string.
Use ”description <STRING>” to set a description for this database.
Use ”no description” to remove the current description.
Use citation marks around the string if you want to have a description containing space characters.
To view the current description, use ”show description”.
Default values Empty.
Examples
Example
example:/config/tunnel/ssl-19/#> description secrets or ...
example:/config/tunnel/ssl-19/#> description ’’Office tunnel’’
37.3.5
Configure tunnel type
Syntax [no] type <layer2|layer3>
Context
context
Usage Change which type of tunnel you want to use, select layer2 (sometimes called bridged) or layer3 (sometimes called routed). ”no type” reset to layer3.
© 2017 Westermo Teleindustri AB 943
Westermo OS Management Guide
Version 4.22.0-0
Default values layer3
37.3.6
Push networks to connecting clients
Syntax [no] push-network <NETWORK/LEN>
Context
context (Only valid when server)
Usage This is a part of the auto-configuration of the clients, push networks (Max is 10) to the clients, these routes will automatically be set as routes to us as long as the client has ”pull” enabled.
Default values Disabled
37.3.7
Configure an address pool
Syntax [no] pool start <IPADDR> <num <NUM> | end <IPADDR>> [netmask
NETMASK]
Context
context (Only valid when server)
Usage Auto configure all clients connecting to us, if netmask is omitted it will be set to the default mask for the address class for the start address.
Note
The address of the server interface will be untouched, you will need to configure it manually from the interface context for the ssl-interface
Example
example:/config/tunnel/ssl-19/#> pool 192.168.253.2 num 10
Default values Disabled
37.3.8
Manage Common Name bindings
Syntax [no] cn-binding <INDEX>
Context
context (Only valid when server)
944 © 2017 Westermo Teleindustri AB
Westermo OS Management Guide
Version 4.22.0-0
Usage Create, delete, or modify an SSL Common Name (CN) binding. The CN binding context is used to assign specific settings to the SSL client with the given CN in his/her certificate. i.e., a client.
Use ”cn-binding <INDEX>” to create a new CN binding, or to enter the
context of an existing CN binding.
Use ”show cn-binding” to find the index of all configured bindings, and use
”show cn-binding <INDEX>” to list information about a specific binding.
Use ”no cn-binding” to remove all configured bindings, and use ”no cn-binding
<INDEX>” to remove a specific binding.
Default values Not applicable.
37.3.9
Set Common Name for CN binding
Syntax [no] common-name <STRING>
Context
context (Only valid when server)
Usage Declare the CN string to match for this binding.
”common-name <STRING>” sets the string to match against the Common
Name in the client’s X.509 certificate. Max 64 characters. Valid characters are ASCII 32-126, except ’/’ (ASCII 47). ’Space’ (ASCII 32) cannot be used at the start or end of the string.
”no common-name” deletes the common name setting, but without a defined common name the binding configuration is not valid.
Example
alice-server:/config/tunnel/ssl-0/#> cn-binding 1
Creating new CN binding: 1!
alice-server:/config/tunnel/ssl-0/cn-binding-1/#> common-name John Smith alice-server:/config/tunnel/ssl-0/cn-binding-1/#> address 192.168.5.43/24
Default values Not applicable
37.3.10
Set CN specific IP address
Syntax [no] address <IPADDR/LEN>
© 2017 Westermo Teleindustri AB 945
Westermo OS Management Guide
Version 4.22.0-0
Context
context (Only valid when server)
Usage Declare the IP address and network prefix length to assign to this VPN client.
Use ”address <IPADDR/LEN>” to define what IP address and network prefix to assign to the VPN client for this binding.
”no address” deletes the IP address setting, but without a defined IP address the binding configuration is not valid.
Example
alice-server:/config/tunnel/ssl-0/#> cn-binding 1
Creating new CN binding: 1!
alice-server:/config/tunnel/ssl-0/cn-binding-1/#> common-name John Smith alice-server:/config/tunnel/ssl-0/cn-binding-1/#> address 192.168.5.43/24
Default values Not applicable
37.3.11
Change remote peer
Syntax [no] peer <ADDRESS|DOMAIN>
Context
context (Only valid when client)
Usage Set the peer for the client to connect to.
