Systech NDS Admin
Systech NDS Admin
Systech NDS Admin
Administrator's
Guide
SYSTECH
C O R P O R A T I O N
Revision History
Created 2003, and Protected Under the U.S. Copyright Act of 1976.
Copyright © 2003-2005, SYSTECH Corporation
All Rights Reserved
This document is subject to change without notice.
Table of Contents
CHAPTER 1: INTRODUCTION...................................................................................3
CHAPTER 2: CONFIGURATION................................................................................5
Device Server Configuration .......................................................................................... 5
Setting the IP Address .................................................................................................... 5
DHCP/BOOTP.............................................................................................................. 5
NativeCOM ................................................................................................................... 5
Assigning a Temporary IP Address via the Network ..................................................... 6
How to Use the Serial Ports ........................................................................................... 7
Configuring NativeCOM Ports for Windows .................................................................. 7
Configuring Printers (via LPR/LPD) .............................................................................. 7
Configuring Outgoing Network Connections ................................................................. 8
Configuring Incoming Network Connections via Telnet Server ..................................... 8
Configuring Modem Emulation...................................................................................... 9
Configuration via the Web Browser Interface ............................................................. 10
Serial Settings ............................................................................................................ 11
Port Services .................................................................Error! Bookmark not defined.
Service Types......................................................................................................................... 14
Phone Number Translation ......................................................................................... 17
Network Translation.................................................................................................... 19
Protocol Settings ........................................................................................................ 20
Raw or Secure TCP ............................................................................................................... 21
(Secured) Simple POS Terminal Protocols ............................................................................ 21
(Secured) Converted POS Terminal Protocols ...................................................................... 21
Paymentech™ NetConnect Conversion................................................................................. 22
First Horizon Internet Gateway............................................................................................... 22
SSL Options ........................................................................................................................... 23
Type of Peer ........................................................................................................................... 23
Peer Identity Verification......................................................................................................... 23
List of Allowable Ciphers ........................................................................................................ 24
Network Settings ........................................................................................................ 26
IP Address .............................................................................................................................. 26
IP Netmask ............................................................................................................................. 27
TCP Keep-Alive ...................................................................................................................... 28
DNS Settings .............................................................................................................. 29
IP Routing................................................................................................................... 31
Time Settings.............................................................................................................. 33
Security Settings......................................................................................................... 34
System Password................................................................................................................... 34
Network Isolation Configuration ............................................................................................. 35
Online Update............................................................................................................. 36
INDEX ................................................................................................... 69
Chapter 1: Introduction
The NDS (Network Device Server) family provides communication between peripheral
devices and computers connected to a network. When a device server is connected to your
LAN and to one or more peripherals, it manages peripheral traffic over the network, routing
it to the correct device.
As system administrator, you will have responsibility for setting up and configuring the
device server to meet your usage requirements. The device server has been designed to
make your job easy. If you are using the serial port(s) from Systech's NativeCOM, you need
only set the IP address and related parameters. This can be done with DHCP/BOOTP or
with the NativeCOM utilities. The remaining configuration will be on the host or hosts that
are accessing the device server. The hardware is simple to install, and a browser interface
ensures that management is just as simple. In addition to configuration tools, the
communications server provides tools for monitoring and managing your port activity and
for diagnosing and troubleshooting system problems.
DHCP/BOOTP
If the device server does not have an IP address, or if it obtained a temporary one via the
temporary method described below, it will attempt to get one from a DHCP/BOOTP server
on the local network. If an IP address is obtained from a DHCP server, the device server will
also ask the DHCP server for a subnet mask, a default gateway, and a DNS name and server.
NativeCOM
You can also configure your device server’s IP address using NativeCOM. NativeCOM is a
Windows software package provided free of charge by Systech. The NativeCOM
Networked COM ports software makes remote serial communication ports (e.g. EIA-
232/485/422 ports on the device server) available to Windows programs as local COM
ports. Applications from a PC running Microsoft Windows 95, Windows 98, Windows NT,
Windows 2000 or Windows XP can access and use the remote serial ports. For further
information on configuring and using Networked COM ports and assigning an IP address to
your device server, see the NativeCOM manual. The NativeCOM software and manual are
available on the CD you received with your device server and from the Systech web site
(www.systech.com).
