ATen SN3002P Manual
Læs nedenfor 📖 manual på dansk for ATen SN3002P (100 sider) i kategorien Server. Denne guide var nyttig for 38 personer og blev bedømt med 4.5 stjerner i gennemsnit af 2 brugere
Side 1/100

User Manual
ATEN Altusen™
SN3001 / SN3001P
SN3002 / SN3002P
RS-232 Secure Device Server

Secure Device Server User Manual
ii
EMC Information
FEDERAL COMMUNICATIONS COMMISSION INTERFERENCE
STATEMENT
This equipment has been tested and found to comply with the limits for a Class
A digital device, pursuant to Part 15 of the FCC Rules. These limits are
designed to provide reasonable protection against harmful interference when
the equipment is operated in a commercial environment. This equipment
generates, uses, and can radiate radio frequency energy and, if not installed and
used in accordance with the instruction manual, may cause harmful
interference to radio communications. Operation of this equipment in a
residential area is likely to cause harmful interference in which case the user
will be required to correct the interference at his own expense.
This device complies with Part 15 of the FCC Rules. Operation is subject to the
following two conditions: (1) this device may not cause harmful interference,
and (2) this device must accept any interference received, including
interference that may cause undesired operation.
FCC Caution
Any changes or modifications not expressly approved by the party responsible
for compliance could void the user's authority to operate this equipment.
Warning
Operation of this equipment in a residential environment could cause radio
interference.
Achtung
Der Gebrauch dieses Geräts in Wohnumgebung kann Funkstörungen
verursachen.
KCC Statement:
Industry Canada Statement
This Class A digital apparatus complies with Canadian ICES-003.

Secure Device Server User Manual
iii
RoHS
This product is RoHS compliant.
About This Manual
This manual is provided to help you get the most out of your Secure Device
Server. It covers all aspects of the device, including installation, configuration,
and operation.
The Secure Device Server models covered in this user manuals include:
An overview of the information found in the manual is provided below.
Chapter 1, Introduction, introduces Secure Device Server. Its purpose,
features and benefits are presented, and its front and back panel components
are described.
Chapter 2, Hardware Setup, provides step-by-step instructions for setting
up Secure Device Server.
Chapter 3, Network Configuration and Login, explains how to log into
the Secure Device Server from a web browser.
Chapter 4, Web Console, explains the administrative procedures that are
employed to configure the Secure Device Server’s working environment.
Chapter 5, User Management, details login accounts and third-party
authentication services supported, such as RADIUS.
Chapter 6, Port Operating Modes, introduces the Secure Device Server’s
operating modes, and explains the purpose of each.
Chapter 7, Port Access, describes how to access the COM ports of the
Secure Device Server and start SNViewer.
Models Product Names
SN3001 1-Port RS-232 Secure Device Server
SN3001P 1-Port RS-232 Secure Device Server with PoE
SN3002 2-Port RS-232 Secure Device Server
SN3002P 2-Port RS-232 Secure Device Server with PoE

Secure Device Server User Manual
iv
Chapter 8, Remote Terminal Operation, describes how the Secure
Device Server can be accessed via remote terminal sessions, such as Telnet,
SSH, and PuTTY.
Chapter 9, Virtual Serial Port Manager, shows how to install the virtual
COM port driver and to set up and manage the virtual COM port.
Chapter 10, Serial Network Device Manager, explains how to use the
Serial Network Device Management utility to create and maintain device
groups for easy management of the serial ports on your installation; and as an
AP alternative to the browser-based management utilities.
Appendix, provides technical and troubleshooting information at the end of
the manual.
Conventions
This manual uses the following conventions:
Monospaced Indicates text that you should key in.
[ ] Indicates keys you should press. For example, [Enter] means to
press the Enter key. If keys need to be chorded, they appear
together in the same bracket with a plus sign between them:
[Ctrl+Alt].
1. Numbered lists represent procedures with sequential steps.
♦Bullet lists provide information, but do not involve sequential
steps.
>Indicates selecting an option (such as on a menu or dialog box),
that comes next. For example, Start
>
Run means to open the
Start menu, and then select Run.
Indicates critical information.

Secure Device Server User Manual
v
Package Contents
SN3001 / SN3002
The standard SN3001 / SN3002 package consists of:
1 Secure Device Server (SN3001 / SN3002)
1 power adapter
1 terminal block
1 foot pad set (4 pcs)
1 DIN rail mount kit
1 user instructions*
SN3001P / SN3002P
The standard SN3001P / SN3002P package consists of:
1 Secure Device Server with PoE (SN3001P / SN3002P)
1 terminal block
1 foot pad set (4 pcs)
1 DIN rail mount kit
1 user instructions*
Check to make sure that all of the components are present and in good order.
If anything is missing, or was damaged in shipping, contact your dealer for
assistance.
Read this manual thoroughly and follow the installation and operation
procedures carefully to avoid any damage to the Secure Device Server or to any
other devices on the Secure Device Server installation.
*Features may have been added to the Secure Device Server since this manual
was released. Please visit our website to download the most up to date
version of the manual.

