Raritan LARA ECO User Manual Page 34

  • Download
  • Add to my manuals
  • Print
  • Page
    / 103
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 33
24 PRODUCT USER GUIDE
Chapter 5. Usage
Prerequisites
The LARA eco features an embedded operating system and applications offering a variety
of standardized interfaces. This chapter will describe both these interfaces and the way to
use them in a more detailed manner. The interfaces are accessed using the TCP/IP protocol
family, thus they can be accessed using the built-in Ethernet adapter or a modem, too.
The following interfaces are supported:
HTTP/HTTPS
Full access is provided by the embedded web server. The LARA eco environment can
be entirely managed using a standard web browser. You can access the LARA eco
using the insecure HTTP protocol or using the encrypted HTTPS protocol. Whenever
possible use HTTPS.
Telnet
A standard Telnet client can be used to access an arbitrary device connected to the
LARA eco’s serial port via a terminal mode.
The primary interface of the LARA eco is the HTTP interface. This is covered extensively
in this chapter. Other interfaces are addressed in subtopics.
In order to use the Remote Console window of your managed host system, the browser has
to come with a Java Runtime Environment version 1.1 or higher. If the browser has no Java
support (such as on a small handheld device), you are still able to maintain your remote
host system using the administration forms displayed by the browser itself.
Important: We recommend to install a Sun JVM 1.4.
For an insecure connection to the LARA eco we can recommend the following web
browsers:
Microsoft Internet Explorer version 5.0 or higher on Windows 98, Windows ME,
Windows 2000 andWindows XP
Netscape Navigator 7.0, Mozilla 1.6 and Mozilla Firefox onWindows 98,Windows
ME, Windows 2000,Windows XP, Linux and other UNIX-like Operating Systems
In order to access the remote host system using a securely encrypted connection, you need a
browser that supports the HTTPS protocol. Strong security is only assured by using a key
length of 128 Bit. Some of the old browsers do not have a strong 128 Bit encryption
algorithm.
Using the Internet Explorer, open the menu entry “?” and “Info” to read about the key
length that is currently activated. The dialog box contains a link that leads you to
information on how to upgrade your browser to a state of the art encryption scheme. Figure
5 - 1 shows the dialog box presented by the Internet Explorer 6.0.
Page view 33
1 2 ... 29 30 31 32 33 34 35 36 37 38 39 ... 102 103

Comments to this Manuals

No comments