Default values Disabled
37.3.12
Select local certificate
Syntax [no] certificate <LABEL>
Context
context
Usage Select local certificate (and associated private key), i.e., the certificate by which this unit will authenticate itself. The ”LABEL” is the reference of the certificate when imported to the WeOS unit. The certificate must be signed of by the CA certificate set in
Use ”show certificate” to show the local certificate setting.
Default values Empty
946 © 2017 Westermo Teleindustri AB
Westermo OS Management Guide
Version 4.22.0-0
37.3.13
Select CA certificate
Syntax [no] ca-certificate <LABEL>
Context
context
Usage Select CA certificate, i.e., the certificate by which this unit will authenticate itself. The ”LABEL” is the reference of the certificate when imported to the WeOS unit. Use ”show ca-certificate” to show the CA certificate setting.
Default values Empty
37.3.14
Enable TLS authentication
Syntax [no] tls-auth label <KEY LABEL> [direction <0|1>]
Context
context
Usage Enable TLS authentication. ”KEY LABEL” is the label of an OpenVPN key to be used for authentication. The direction is optional and not setting it means to use the key in both directions (bi-directionally).
Default values Empty (disabled)
37.3.15
Configure AAA remote authentication
Syntax [no] aaa-method <remote-server | server-group | local> <ID>
Context
context
Usage Require an extra authentication after the certificate exchange. Require to first create a remote-server, server-group or a local user database in the
AAA context.
Example
example:/config/tunnel/ssl-19/#> aaa-method local 1 or ...
example:/config/tunnel/ssl-19/#> aaa-method remote-server 1
Default values Disabled
© 2017 Westermo Teleindustri AB 947
Westermo OS Management Guide
Version 4.22.0-0
37.3.16
Configure authentication identity
Syntax [no] identity <USERNAME> password <PASSWORD>
Context
context (Only valid when client)
Usage This is only required if the server is configured to require an extra authentication layer after the certificate exchange.
Example
example:/config/tunnel/ssl-19/#> identity user1 password secrets
Default values Disabled
37.3.17
Change cryptographic cipher
Syntax [no] crypto <<bf-cbc|des-ede3-cbc|aes128-cbc|aes192-cbc|aes256-cbc»
Context
context
Usage Set the crypto to use, must match on both the client and the server. ”no
crypto” disables all encryption, all traffic will pass over the tunnel unencrypted.
Default values aes128-cbc
37.3.18
Change authentication hash
Syntax [no] auth <sha1|md5>
Context
context Authenticate packets with HMAC using message digest. Use ”no auth” to disable the authentication hash.
Default values sha1
37.3.19
Configure protocol
Syntax [no] protocol <tcp|udp>
Context
context
948 © 2017 Westermo Teleindustri AB
Westermo OS Management Guide
Version 4.22.0-0
Usage Select the protocol to encapsulate the traffic in.
Default values UDP
37.3.20
Configure port
Syntax [no] port <PORT>
Context
context
Usage In client mode, this selects the port to connect to on the server, in server mode, this selects which port to listen for incoming connections on.
Note
A neat function when using SSL VPN is to listen on TCP ( Section 37.3.19
port 443, this will allow the tunnel to pass almost all firewalls, since the traffic will look like it is HTTPS. To achieve this in server mode you will have to move HTTPS on the WeOS unit to a separate port. See
Default values 1194
37.3.21
Configure Outbound Interface
Syntax [no] outbound <IFACE>
Context
context
Usage Set the outbound interface of this tunnel.
Use ”no outbound” to automatically select the interface leading to the de-
fault gateway as outbound interface.
Use ”show outbound” to show the configured outbound interface for this tunnel. ”Default Gateway” is shown if the interface leading to the default gateway should be used as outbound interface.
Default values Auto (”no outbound”)
© 2017 Westermo Teleindustri AB 949
Westermo OS Management Guide
Version 4.22.0-0
37.3.22
Change keepalive settings
Syntax [no] keepalive <interval <SEC> restart <SEC>>
Context
context
Usage Send keepalive probes over the tunnel to make sure that stateful firewalls gets updated as expected, they is only sent as long as there is no traffic on the tunnel.
ˆ interval - The interval to send probes, if there are not traffic on
ˆ restart - Force restart of the ping probe, this will force reload of DNS for
example, this is very useful when dealing with DynDNS ( section 22.3.3
Note: In server mode, this settings will also be pushed to the clients, if
”pull” is enabled in the clients, they will not need to configure keepalive settings.