Secure Device Server User Manual
vi
Product Information
For information about all ATEN products and how they can help you connect
without limits, visit ATEN on the web or contact an ATEN authorized reseller.
Visit ATEN on the web for a list of locations and telephone numbers:
User Information
Online Registration
Be sure to register your product at our online support center:
Telephone Support
For telephone support, call this number:
International http://www.aten.com
North America http://www.aten-usa.com
International http://eservice.aten.com
International 886-2-8692-6959
China 86-400-810-0-810
Japan 81-3-5615-5811
Korea 82-2-467-6789
North America 1-888-999-ATEN ext 4988
1-949-428-1111

Secure Device Server User Manual
vii
User Notice
All information, documentation, and specifications contained in this manual
are subject to change without prior notification by the manufacturer. The
manufacturer makes no representations or warranties, either expressed or
implied, with respect to the contents hereof and specifically disclaims any
warranties as to merchantability or fitness for any particular purpose. Any of
the manufacturer's software described in this manual is sold or licensed as is.
Should the programs prove defective following their purchase, the buyer (and
not the manufacturer, its distributor, or its dealer), assumes the entire cost of all
necessary servicing, repair and any incidental or consequential damages
resulting from any defect in the software.
The manufacturer of this system is not responsible for any radio and/or TV
interference caused by unauthorized modifications to this device. It is the
responsibility of the user to correct such interference.
The manufacturer is not responsible for any damage incurred in the operation
of this system if the correct operational voltage setting was not selected prior
to operation. PLEASE VERIFY THAT THE VOLTAGE SETTING IS
CORRECT BEFORE USE.

Secure Device Server User Manual
viii
Contents
EMC Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii
About This Manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .iii
Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .iv
Package Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
SN3001 / SN3002 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
SN3001P / SN3002P . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
Product Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .vi
User Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .vi
Online Registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .vi
Telephone Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .vi
User Notice . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii
Chapter 1.
Introduction
Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Serial-to-Ethernet Connectivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Hardware. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
System Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
SN3001 / SN3001P / SN3002 / SN3002P Front View . . . . . . . . . . . . . . . . 4
SN3001 / SN3001P / SN3002 / SN3002P Rear View . . . . . . . . . . . . . . . . 4
SN3001 / SN3001P / SN3002 / SN3002P Top View . . . . . . . . . . . . . . . . . 5
Chapter 2.
Hardware Setup
Before you Begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Placement Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Wall Mount . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
DIN Rail Mount . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Parallel DIN Rail Mount . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Perpendicular DIN Rail Mount. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Rack Mount. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Serial Port Pin Assignments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Chapter 3.
Network Configuration and Login
IP Address Determination. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

Secure Device Server User Manual
ix
IP Installer Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Without IP Installer (non-DHCP only) . . . . . . . . . . . . . . . . . . . . . . . . .18
Logging In . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Quick Setup Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21
Serial . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Chapter 4.
Web Console
Web Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23
Serial Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Editing Serial Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Port Buffering. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Operating Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27
Network. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33
General Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Time. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .36
Notification. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37
SMTP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Syslog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Advanced. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Access Protection (IP Filter) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Security Level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .42
Account Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Security Certificate. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Update & Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Firmware Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Backup & Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
User Accounts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Chapter 5.
User Management
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
User. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .49
Adding Users. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Editing Users. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Deleting Users. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52

Secure Device Server User Manual
x
Online Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Authentication Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
RADIUS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Chapter 6.
Port Operating Modes
Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Selecting Operating Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Operating Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Real COM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
TCP Server & Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
TCP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
TCP Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Serial Tunneling Server & Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
UDP Mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Console Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Console Management Direct. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Disable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Chapter 7.
Port Access
Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Telnet / SSH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
SNViewer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Control Panel Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Data Import . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Encode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Terminal Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Chapter 8.
Remote Terminal Operation
Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Terminal Login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Telnet Login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
SSH Login (Linux). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Third-party Utility (Windows). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Terminal Main Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Chapter 9.
Virtual Serial Port Manager
Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71

Secure Device Server User Manual
xi
Real COM Port Management — Virtual Serial Port Manager. . . . . . . . . . 72
Utility Interface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Menu and Toolbar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Target Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Target List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Port List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Port Mapping and Unmapping. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Port Mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .76
Mapped COM Port. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Port Unmapping. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .77
Real COM Port Management — Linux Commands . . . . . . . . . . . . . . . . . 78
Mapping / Unmapping Virtual Ports. . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Virtual Port Naming Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Appendix
Safety Instructions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
DC Power . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .81
Rack Mounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
International. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .83
North America . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .83
Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Clear Login Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Limited Warranty . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88

Secure Device Server User Manual
xii
This Page Intentionally Left Blank

1
Chapter 1
Introduction
Overview
The Secure Device Server provides security-assuring, IP-based LAN
connectivity for RS-232 serial devices and supports a wide range of operation
modes. It empowers everyday RS-232 serial device — PLCs, meters, and
sensors — to be connected to a network, and allowing them to be accessed and
managed from anywhere over the network.
Equipped with extensive security features, such as Secure Real COM, Secure
TCP Client and Server, Secure Serial Tunneling, and Secure Console
Management, the Secure Device Server is the ideal solution for managing RS-
232 serial device in a wide range of security-critical applications.
Fully compatible with existing serial communication software, the Secure
Device Server ensures that your former investments in software development
are protected. Software designed to work with COM or TTY ports can access
the serial devices connected ove the Secure r a TCP/IP network by utilizing
Device Server’s Real COM or TTY drivers. This feature also breaks through
the port number and distance limitation barriers encountered with PC
hardware.
With SSL and SSH protocol support — for encrypting data transmission — the
Secure Device Server ensures secured data transmission over both private and
public networks.
Installing the Secure Device Server is fast and easy: plugging cables into their
appropriate ports is all that is entailed. It also offers a browser-based GUI,
Telnet / SSH console sessions, and a Windows software utility, making
configuration and operation swift and smooth.
SN3001P / SN3002P provides PoE function, IEEE 802.3af compliant, thus can
be powered through an Ethernet cable, by a PoE switch/adapter, without
requiring an additional power supply.
All in all, with its advanced features and ease of operation, the Secure Device
Server is the most convenient, reliable, and cost-effective way to remotely
manage your serial devices.