You can use the NativeCOM Configuration Utility, NativeCOM Port Server Utility, or
NCCTool to assign an IP address to your device server. Once you have done this,
DHCP/BOOTP is disabled. The NativeCOM Configuration Utility and the Port Server
WARNINGS:
1. This method only temporarily assigns an IP address. The device server will lose this
IP address when it reboots. After you have set the temporary address, you should
use a web browser to access the
2. page and permanently set the IP address.
3. This method only works if the device server does not already have an IP address.
Once the device server obtains an IP address from any other source, this method will
no longer work. To re-enable this method, you must clear out the device server’s IP
address and reboot it.
After you have permanently set the IP address on the device server, it is a good idea to
remove the permanent ARP entry that you previously added to your system. To do this,
execute the following command:
arp -d <IP>
Removing the ARP entry will not affect your ability to communicate with the device in any
way.
Once modem emulation is enabled, verify correct operation by connecting a terminal to the
appropriate serial port and issuing an 'AT' command. If the device server returns the 'OK'
result code, modem emulation is now functioning properly. You may now establish an
outgoing connection with the 'ATD' command (see Phone Numbers for more information
on IP address formats). A phone number translation table is also available to convert phone
numbers to IP Addresses or Hostnames.
Serial Settings
The Serial Settings page allows you to specify the baud rate, character size, parity, stop bits,
and flow control behavior for each serial port:
When using the modem service on a port, the phone number will be translated to a
host/port pair then a TCP connection will be established to the remote host.
When using outgoing connections on a port, the settings configured on the Serial Settings
page will be applied to the port, and a TCP connection will be established to the remote host.
If Require carrier/Generate hangups is set, the service will wait for the presence of the DCD
modem signal before connecting.
Once connected, data received on the port is sent to the remote server over the network
connection and data received on the network connection is sent out the port.
The following screen shot represents most of the options available for configuration.
Depending on the Service Type you have selected, not all of these options will be displayed.
No Outgoing Service
Selecting this option disables outgoing port services on the specified port. Incoming
connections are still allowed. All port services options will reset to defaults.
Modem Service
Selecting this option will enable modem emulation on both the incoming and outgoing
network connections. See Modem Emulation for details on commands and responses. The
target peer (specified in the Phone Number Translation table and configured in the Protocol
Settings page) determines the type of outgoing connection that will be made.
When Modem Service is selected, you may also configure the Source TCP Port (see below)
and enable or disable automatically detecting the serial baud rate.
The Modem Emulation service has the ability to automatically detect when the baud rate of
the attached device is different from the one configured on the serial port. In many cases, it
is possible to guess the speed of the attached device and to automatically switch the serial
port to match that speed.
The downside of this functionality is that it is not always 100% reliable, and in some
instances can cause inappropriate baud rate changes to be made that will cause
communications to break down. In general, you should only enable this option if your
application uses multiple baud rates and requires autobauding support. Otherwise, it is best
to disable it.
Restart Delay
The Restart Delay keeps the TCP service from constantly retrying if the remote host
becomes unavailable, or in the event of network errors or other unexpected situations.
When the TCP session ends, it will pause for the number of seconds specified by the Restart
Delay. The default value (and minimum value) for the Restart Delay is 1 second.
Telnet Options
The following options apply only if an Outgoing Telnet Connection is configured.
Telnet Mode
The TCP service can connect to a server using the telnet protocol in either Binary mode (8-
bit) or Human mode (7 bit, performs line and character processing for terminals). The telnet
client will negotiate telnet parameters with the remote telnet server. The parameters that it
will request are as follows:
• Binary mode: DO BINARY, WILL BINARY
• Human mode: DO SUPPRESS GOAHEAD, WILL SUPPRESS GOAHEAD
The device server also supports the following telnet modes if negotiated by the remote telnet
server: ECHO, COM-PORT-OPTION, TERMINAL-TYPE, and TIMING MARK. (Note that
the device server does not support local echo. However, it will accept a WILL ECHO
request for remote echoing and will respond with DO ECHO.)
Terminal Type
If the remote host requests the DO-TERMINAL-TYPE telnet option, and the Terminal Type
field is configured, the device server will respond with this value. This field is useful when
you are connecting serial terminals to the device server and the remote host needs to know
how to format output to the terminal. Otherwise, you can leave this blank.
Quiet Mode
By default, the telnet session will display various status messages as it makes, loses, or
breaks connections to the remote server. Selecting Quiet Mode will suppress these
messages. This is useful when using serial devices that may be confused by these status
messages.
