
2: Overview
EDS1100/2100 User Guide 17
Command-Line Interface (CLI)
Making the edge-to-enterprise vision a reality, the EDS1100/2100 with the Evolution OS™ uses
industry-standard tools for configuration, communication, and control. For example, the Evolution
OS™ uses a Command Line Interface (CLI) whose syntax is very similar to that used by data
center equipment such as routers and hubs.
VIP Access
Virtual IP Access is the Lantronix technology that solves the access-through-firewall problem. With
VIP Access, the EDS1100/2100 can act as a ManageLinx DSC and provide direct access to your
equipment behind a firewall.
SNMP Management
The EDS1100/2100 supports full SNMP management, making it ideal for applications where
device management and monitoring are critical. These features allow networks with SNMP
capabilities to correctly diagnose and monitor EDS1100/2100.
XML-Based Architecture and Device Control
XML is a fundamental building block for the future growth of M2M networks. The EDS1100/2100
supports XML-based configuration setup records that make device configuration transparent to
users and administrators. The XML is easily editable with a standard text or XML editor.
Really Simple Syndication (RSS)
The EDS1100/2100 supports Really Simple Syndication (RSS) for streaming and managing on-
line content. RSS feeds all the configuration changes that occur on the device. An RSS aggregator
then reads (polls) the feed. More powerful than simple email alerts, RSS uses XML as an
underlying Web page transport and adds intelligence to the networked device, while not taxing
already overloaded email systems.
Enterprise-Grade Security
Evolution OS™ provides the EDS1100/2100 the highest level of networking security possible. This
‘data center grade’ protection ensures that each device on the M2M network carries the same
level of security as traditional IT networking equipment in the corporate data center.
By protecting the privacy of serial data transmitted across public networks, users can maintain
their existing investment in serial technology, while taking advantage of the highest data-protection
levels possible.
SSH and SSL can:
Verify the data received came from the proper source.
Validate that the data transferred from the source over the network has not changed when it
arrives at its destination (shared secret and hashing).
Encrypt data to protect it from prying eyes and nefarious individuals.
Provide the ability to run popular M2M protocols over a secure SSH or SSL connection.
In addition to keeping data safe and accessible, the EDS1100/2100 has robust defenses to hostile
Internet attacks such as denial of service (DoS), which can be used to take down the network.
Moreover, the EDS1100/2100 cannot be used to bring down other devices on the network.
Kommentare zu diesen Handbüchern