Secure Device Server User Manual
2
Features
Serial-to-Ethernet Connectivity
1 or 2 RS-232 serial ports for secured serial data over Ethernet
transmission
Secured operation modes — Secured Real COM, Secured TCP Server/
Client, Secured Serial Tunneling, Console Management (SSH), and
Console Management Direct (SSH)
Standard operation modes — Real COM, TCP Server/Client, Serial
Tunneling, UDP, Console Management (Telnet), and Console
Management Direct (Telnet)
Real COM, Real TTY, and Fixed TTY drivers for Windows, Linux, and
UNIX
Convenient console management access via Java viewer (SSH/Telnet) or
third-party clients such as PuTTY
Easy console port access via Java viewer and Sun Solaris ready (“break-
free”)
Multiple users can simultaneously access the same port — up to 16
connections per port
Hardware
Redundant power input (power jack and terminal block) for fail-safe
power
IEEE 802.3af-compliant PoE power device equipment (SN3001P /
SN3002P only)
Surge protection for serial, Ethernet, and power
Wall and DIN-rail mounting, rack mounting (optional kit VE-RMK1U
required), and desktop installation available
Supports baud rates of 110, 134, 150, 300, 600, 1200, 1800, 2400, 4800,
7200, 9600, 19200, 38400, 57600, 115200, 230.4k, 460.8k, 921.6k bps

Chapter 1. Introduction
3
Security
Supports secured login from browsers with TLS 1.2 data encryption and
RSA 2048-bit certificates
Configurable user permissions for port access and control
Local and remote authentication and login
Third-party authentication (e.g. RADIUS)
IP address filter for security protection
System Management
Browser access with an intuitive GUI
Web-based quick setup wizard for fast configuration
Terminal-based access with a menu-driven UI via Telnet / SSH
Online / offline detection of connected serial devices (including terminal
blocks) — automatically send event notifications when the devices are
offline (e.g. power failure) for device status monitoring
System event logs will be saved to internal memory or Syslog server
Port logs will be saved to internal memory or Syslog server
SNMP agent (v1/v2c)
Event notification — supports notification of SMTP email and SNMP trap
(v1/v2c)
Backup / restore system configuration and upgradable firmware
64 Kbyte port buffer prevents data loss when the network is down
NTP for time server synchronization
Multi-language web-based GUI

Secure Device Server User Manual
4
SN3001 / SN3001P / SN3002 / SN3002P Front View
SN3001 / SN3001P / SN3002 / SN3002P Rear View
No. Component Description
1 RS-232 serial
port 1
Connects to an RS-232 serial device.
2 RS-232 serial
port 2
Connects to a second RS-232 serial device. (SN3002 /
SN3002P only)
No. Component Description
1 LAN port Connects the Secure Device Server to the network. For
SN3001P / SN3002P (PoE 802.3af compliant), it can be
simultaneously supplied power through a PoE switch.
2 reset button Pressing and holding for less than three seconds performs
a system restart. Pressing and holding for more than three
seconds returns its settings (excluding user account
settings and privileges) to their default status.
3 power terminal Connects the Secure Device Server to power via DC
electric leads and the terminal block provided.
4 power jack Connects the Secure Device Server to power using a power
adapter.
32
42 5
3

Chapter 1. Introduction
5
SN3001 / SN3001P / SN3002 / SN3002P Top View
No. Component Description
1 grounding
terminal
Grounds the unit by connecting to a suitable grounded
object using a grounding wire.
2 serial port 1
LED
Lights green or orange when data is being sent or received
via the unit’s RS-232 serial port 1.
3 serial port 2
LED
Lights green or orange when data is being sent or received
via the unit’s RS-232 serial port 2. (SN3002 / SN3002P
only)
4 status LED Lights or blinks yellow/green respectively for normal
operation or startup, and lights red when an error (i.e.
hardware failure and DHCP irregularity) occurs.
5 power LED Lights green when the Secure Device Server is powered
and ready.
532 64

Secure Device Server User Manual
6
This Page Intentionally Left Blank

7
Chapter 2
Hardware Setup
Before you Begin
Placement Options
For flexibility and convenience, Secure Device Server can be mounted onto a
wall or DIN rail, as described below.
Wall Mount
To wall mount the Secure Device Server, doe the following:
Using 4 self-supplied screws, users can mount the unit onto a wall via the screw
holes at its sides, as shown below.
1. Important safety information regarding the placement of this
device is provided on page 79. Please review it before
proceeding.
2. Make sure the power of all devices to be connected have been
turned off.

Secure Device Server User Manual
8
DIN Rail Mount
Use the DIN rail mount kit included to mount the Secure Device Server onto a
DIN rail, as instructed below:
Parallel DIN Rail Mount
1. To mount the unit parallel to the DIN rail, attach 2 DIN rail mount brackets
onto the unit with the 4 screws provided, via its center screw holes.
2. Hang the unit onto the DIN rail.

Chapter 2. Hardware Setup
9
Perpendicular DIN Rail Mount
1. Attach the L-shape mounting bracket onto the unit with 2 M3x6 screws,
via its center screw holes at the side opposite to its grounding terminal.
2. Using 2 of the 4 screws enclosed, attach 1 DIN rail mount bracket onto the
side of the L-shape mounting bracket.
3. Hang the unit onto the DIN rail.