The Default Translation entry is used if the dialed phone number is not found in the list.
(The dial backup number is not used in the NDS product.)
The phone number table has a number of features to ease initial configuration. When an
attached device dials a number that is not in the table, the device server creates a dummy
entry in the table. This entry will consist of just the phone number. Until you fill in the
remainder of the entry (IP Address/Hostname and Port) and save it, this entry will not be
used.
Once you have created and saved an entry in the table, a link to the associated entry on the
Protocol Settings page appears on the right. If the protocol is not yet defined, this link,
“Define protocol”, will create a new entry on the Protocol Settings page, otherwise the link
will be “Edit protocol”.
You may also specify the source TCP port for the outgoing TCP connection. Usually, this
should be set to 0 to allow automatic selection of the source port. However, if you have a
firewall that imposes limits on source TCP ports then you may need to set this to something
specific. Note that if you specify something other than 0, you will be limited to only 1 TCP
pipe at-a-time for any given destination port.
In the example above, if the device server receives an incoming TCP connection on TCP port
5000, a TCP pipe will be established to www.myhost.com on TCP port 443. Since the TCP
source port is 0, any number of simultaneous connections are allowed and the TCP source
port will be automatically chosen for each one.
As in the phone number translation table, the protocols for the outgoing Host and TCP Port
combinations are defined in the Protocol Settings page.
In Raw or Secure TCP mode, the device server establishes a TCP connection to the host but
does no additional processing. Data arriving from either the terminal or the host is sent to
the other side as soon as it is detected.
With Simple POS Terminal Protocols, the device server establishes a pass-through
connection with a payment authorization server that communicates directly with a local POS
terminal. The device server does recognize Visa2 packet formats will wait for an entire STX
… ETX LRC bounded packet from the terminal before forwarding terminal data to the host.
Data not in packet boundaries are forwarded as soon as they are detected.
When using the Simple POS protocol, the device server will send data over the network in
one of two formats… either with the data encoded with 7 bits, even parity or as raw, 8-bit
data. Note that this setting is independent of the serial settings for the port.
Sends secured payment transactions to Merchant Link via the First Horizon Internet
Gateway protocol. Dial-up behavior is emulated for the local POS terminal. This option is
not available for private IP connections.
When SSL is configured on an outgoing connection, you must also specify the SSL
connection parameters for each SSL peer. An SSL peer is the remote system that will be on
the other end of the secure SSL connection.
Type of Peer
For an outgoing connection the SSL Peer is normally an SSL Server. However, either side
can be a server or client. This option decides which is which during the SSL handshake.
This field can be used to enable verification of the remote peer's identity. Peer identity
verification must be enabled in order to guarantee that your secure data is not being
intercepted by an unwanted third-party. If you have specified the fully qualified domain
name (FQDN) in the peer address and this matches the SSL peer’s certificate, then click the
‘Certificate must match peer “”’ button. If you are using an IP address for the peer address,
check the ‘Certificate must belong to’ button and enter the FQDN. Or you may select ‘Don’t
verify peer’s identity’.
Caution: choosing ‘Don’t verify peer’s identity’ opens the possibility for an unwanted third-
party to masquerade as a given peer on the Internet and intercept transactions. Normally
you should not choose this option.
SSL verifies peer identity by using signed certificates. To verify a remote peer's identity:
1) The remote peer must provide a valid certificate.
The remote peer must be configured to provide a valid certificate that proves its
identity.
80-001061-6 Configuration Page 23
Device Server Administrator’s Guide
2) The certificate must be signed by a trusted certification authority (CA).
Certification authorities, or CAs, are organizations that issue and sign digital
certificates. To verify the integrity of a remote peer's certificate, its digital signature is
compared with the signatures of the CAs that are trusted by your application.
All trusted CAs must be pre-configured in the /usr/local/ssl/cert.pem file found in
the device server’s local filesystem. This file contains certificates for trusted CAs and
is used to verify the integrity of remote peer certificates.
3) The certificate must be owned by the correct DNS domain.
For optimum security, signed certificates should contain a fully qualified domain
name (or FQDN) that ties the certificate to a particular host or domain. Otherwise,
anyone with a valid certificate from one of your trusted CAs could intercept your
secure transmission.