Use ”show keepalive” to view current keepalive settings.
Default values interval 10 restart 60
37.3.23
Configure compression settings
Syntax [no] compression [adaptive]
Context
context
Usage Toggle compression settings, ”no compression” will disable all compression. ”compression adaptive” will result in that SSL VPN tries to find out if the traffic is encrypted, if not it will encrypt it. This will have performance penalty if all traffic already is encrypted. This setting must match on client and server to get the traffic going. In server mode, this setting will also be pushed to the clients.
Default values Adaptive
37.3.24
Change renegotiation timeout
Syntax [no] renegotiation-timeout <SECONDS>
Context
context
950 © 2017 Westermo Teleindustri AB
Westermo OS Management Guide
Version 4.22.0-0
Usage Set the renegotiation time for the data channel, this can be set on both the client and the server, if so, the lowest value will be used. To disable renegotiation use ”no renegotiation-timeout” on both ends.
Default values 3600 seconds
37.3.25
Change client to client communication
Syntax [no] client-to-client
Context
context (Only valid when server)
Usage If enabled all clients will be able to communicated with each other.
Note
No traffic will be passed through the normal network stack, e.g firewall rules will not be possible. If you want the possible to set firewall rules per client you have to create multiple server instance and route between the instances.
Default values Disabled
37.3.26
Allow/deny clients with the same CN
Syntax [no] duplicate-cn
Context
context (Only valid when server)
Usage The normal behaviour is to deny clients which connect with a CN (common name) that is already connected. Enabling this setting will allow the second connection.
Note
This is a serious security risk, use only if you know what you are doing,
you should look to combine this with an aaa-method ( Section 37.3.15
Default values Disabled
© 2017 Westermo Teleindustri AB 951
Westermo OS Management Guide
Version 4.22.0-0
37.3.27
Limit number of simultaneous clients
Syntax [no] max-clients <NUM>
Context
context (Only valid when server)
Usage Use ”max-clients <NUM>” to define how many clients that are allowed to simultaneously connect to the server. When this number is reached, the server will reject an incoming request.
”no max-clients” (or ”max-clients 0”) means unlimited.
Use ”show max-clients” to show the current setting.
Note
The ”max-clients” setting defines the maximum number of clients
allowed to simultaneously connect. The exact number of connections the server can handle can be further limited for performance reasons,
as it depends on the platform of your product ( section 1.5
load of the established tunnels as well as the configuration of your unit.
Default values 25
37.3.28
Change pull settings
Syntax [no] pull
Context
context (Only valid when client)
Usage In client mode the client may receive routes and ip address from the server. When setting ”no pull” all these settings the server tries to push, will be discarded.
Default values Enabled
37.3.29
Show SSL Tunnel Status
Syntax show tunnel ssl [ID]
Context
context.
Usage Show the status for all or for a specific SSL tunnel.
952 © 2017 Westermo Teleindustri AB
Westermo OS Management Guide
Version 4.22.0-0
Default values If no tunnel ID is specified, the status of all SSL tunnels is shown.