Secure Device Server User Manual
10
Rack Mount
The Rack Mount Kit (VE-RMK1U) is required for mounting the Secure
Device Server onto a rack, as instructed below:
1. Place the device onto the mounting plate while latching one of its rack ears
onto the plate’s protruded dot, as illustrated below.
2. Secure the device to the mounting plate using the hexagon head screw
supplied. Users can secure the Secure Device Server either with its serial
port(s) facing inward or outward.
Mounting Plate
Protruded dot
Protruded dot

Chapter 2. Hardware Setup
11
3. Position and align the holes on the VE-RMK1U frame with that of the
rack, and secure the frame onto the rack with 2 self-supplied screws, as
illustrated below.

Secure Device Server User Manual
12
4. Align the device and mounting plate assembly to one of the slots on the
VE-RMK1U frame, and then secure the mounting plate to the frame with
the plastic captive screw provided.
Note: Up to 4 Secure Device Servers can be secured onto a VE-RMK1U frame.
VE-RMK1U Frame
slot 1
slot 2 slot 3 slot 4

Chapter 2. Hardware Setup
13
Installation
To install the Secure Device Server, follow the steps below and refer to the
diagram on the following page (the number labels correspond to the installation
steps).
1. Use a grounding wire to ground the unit by connecting one end of the
grounding terminal and the other end to a suitable grounded object.
Note: Do not omit this step. Proper grounding helps prevent damage to the
unit from power surges and static electricity.
2. Connect the unit’s RS-232 serial port(s) to one or up to two serial
device(s).
3. Connect the unit’s LAN port to the network using a Cat 5e/6 cable. For
SN3001P / SN3002P (PoE 802.3af compliant), users can simultaneously
supply power to the unit through a PoE switch and skip 4.
2
3
ST.343ST.343

Secure Device Server User Manual
14
4. Connect the unit to power, thereby turning it on, by doing one, or both of
the following for power redundancy:
Plug the power adapter provided (not included for SN3001P /
SN3002P) into an AC power source, and plug its cable into the unit’s
power jack.
Note: The temperature tolerance of the power adapter is 0 – 40 °C. If
your environment temperature is 40 – 60 °C, you can only power
the device via the power terminal.
Connect DC + and - wires (DC 9 – 48 V) to the unit’s power terminal
with the terminal block provided.
5. After supplying power, wait for about 50 seconds for the Secure Device
Server to be ready and lights its status LED in constant green.
Note: When more than one power supply is connected, the additional power
connections maintain operation when the other is interrupted. For example, if
you have the device connected to power via both its power jack and power
terminal, the power terminal maintains operation when the power from the
power jack fails, and vice versa.
4 5
QpxfsQpxfsOfuxpsl

Chapter 2. Hardware Setup
15
Serial Port Pin Assignments
The pin assignments of Secure Device Server’s RS-232 serial ports are
provided below:
Pin
Configuration
RS-232
1 DCD
2 RxD
3 TxD
4 DTR
5 GND
6 DSR
7 RTS
8 CTS

Secure Device Server User Manual
16
This Page Intentionally Left Blank

17
Chapter 3
Network Configuration and Login
IP Address Determination
Before you start, make sure the PC you’re using is within the same LAN as the
Secure Device Server.
There are two methods for determining / setting the IP address of your Secure
Device Server, one through the IP Installer Utility on a Windows PC, and one
just using a PC (only applicable to non-DHCP network), as described below:
IP Installer Utility
Using a Windows PC, users can search for Secure Device Server’s IP address
or assign an IP address to it, in a DHCP or non-DHCP network, with the IP
Installer Utility.
1. Download IP Installer zip file under the Support and Downloads tab from
the product web page.
2. Extract and execute IPInstaller.exe. A dialog box similar to the one below
appears.

Secure Device Server User Manual
18
3. :Select the Secure Device Server in the Device List.
Note: 1. If the list is empty, or your device doesn't appear, double-check
that you have the correct network adapter selected and click
Enumerate to refresh the Device List.
2. If there is more than one device in the list, use the MAC address
to distinguish your device. The Secure Device Server’s MAC
address is located on its bottom panel.
4. To check the IP address of the Secure Device Server or set an IP address
for it, respectively select Obtain an IP address automatically or Use the
following IP address.
For setting an IP address, fill in the required IP address, subnet mask
and gateway information according to your network environment.
5. Click Set IP. The IP address of the Secure Device Server is displayed in
the Device List.
6. Click Exit to close the program.
Without IP Installer (non-DHCP only)
On a non-Windows system, under non-DHCP network, users can assign a static
IP address to the Secure Device Server, different from its default of
192.168.0.60, by following the steps below.
1. Set your PC’s IP address to 192.168.0.XXX XXX, where can be any
number except for 10.
2. Type the device’s default IP address — 192.168.0.60 — in your browser’s
URL location bar.
3. Log in with a valid username and password (see page 19).
4. On the Secure Device Server’s web interface, assign a fixed IP address for
it according to your network environment.
5. Save the settings and log out. After you log out, make sure to reset your
PC’s IP address to its original value.