This field allows you to specify which domain name to expect in the certificate. If the
certificate does not contain the expected domain name, the connection will be
aborted.
Example
Supplying a peer FQDN of ssl.yourdomain.com will require that the remote peer provide a
certificate registered to ssl.yourdomain.com, and that the certificate is signed by one of the
certification authorities found in the device server's /usr/local/ssl/cert.pem file.
This field specifies which authentication and encryption protocols will be allowed for this
SSL connection. To maintain maximum security, it is important to allow only those ciphers
that are sufficiently secure.
The default cipher list allows only reasonably secure ciphers to be used. If the remote peer
does not support sufficiently modern ciphers, you may need to enable some of the less-
secure ciphers.
The cipher list is specified using the same format as the standard OpenSSL cipher lists. This
list is a set of cipher strings, separated by colons, that represents the available cipher suites:
ALL: All ciphers
HIGH: High-encryption ciphers (more than 128-bits)
MEDIUM: Medium-encryption ciphers (equal to 128-bits)
LOW: Low-encryption ciphers (56- and 64-bits, excluding export ciphers)
EXP: Export encryption ciphers
TLSv1: Transport Layer Security v1.0
SSLv3: Secure Sockets Layer v3.0
SSLv2: Secure Sockets Layer v2.0
DH: Diffie-Hellman Ciphers (including anonymous DH)
IP Address
You may permanently assign the IP address of the device server by specifying it in this field.
Doing so will disable BOOTP/DHCP.
If you want to re-enable BOOTP/DHCP, you can do so by setting the IP address to 0.0.0.0, or
by restoring the default configuration (see the section called Restore Factory Defaults).
Every IP address contains two pieces of information: the network number and the host
number. A network number is assigned to each local area network and is shared by all the
network devices on that network. Each network device, or “host”, is assigned a unique host
number. The IP netmask defines which portion of an IP address contains the network
number, and which portion contains the host number. The default netmask depends on the
“class” of the IP address that you are using. These classes are defined in Table 2-1.
It is often desirable to partition larger networks into a series of smaller networks that are
separated by routers (also called “gateways”). This process is called “subnetting” and is
accomplished by extending the default netmask. Some examples of common netmasks can
be found in Table 2-2.
If you are not using DHCP/BOOTP and your network uses subnets (or supernets), you can
override the default net mask by specifying it in this field. Once you click the "Save IP
Address/Netmask" button these parameters will be saved. They will take effect on the next
reboot (see the Reset/Reboot section).
If the device server is configured to use DHCP, it will try to get IP configuration information
from the DHCP server. You may also manually set up static routes on this page.
Each IP route consists of a destination IP address, a netmask, and a gateway IP address.
Depending on the netmask, the destination IP can specify one of two route types:
• Host route: This is a route to a specific IP host. The netmask is always
255.255.255.255.
• Network route: This is a route to an IP network. The netmask defines which portion
of the destination IP address contains the network number.
For each route you wish to add, specify a destination address, select a destination netmask
and specify the gateway address. To specify a default route, set the destination address to
the word default or to the IP address 0.0.0.0, and select the Net destination netmask.
Some examples of valid routes are:
You must click the "Save Gateways" button to save any changes you make. The new route
configuration will take effect on the next reboot (see the Reset/Reboot section).
To remove a static route, check the Delete box next to the entry then click the "Save
Gateways" button.
If the device server is configured to use DHCP, it will try to get NTP server information from
the DHCP server. You may also manually set up the addresses on this page. The NTP
service uses UDP port 123. If your device server is behind a firewall you may need to allow
accesses to this port through the firewall. Adding or changing the NTP server will trigger
the NDS to get the time again.
The HTTP server you specify need not be a designated time server – just a reliable server.
The device server derives the system time from the HTTP header the server returns. Adding
an HTTP server will not automatically trigger getting the time. You must reboot for this to
take effect.
System Password
By default, no system password is configured. Once a password is set, your web browser
will prompt you for the system password whenever you try to access sensitive configuration
pages. The browser will ask for a username and password. The username is always
“admin”. The password will be what you configured above. This password is also used by
Systech host utilities that manage the device server.
By default, all network services are enabled. However, for security, any or all listening
services may be disabled. Unselect any services that you wish to disable. These changes
will not take effect until the next reboot.
There are a number of tools built into the device server to facilitate troubleshooting problems
and managing the unit. These are accessible via the web browser interface under the menu
sections Status and Logs and Commands.