© 2017 Westermo Teleindustri AB 953
advertisement
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Related manuals
advertisement
Table of contents
- 2 Legal information
- 3 Table of Contents
- 10 I Introduction to WeOS and its Management Methods
- 11 1 Introduction
- 11 1.1 Westermo and its WeOS products
- 11 1.2 Getting Started
- 12 1.3 Introduction to WeOS
- 12 1.4 How to read this document
- 14 1.5 Westermo products running WeOS
- 17 2 Quick Start
- 17 2.1 Starting the Switch for the First Time
- 18 2.2 Modifying the IP Setting
- 30 3 Overview of Management Methods
- 31 3.1 When to use the WeConfig tool
- 31 3.2 When to use the Web
- 32 3.3 When to use the CLI
- 34 4 Management via Web Interface
- 35 4.1 Document Conventions
- 36 4.2 Logging in
- 38 4.3 Navigation
- 41 4.4 System Overview
- 48 5 Management via CLI
- 48 5.1 Overview of the WeOS CLI hierarchy
- 50 5.2 Accessing the CLI
- 54 5.3 Using the CLI
- 60 5.4 General CLI commands
- 64 6 WeOS SNMP Support
- 64 6.1 Introduction and feature overview
- 77 6.2 Managing SNMP via the web interface
- 81 6.3 Manage SNMP Settings via the CLI
- 86 II Common Switch Services
- 87 7 General Switch Maintenance
- 87 7.1 Overview
- 123 7.2 Maintenance via the Web Interface
- 138 7.3 Maintenance via the CLI
- 169 8 General System Settings
- 169 8.1 Overview of General System Features
- 172 8.2 Managing System Settings via Web
- 177 8.3 Managing System Settings via CLI
- 191 9 Authentication, Authorisation and Accounting
- 192 9.1 Overview over AAA
- 201 9.2 Managing AAA via the web
- 221 9.3 Managing AAA via the CLI
- 241 9.4 Feature Parameters
- 242 10 Ethernet Port Management
- 242 10.1 Overview of Ethernet Port Management
- 257 10.2 Managing port settings via the web interface
- 261 10.3 Managing port settings via the CLI
- 271 11 Ethernet Statistics
- 271 11.1 Ethernet Statistics Overview
- 278 11.2 Statistics via the web interface
- 283 11.3 Statistics via the CLI
- 286 12 SHDSL Port Management
- 286 12.1 Overview of SHDSL Port Management
- 292 12.2 Managing SHDSL ports via the web interface
- 300 12.3 Managing SHDSL ports via the CLI
- 306 13 ADSL/VDSL Port Management
- 306 13.1 Overview of ADSL/VDSL Port Management
- 320 13.2 Managing ADSL/VDSL ports via the web interface
- 332 13.3 Managing ADSL/VDSL ports via the CLI
- 337 14 Power Over Ethernet (PoE)
- 337 14.1 Overview of Power over Ethernet (PoE)
- 341 14.2 Managing PoE via the web interface
- 345 14.3 Managing PoE via the CLI interface
- 348 15 Virtual LAN
- 348 15.1 VLAN Properties and Management Features
- 359 15.2 Port-based network access control
- 364 15.3 Managing VLAN settings via the web interface
- 374 15.4 Managing VLAN settings via the CLI
- 386 16 FRNT
- 386 16.1 Overview of the FRNT protocol and its features
- 390 16.2 FRNT and RSTP coexistence
- 392 16.3 Managing FRNT settings via the web interface
- 397 16.4 Managing FRNT settings via the CLI
- 400 17 Ring Coupling and Dual Homing
- 401 17.1 Overview
- 415 17.2 Managing via the Web
- 419 17.3 Managing via CLI
- 429 17.4 Feature Parameters
- 430 18 Spanning Tree Protocol - RSTP and STP
- 430 18.1 Overview of RSTP/STP features
- 436 18.2 Managing RSTP via the web interface
- 440 18.3 Managing RSTP via the CLI
- 445 19 Media Redundancy Protocol
- 445 19.1 Overview of the MRP protocol and its features
- 449 19.2 Managing MRP settings via the web interface
- 452 19.3 Managing MRP settings via the CLI
- 456 20 Link Aggregation
- 456 20.1 Link Aggregation Support in WeOS
- 467 20.2 Managing Link Aggregation via the Web
- 471 20.3 Managing Link Aggregation via CLI
- 476 21 Multicast in Switched Networks
- 476 21.1 Overview
- 482 21.2 Managing IGMP in the Web Interface
- 484 21.3 Managing IGMP in the CLI
- 488 22 General Network Settings
- 488 22.1 Overview
- 489 22.2 Network interfaces
- 505 22.3 General IP settings
- 508 22.4 Managing network interfaces via the web
- 515 22.5 Managing general IP settings via the web