Chapter 3. Network Configuration and Login
19
Logging In
To access Secure Device Server from a web browser, do the following:
1. Open your browser and specify the IP address of the Secure Device Server
you want to access in the browser's URL location bar.
Note: If you are the administrator, and are logging in for the first time, the
various ways to determine the Secure Device Server's IP address are
described in IP Address Determination (see page 17).
2. If a Security Alert dialog box appears, accept the certificate — it can be
trusted (see Security Certificate, page 43, for details). If a second
certificate appears, accept it as well.
3. On the login page that appears, provide a valid username and password
to log in. The default Username and Password are administrator and
password, respectively.
4. Once successfully logged in, the main screen of the Secure Device Server
appears. Upon first-time login, users are required to change the login
password of the Secure Device Server.
5. Upon first-time login, users are required to change the login password of
the Secure Device Server.
6. Once logged in, the Quick Setup Wizard is displayed, which takes you
through the basic settings of the Secure Device Server.

Secure Device Server User Manual
20
Quick Setup Wizard
The Quick Setup Wizard gets you started with the basic settings of the Secure
Device Server.
General
Item Description
Device name Displays the name of the Secure Device Server. Change the
device name if needed.
Current time Displays the current time of the device.
Time settings Sets the time settings of the device. For details, refer to Time,
page 36.

Chapter 3. Network Configuration and Login
21
Network
The Network tab sets the network settings of the Secure Device Server. For
details, refer to Network, page 32.

Secure Device Server User Manual
22
Serial
Note: Settings on the Serial tab applies to all serial ports of the Secure Device
Server.
Click Save for the settings to take effect.The Secure Device Server’s web
console main screen is displayed. See Web Console for details.
Item Description
Mode Selects the operation mode for the Secure Device Server’s
serial port(s). See Port Operating Modes.
Secure transfer Check for secured data transmission.
Baud rate Selects the serial ports’ data transfer speed.
Parity Selects to check the integrity of the data transmitted, which
shall match the parity setting of the serial device(s) connected
Data bits Selects the number of bits used to transmit one character of
data, and matching the data bit setting of the serial device(s)
connected.
Stop bits Selects the stopping bit, indicating a character has been
transmitted, and matching the stop bit setting of the serial
device(s) connected.

23
Chapter 4
Web Console
Web Interface
The web interface of the Secure Device Server and its components are shown
and explained below:
No. Item Description
A Sidebar Menu Provides a selection of configuration pages. Click to select
a configuration page and/or expand submenus.
B Task Bar Contains access to the Quick Setup Wizard, user settings
(including logout) and the device info.
C Interactive Display
Panel
Displays the configuration page currently selected.
1 Quick Setup
Wizard
Takes users through the basic settings of the Secure
Device Server. See p. 20.
2 Personal Click to display the user currently logged in, the time of
login, user preference option, change password, and
logout options.
Click Preferences to change the language of the interface.
Click Change password to change the password for the
current user account.
3 About Click to display the model number and the firmware
version of the device.
A
B
C
2 31

Secure Device Server User Manual
24
Serial Ports
The Serial Ports page provides an overview of the Secure Device Server’s
serial COM ports, including its settings and the serial devices connected.
Editing Serial Ports
Click the EDIT button to modify the settings of a serial COM port. The edit
window, with Properties, Operating Mode, and Port Buffering tabs, appears.
Item Description
Indicates whether the serial port is online or offline.
Port Name Displays the name of the serial port.
Operating Mode Displays the current operating mode of the serial port.
See Operating Mode, page 27.
Ethernet Port Displays the network port value of the serial port.
Baud Rate Displays the baud rate of the serial port.
Online Indicates whether the serial port is online or offline.
In Use Indicates whether the serial port has active data transmission.
Action
Edit: Click to edit the serial port’s settings.
Dump Buffer: Click to download the port activity logs of the
serial port from the device as a .txt file. This function is only
available when the port activity logs are saved to the
device’s memory. See Port Buffering, page 26.
Telnet / SSH: Click to configure the Secure Device Server or
access and control the connected serial device via Telnet /
SSH protocol. This function is only available when the port’s
operating mode is set to Console Management.
See Operating Mode, page 27, and , page 62.Telnet / SSH
Note: The maximum number of simultaneous connections to
any one serial port is 16.

Chapter 4. Web Console
25
Properties
Click Save for the changes to take effect.
Optionally click Save & Apply All to apply the same settings to all of the
Secure Device Server’s serial ports.
Item Description
Port number Displays the number of the serial port.
Port name Sets the name of the serial port.
Baud rate Selects the serial ports’ data transfer speed. Default = “9600”
Parity Selects to check the integrity of the data transmitted, which
shall match the parity setting of the serial device connected.
Default = “None”
Data bits Selects the number of bits used to transmit one character of
data, and matching the data bit setting of the serial device
connected. Default = “8”
Stop bits Selects the stopping bit, indicating a character has been
transmitted, and matching the stop bit setting of the serial
device connected. Default = “1”
Flow control Selects how the data flow is controlled, and matching the flow
control setting of the serial device connected. Default = “None”

Secure Device Server User Manual
26
Port Buffering
Port buffering creates a log of the activities conducted when a port is accessed.
You can save the log to the internal memory of the Secure Device Server, for
up to 128 KB, or a Syslog server.
To enable Port Buffering, select Memory or Syslog Server from the drop-
down list in the Port Buffering tab. Optionally check Time Stamps to add time
stamps to the logs created.
Click Save for the changes to take effect.
Note: Before Syslog can be selected, make sure to enable Syslog server, see
Syslog, page 39.
Optionally click Save & Apply All to apply the same settings to all of the
Secure Device Server’s serial ports.