• System Log displays informational and error messages from the unit and can also be
configured to display debug trace data
• Port Status displays the current state of the serial port(s)
• OS Information displays the state of the onboard software tasks
• Network Information displays the status of network services and current connections
• Network Interfaces displays the status of the currently active network interfaces
• Log/Debug Settings configures the type of trace data to collect in the System Log
• Ping can be used to test network connections
• Reset/Reboot can be used to clear errors on individual ports or to reboot the device
server
• Flash Management allows you to update the unit’s software, save and update
configuration information, and manage the error history of your device server
This will open a connection to the device server that will display the current contents of the
system log buffer. As long as you keep this window open in your browser, new messages
added to the buffer will automatically be sent to your web browser.
You can also use the r4000 host utility –s or –t options. –s gets the log and –t gets the log
continuously.
The DCD, RTS, CTS, DTR, DSR, and RI columns indicate the status of the modem signals
for the specified port. If the modem signal is present (either asserted if it is an outgoing
signal, or detected if it is an incoming signal) its name will appear in the corresponding
column.
The State column indicates whether the port is open, closed, waiting for DCD, or
experiencing any notable conditions (such as flow control). The Serial Parameters column
indicates the current settings for the port.
Tracing is generally used for troubleshooting problems. You can enable tracing on
individual ports – selecting low-level serial events or higher-level port service events (like
telnet or LPD). Or you can enable tracing on system services such as HTTP (the web
browser interface), DHCP, SDP (Systech Device Protocol - used by Systech utilities to find
Systech device servers on the network), and SSL.
For port tracing, you must select both the port(s) and the events that you want to trace.
Note that unlike most other options, the logging configuration will not be saved after a
reboot unless you explicitly check the Remember this configuration after reboot box.
Selecting “Record modem negotiations to WAV files” will record the latest modem
negotiation from the Terminal ports (from the time it dials until it completes negotiation).
This can then be saved to a standard WAV file for later analysis.
Refer to the chapter on Troubleshooting and Updating for information on how to access
and capture the contents of the system log or the recorded modem data.
A memory dump may be obtained either manually using the Initiate Dump button on this
page or pressing the reset button or automatically when the unit encounters a catastrophic
error that causes it to reboot. No dump will occur with any of these methods unless the
dump is first configured.
The Device Server IP Address specifies the IP address the unit should use as its own when
initiating a dump. If left blank, the unit uses it’s currently configured IP address. The TFTP
Server IP Address and Filename specify the host and filename on that host to send the
dump to. If the server address is left blank, the unit uses the TFTP server address obtained
from DHCP. The filename must be specified. If any of these parameters are invalid at the
time of the dump, the dump will be aborted. The filename must be that of a writeable file on
the TFTP server. The two IP addresses must be on the same segment (the dump facility does
not support routing). The r4000 utility can be used to configure and initiate a dump. This
utility can also act as the TFTP server for this purpose.
Enter the IP address to Ping or a Hostname and the Number of Pings then press the Ping
button. The command will display the results as follows:
Sending 10 PINGs to 209.75.217.6...
Response from 209.75.217.6: icmp_seq=0, time=10.0 ms
Response from 209.75.217.6: icmp_seq=1, time=10.0 ms
Response from 209.75.217.6: icmp_seq=2, time=10.0 ms
Response from 209.75.217.6: icmp_seq=3, time=10.0 ms
Response from 209.75.217.6: icmp_seq=4, time=10.0 ms
Response from 209.75.217.6: icmp_seq=5, time=10.0 ms
Response from 209.75.217.6: icmp_seq=6, time=10.0 ms
Response from 209.75.217.6: icmp_seq=7, time=10.0 ms
Response from 209.75.217.6: icmp_seq=8, time=10.0 ms
Response from 209.75.217.6: icmp_seq=9, time=10.0 ms
10 packet(s) transmitted, 10 packet(s) received, 0% packet loss.
Not all hosts accept ICMP pings even if they are present on the network. However, the ping
command can serve two functions: 1) to test your general network settings – IP address,
network mask, gateway and DNS server and 2) whether the device server can reach a given
host. Simply resolving a name to an IP address effectively tests the first function.
You can reset an individual serial port or ports by selecting the desired port(s) and pressing
the Reset Port(s) button. This will kill whatever service was on the port and reset it back to
the current configuration settings.