- 521 22.6 Managing network interfaces via the CLI
- 532 22.7 Managing general IP settings via the CLI
- 548 22.8 Feature Parameters
- 549 23 DHCP Server
- 550 23.1 Overview of DHCP Server Support in WeOS
- 564 23.2 Configuring DHCP Server Settings via the Web
- 571 23.3 Configuring DHCP Server Settings via the CLI
- 583 23.4 Feature Parameters
- 584 24 DHCP Relay Agent
- 585 24.1 Overview of DHCP Relay Agent Support
- 596 24.2 Configuring DHCP Relay Agent via the Web
- 599 24.3 Configuring DHCP Relay Agent via the CLI
- 606 25 Alarm handling, LEDs and Digital I/O
- 606 25.1 Alarm handling features
- 619 25.2 Managing Alarms via the Web
- 625 25.3 Managing Alarms via the CLI
- 652 25.4 Digital I/O
- 654 25.5 LEDs
- 657 26 Logging Support
- 658 26.1 Logging Support in the web interface
- 659 26.2 Managing Logging Support via the CLI
- 661 III Router/Gateway Services
- 662 27 IP Routing in WeOS
- 662 27.1 Summary of WeOS Routing and Router Features
- 670 27.2 Static unicast routes via Web
- 673 27.3 Enabling Routing, Managing Static Routing, etc., via CLI
- 675 28 Dynamic Routing with OSPF
- 675 28.1 Overview of OSPF features
- 689 28.2 OSPF Web
- 693 28.3 Managing OSPF via the CLI
- 705 29 Dynamic Routing with RIP
- 705 29.1 Overview of RIP Features
- 711 29.2 RIP Web
- 714 29.3 Managing RIP via the CLI
- 723 30 IP Multicast Routing
- 723 30.1 Summary of WeOS Multicast Routing Features
- 727 30.2 Managing Multicast Routing via Web Interface
- 732 30.3 Managing Multicast Routing via CLI
- 736 31 Virtual Router Redundancy (VRRP)
- 737 31.1 Introduction to WeOS VRRP support
- 744 31.2 Managing VRRP via the web interface
- 749 31.3 Managing VRRP via the CLI
- 757 32 Firewall Management
- 758 32.1 Overview
- 785 32.2 Firewall Management via the Web Interface
- 809 32.3 Firewall Management via the CLI
- 823 IV Virtual Private Networks and Tunnels
- 824 33 Overview of WeOS VPN and Tunnel support
- 824 33.1 WeOS support for VPNs
- 825 33.2 Tunneling using PPP
- 825 33.3 Tunneling using GRE
- 826 34 PPP Connections
- 827 34.1 Overview of PPP Properties and Features
- 837 34.2 Managing PPP settings via the web interface
- 843 34.3 Managing PPP settings via the CLI
- 854 35 GRE tunnels
- 854 35.1 Overview of GRE tunnel Properties and Management Features
- 858 35.2 Managing GRE settings via the web interface
- 860 35.3 Managing GRE settings via the CLI
- 864 36 IPsec VPNs
- 865 36.1 Overview of IPsec VPN Management Features
- 886 36.2 Managing VPN settings via the web interface
- 896 36.3 Managing VPN settings via the CLI
- 913 36.4 Feature Parameters
- 914 37 SSL VPN
- 914 37.1 Overview of SSL VPN Management Features
- 933 37.2 Managing SSL VPN settings via the web interface
- 939 37.3 Managing SSL VPN settings via the CLI
- 954 37.4 Feature Parameters
- 955 38 WeConnect
- 957 38.1 Installing WeConnect via the Web
- 959 38.2 Installing WeConnect via the CLI
- 961 38.3 Troubleshooting
- 965 V Serial Port Management and Applications
- 966 39 Serial Port Management
- 967 39.1 Overview of Serial Port Management
- 970 39.2 Managing serial ports via the web interface
- 973 39.3 Managing serial ports via the CLI interface
- 979 40 Serial Over IP
- 979 40.1 Overview of Serial Over IP
- 991 40.2 Managing Serial Over IP via the web interface
- 998 40.3 Managing Serial Over IP via the CLI interface
- 1014 41 Modbus Gateway
- 1016 41.1 Managing Modbus Gateway via the web interface
- 1020 41.2 Managing Modbus Gateway via the CLI interface
- 1029 42 MicroLok II Gateway
- 1029 42.1 Overview of MicroLok Gateway Properties and Management Features
- 1034 42.2 Managing MicroLok Gateway via the web interface
- 1038 42.3 Managing MicroLok Gateway via the CLI interface
- 1045 VI Train Specific Protocols
- 1046 43 TTDP
- 1046 43.1 Overview of TTDP Management Features
- 1065 43.2 Managing TTDP settings via the CLI
- 1072 VII Appendixes
- 1073 Acronyms and abbreviations
- 1076 References
- 1081 Index