Chapter 4. Web Console
27
Operating Mode
The Operating Mode tab determines how the serial COM port of the Secure
Device Server is accessed.
Note: The maximum number of simultaneous connections to any one serial
port is 16.
For detailed information of the various port operating modes, see Chapter 6,
Port Operating Modes.
Real COM
Check Secure transfer to encrypt all data being transfered, using SSL, through
the serial COM port.
Note: Real COM operating mode must be used in conjunction with ATEN’s
Virtual COM Port Utility, see Virtual Serial Port Manager, page 71.
TCP Server
Item Description
Secure transfer Check to encrypt all data being transferred between Secure
Device Servers’ serial COM ports via TCP Server-Client
modes, using SSL.

Secure Device Server User Manual
28
TCP Client
Item Description
Secure transfer Check to encrypt all data being transferred between Secure
Device Servers’ serial COM ports via TCP Client-Server
modes, using SSL.
Destination host Enter the IP address and service port of a destination host for
data transmission. The device can simultaneously send data
to up to 16 destination hosts.

Chapter 4. Web Console
29
UDP
Item Description
Destination host Enter the range of IP address(es) and the port values for
connections to destination hosts via the UDP protocol. The
Secure Device Server can simultaneously connect to up to 16
destination hosts.

Secure Device Server User Manual
30
Serial Tunneling Server
Serial Tunneling Client
Item Description
TCP port Sets the TCP/IP port value of the serial port operating as a
serial tunneling server.
Secure transfer Check to encrypt all data being transferred through the serial
COM ports between two Secure Device Server via Serial
Tunneling Server-Client., using SSL.
Item Description
Destination Enter the IP address and port value of the serial tunneling
server for sending data to.
Secure transfer Check to encrypt all data being transferred through the serial
COM ports between two Secure Device Servers via Serial
Tunneling Client-Server, using SSL.

Chapter 4. Web Console
31
Console Management
Disable
Select to disable the use of the serial port.
Item Description
Connection protocol Check / uncheck to enable / disable SSH and Telnet
connection protocols.
Direct connection Select for Console Management Direct operating mode. For
detailed information on the various available operating modes,
see Chapter 6, Port Operating Modes.
Logout timeout
(0 ~ 180 min)
Automatically logs out user(s) accessing when there is no
input by the user for the amount of time set. “0” means the
user will never be automatically logged out.
Suspend character The suspend character is used to bring up the Suspend Menu
in Telnet sessions. Valid characters include A – Z, except for
H, I, J, and M.
Exit Macro Sets the Exit Macro that will be executed upon exiting the
serial device.
Map <CR-LF> Select to send Carriage Return (CR) and/or Line Feed (LF)
signals.

Secure Device Server User Manual
32
Network
The Network page contains the network settings of the Secure Device Server,
as described in the table below.
Item Description
Configuration Selects the type of configuration for setting the Secure Device
Server’s IP address, from DHCP or Static IP.
IP address
Subnet mask
Default gateway
For static IP, set the IP address, subnet mask, and gateway of
the device according to your network environment.
DNS Selects the method of obtaining DNS server, from Obtain
automatically or Set manually.
Preferred DNS server
Alternate DNS server
For setting the DNS server manually, type the preferred and
alternate DNS server address for the device.

Chapter 4. Web Console
33
System
Click to expand the System submenu for all of the system related settings of
the Secure Device Server, including General settings, Notification, Security,
and Update & Restore.

Secure Device Server User Manual
34
General Settings
The General Settings contains 2 tabs: General and Time.
General
Item Description
Device name Sets the device name for the Secure Device Server.
Description Enter a description for the device if needed.
MFG Displays the MFG (Manufacturing Number) of the device.
Note: The Manufacturing Number is an internal serial number
used by ATEN’s factory and technical support staff to identify
products.
MAC Displays the MAC address of the Secure Device Server.
Uptime Displays the amount of time the device has been running for.
Power source Displays the device’s current power source.

Chapter 4. Web Console
35
Click Save for the changes to take effect.
Login session timeout
(0 ~ 180 min)
Automatically logs out user(s) when there are no actions done
on the Secure Device Server’s web interface for the amount of
time set. “0” means the user will never be automatically logged
out.
Reboot System Reboots the Secure Device Server.
Service ports Sets the service port values for the following:
HTTP: used for browser access (default = 80)
HTTPS: used for secure browser access (default = 443)
SSH: used for SSH access (default = 22)
Telnet: used for Telnet access. (default = 23)
Base socket: used for receiving and accepting TCP
connections (default = 5001). For example, when the
base socket value is 5001, the device’s TCP port value
for Port 1/2 via Telnet and SSH will be 5001/5002 and
5101/5102, respectively.
Note:
1. Valid entries for all service ports are from 1 – 65535.
2. A system restart is required when any of the service
port settings have been changed.
IP Installer
Configuration
Select to determine if the IP Installer utility can detect for and/
or change the Secure Device Server‘s IP address.
Enabled: IP Installer can detect for and change the
unit’s IP address.
View Only: IP Installer can only detect for but unable to
change the unit’s IP address.
Disabled: IP Installer cannot detect for and change the
unit’s IP address.
Item Description

Secure Device Server User Manual
36
Time
The Time tab contains the time settings of the Secure Device Server, as
described in the table below.
Item Description
Time zone Select one of the following to set the time of the Secure Device
Server.
Synchronize with computer time: Synchronizes with the
time of the client PC.
Set manually: Manually set a desired time for the
device.
Synchronize with NTP Server: Synchronizes the time of
the device using an NTP server.
Note: If you use Synchronize with computer time or Set
manually, the time settings must be reconfigured whenever the
Secure Device Server is restarted.

Chapter 4. Web Console
37
Notification
The Notification page contains 4 tabs: SMTP, SNMP, Syslog, and Advanced.
SMTP
Item Description
Enable SMTP service Check to enable SMTP service for sending event notifications
via email, as specified by the Advanced tab (see page 40).
Server Address / Port Enter the SMTP server’s address and service port value.
Email Enter the sender’s email address.
My server requires
authentication
Check if your SMTP server requires authentication and enter a
valid username and password.
Recipient Enter the recipient’s email address.

Secure Device Server User Manual
38
SNMP
Note: Before SNMP can be used, make sure to Enable SNMP Agent service
in System > Security > Security Level.
Item Description
Send SNMP traps Check to enable SNMP service for sending SNMP trap event
notifications, as specified by the Advanced tab (see page 40).
SNMP v1 and v2c are supported.
IP/Server Address Enter the IP/server address to receive the SNMP trap events.
Port Enter the service port of the server to receive SNMP trap
events.
Community Enter the SNMP community.
SNMP Agent Enter the service port and community for an SNMP agent.

Chapter 4. Web Console
39
Syslog
Item Description
Enable Syslog service Check to enable Syslog service for sending event notifications
to a Syslog server, as specified by the Advanced tab (see
page 40).
Server Address / Port Enter the Syslog server’s address and port value.

Secure Device Server User Manual
40
Advanced
The Advanced tab sets the types of event notifications to be sent via SMTP,
SNMP, and/or Syslog server. Options include but are not limited to the
example given below
Check the SMTP / SNMP / Syslog checkboxes next to each event type for
sending SMTP / SNMP / Syslog notifications when those events occur.
Note: For the specified notifications to be sent, make sure the required SMTP
/ SNMP / Syslog service have been properly configured.

Secure Device Server User Manual
42
Security Level
Account Policy
Item Description
Enable Telnet / SNMP
Agent / ICMP / SSH
service
Check or uncheck to enable or disable Telnet / SNMP Agent /
ICMP / SSH service.
Note: A system restart is required when the SNMP Agent
setting has been changed.
Enable HTTP and
redirect to HTTPS
Check to enable HTTP and automatically redirect all HTTP
access to HTTPS, for secured web browser access.
Note: A system restart is required when this setting has been
changed.
Item Description
Minimum length for
username / password
Sets the minimum number of characters required for all newly
set login usernames / passwords. Default = “6”
Password must
contain at least
Check to require at least one uppercase / lowercase / number
/ special character for all newly set passwords.

Chapter 4. Web Console
43
Security Certificate
The Security Certificate tab displays the information of the security certificate
used.
For enhanced security, users can use their own private encryption key and
signed certificate, rather than the default ATEN certificate.
There are two methods for establishing your private certificate:
Generating a Self-Signed Certificate
If you wish to create your own self-signed certificate, a free utility —
openssl.exe — is available for download over the web.
Obtaining a CA-Signed SSL Server Certificate
To ensure security, it is recommended to use a third-party CA-signed SSL
certificate obtained from a CA (Certificate Authority) website. Make sure
to save the obtained certificate and its private encryption key on the PC.

Secure Device Server User Manual
44
Update & Restore
The Update & Restore page can upgrade the Secure Device Server’s firmware
and back up and/or restore its device settings.
Firmware Update
Item Description
Import Certificate Imports a private or CA-signed security certificate from the PC.
Restore Defaults Reverts to using the default ATEN certificate.
Item Description
Firmware version Displays the current firmware version.
Upgrade with newer
firmware version only
Check to only permit firmware upgrades with newer firmware
versions.
Choose File Selects the firmware update file to be used for upgrading.
UPGRADE Upgrades the device firmware with the firmware file selected.

Chapter 4. Web Console
45
Backup & Restore
The Backup & Restore page allows users to back up or restore the system
settings of the Secure Device Server.
Backing up System Settings
To back up the system settings of the Secure Device Server, enter a Password,
which will be used for restoring, and click Backup to save the system setting
backup file, as System.conf, to the PC, which also include account-related
settings, such as passwords and user privileges.
Restoring System Settings
To restore a previously backed up system settings file, enter its Password, click
Choose File to locate it on the PC, and click Restore.

Secure Device Server User Manual
46
User Accounts
The User Accounts submenu consists of User and Authentication Services
pages, which allow users to add/edit login accounts or utilize third-party
authentication services for managing the user accounts of the Secure Device
Server, respectively.
For details on configuring user accounts and third-party authentication
services, see Chapter 5, User Management.

Secure Device Server User Manual
48
This Page Intentionally Left Blank

49
Chapter 5
User Management
Overview
This chapter takes users through how to add or edit the login accounts of Secure
Device Server, including the administrator, as well as using third-party
authentication services.
User
The Secure Device Server supports up to 16 user accounts, with two types of
users, as described below:
User Type Role
Administrator Able to access and configure all serial ports, and manage
other login accounts
User Only able to access and/or configure the authorized serial
ports, as permitted by the administrator, and unable to
configure any of the device’s system settings.
Item Description
Name Displays the username of the user account.
Type Displays the account type, Administrator or User.
Description Additional information used to describe the user account.
Status Displays the status of the user account, which includes:
Normal: The account functions normally.
Password Expired: The account’s password has expired
and must be changed.

Secure Device Server User Manual
50
Adding Users
1. Click User Accounts > User Users > on the web interface of the Secure
Device Server.
2. Click Add. The Add User window’s General tab appears. Enter the
required fields, as described in the table below.
Item Description
Username From 1 to 32 characters are allowed depending on the
Account Policy settings. See Account Policy, page 42.
Password From 1 to16 characters are allowed depending on the
Account Policy settings. See Account Policy, page 42.
Confirm Password Match the Password field to confirm the password entry.
Description Additional information about the user that you may wish to
include.
User type Select for full access and configuration rights Administrator
or select User permit only the access and configuration
rights of the serial ports, as set.
User cannot change
account password
Check to restrict the user from changing the account’s
password
User must change
password at next
login
Check to require the user to change his password upon next
login.

Chapter 5. User Management
51
3. Only for user types — User, click the Device tab to permit access and/or
configure rights for each serial port, as described in the table below.
4. Click Save to finish.
5. When the Operation Succeeded message appears, click OK.
Editing Users
To edit a user account, select it and click Edit.
In the Edit User window, make your changes by referring to Adding Users,
page 50, then click Save.
Password expires
on
Specifies the date on which the password of the login
account shall expire, and be redefined.
Note: After a user’s password expires, he can still log in with
the old password, but will be forced to change it upon login.
Item Description
No Access Select to restrict access to the serial port.
View Only Select to only allow view access to the serial port, while
restricting Telnet and SSH sessions.
Full Access Select to allow full access to the serial port.
Configuration Check to allow configuration for the serial port, including its
Properties, Operating Mode, and Port Buffering settings.
See Editing Serial Ports, page 24.
Item Description

Chapter 5. User Management
53
Authentication Services
The Secure Device Server allows external, third-party authentication services,
namely RADIUS for managing and authenticating its user accounts.
Note: When using RADIUS for authentication, only PAP is supported.
To enable such services, click User Accounts > Authentication Services on
its web interface.
RADIUS
1. To use authentication via RADIUS, enable the service on the Secure
Device Server, by referring to the table below.
Item Description
Preferred server IP/
address and server
port
Fill in the IP address and service port of the primary
(preferred) RADIUS server.
Alternate server IP/
address and server
port
Fill in the IP address and service port of the alternate
RADIUS server.
Timeout Sets the time, in seconds, that the Secure Device Server
shall wait for the RADIUS server for.
Retries Sets the number of allowed RADIUS retries.
Shared Secret (at
least 6 characters)
Enter the character string that you want to use for
authentication between the Secure Device Server and the
RADIUS server.
Produkt Specifikationer
Mærke: | ATen |
Kategori: | Server |
Model: | SN3002P |
Har du brug for hjælp?
Hvis du har brug for hjælp til ATen SN3002P stil et spørgsmål nedenfor, og andre brugere vil svare dig
Server ATen Manualer

20 August 2024

20 August 2024

20 August 2024

20 August 2024

20 August 2024

19 August 2024

19 August 2024

18 August 2024

18 August 2024

18 August 2024
Server Manualer
- Server QNAP
- Server Bosch
- Server Acer
- Server Sony
- Server HP
- Server D-Link
- Server Asus
- Server Gigabyte
- Server Toshiba
- Server Lenovo
- Server Abus
- Server Planet
- Server Black Box
- Server TRENDnet
- Server Buffalo
- Server Medion
- Server Linksys
- Server Megasat
- Server Cisco
- Server Seagate
- Server Netgear
- Server Tripp Lite
- Server Western Digital
- Server Technics
- Server Digitus
- Server Dell
- Server Fujitsu
- Server MSI
- Server NEC
- Server APC
- Server LevelOne
- Server FLIR
- Server ZyXEL
- Server Eaton
- Server ELAC
- Server Synology
- Server Hikvision
- Server Monacor
- Server AVerMedia
- Server Asustor
- Server Kramer
- Server Hanwha
- Server LaCie
- Server Naim
- Server Fantec
- Server Provision-ISR
- Server Quantum
- Server Axis
- Server ACTi
- Server Digi
- Server Teo
- Server Vimar
- Server Smart-AVI
- Server Intel
- Server Supermicro
- Server StarTech.com
- Server Conceptronic
- Server Rocstor
- Server IStarUSA
- Server Blackmagic Design
- Server Lindy
- Server Veritas
- Server Promise Technology
- Server Sitecom
- Server HGST
- Server AMX
- Server Intellinet
- Server Iomega
- Server Silverstone
- Server Geovision
- Server Ernitec
- Server KanexPro
- Server Gefen
- Server Moxa
- Server C2G
- Server Allnet
- Server Maxdata
- Server Matrox
- Server Valcom
- Server Freecom
- Server IoSafe
- Server Revox
- Server Luxman
- Server G-Technology
- Server Areca
- Server SEH
- Server Ibm
- Server Sonnet
- Server TAIDEN
- Server SIIG
- Server Advantech
- Server Mobotix
- Server Extron
- Server Avocent
- Server Silex
- Server Middle Atlantic
- Server In Win
- Server Sun
- Server Atlona
- Server MvixUSA
- Server Dual Bay
- Server Raidsonic
- Server EMC
- Server Infortrend
- Server Opengear
- Server EXSYS
- Server Raritan
- Server Chenbro Micom
- Server Mr. Signal
- Server Atlantis Land
- Server Lantronix
- Server NETSCOUT
- Server Origin Storage
- Server IMC Networks
Nyeste Server Manualer

30 Januar 2025

30 Januar 2025

23 Januar 2025

23 Januar 2025

23 Januar 2025

23 Januar 2025

23 Januar 2025

19 Januar 2025

14 Januar 2025

14 Januar 2025