You may reboot the entire device server by pressing the Reboot button. This is the
equivalent of power cycling the unit.
Once saved to the host, the configuration BDNL file can be restored to a device server using
the Flash Update method above.
PDA Compaction
The device server stores factory configuration information, boot time information, and error
records in the Product Data Area (or PDA). This information is stored in flash memory and
can fill up over time. You can use the Compact Flash command to reclaim Product Data
Area space. There are two types of compaction operations:
• Standard Compaction: only removes old records
• Total Compaction: removes old records and error records
Each Compaction method will list the number of bytes that can be reclaimed by selecting
that method. In general, you should never need to do this unless directed to by Systech
Other Debugging
Refer to the hardware manual for a description of the LED activity during operation of the
device server.
If you are using NativeCOM or RTN on the host system, you can also use the debugging
tools in those products with the device server.
The device server can be configured to allow legacy devices that interact with a Hayes
compatible modem to function over a TCP/IP network. When modem emulation is enabled,
the device server will respond to AT commands generated by the attached device. After
receiving the dial command, the device server will make a TCP connection to the specified
host. The device server will also accept incoming TCP/IP connections and generate the
appropriate response codes. As with incoming TCP connections, each Systech serial port
accepts incoming TCP connections on two TCP ports: an 8000-series port (for raw or SSL
data), and a 9000-series port (for telnet data).
Modes
A port with modem emulation enabled can be in one of two modes: command or data. The
port starts out in command mode. In command mode, the port is only interacting with the
host/device connected to the serial port. It accepts AT style command interaction and
responds appropriately. Successfully making an outgoing connection, ("dialing" with the
ATD command) or accepting an incoming connection ("answering" with the ATA command)
switches the port to data mode. In data mode, characters received on the serial port are
transmitted to the TCP connection and vice versa.
Escape Sequence
When in data mode, the device server looks for an incoming escape sequence on the serial
port. The escape sequence consists of a one second pause, three break characters ('+'), and a
final one-second pause. Receipt of this sequence results in the port switching to command
mode. Neither the escape character ("+") nor the pause timing is programmable.
Outgoing calls are made by the ATD command. This initiates an attempt to make a
connection to the specified IP:port pair (see Phone Numbers below). A successful
connection will send the "CONNECT" result code out the serial port and enter data mode.
However, if the dialstring was suffixed with a ';', the modem will return to command mode
after establishing a connection. If the connection fails for any reason, the "NO CARRIER"
result code is returned.
AT Commands
All AT command strings, with the exception of the break sequence ("+++") and the repeat
command ("A/"), must be terminated with the command line termination character, defined
in S3 (default is CR). All characters before 'AT' are ignored. Unsupported commands are
ignored and generate an "OK" result code. Multiple commands may be combined on a
single line, however the AT command string is currently limited to 40 characters.
Example:
AT&FE0V0
Supported S-registers
Response Codes
The RI (Ring Indicator) signal does not have a corresponding outgoing signal so it is not
supported.
Refer to the device server hardware manual for specific pinout information for your unit.
The device server monitors its DCD signal in order to detect changes in the device's DTR
signal. The following behaviors occur on loss of DCD only.
Mode Modem DTR Response to loss of DCD
Settings
Offline AT&D0 Ignore
AT&D1 Ignore
AT&D2 Ignore
Online AT&D0 Ignore
AT&D1 Drop to command mode, preserving connection
AT&D2 Drop to command mode, terminating any connection
• If no port number is specified, the Destination TCP Port configured for the port is
used.
• The source port for the TCP connection follows the Source TCP Port configured for
the port.
Port Settings
Most of the serial port settings (like baud rate) are controlled by the configured port settings
on the device server. Modem emulation does not support changing these from AT
commands.
This product incorporates software from "eCos, the Embedded Configurable Operating
System, Copyright (C) 1998, 1999, 2000, 2001, 2002, 2003 Red Hat, Inc." The eCos software
used by this product is licensed under "The eCos license version 2.0". As such, certain
portions of this product's software are covered by the GNU General Public License and are
available from Systech Corporation upon request.
For more information about eCos licensing, please see the following:
http://www.gnu.org/licenses/ecos-license.html
http://sources.redhat.com/ecos
---------------------
/* ====================================================================
* Copyright (c) 1998 The OpenSSL Project. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
*
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
*
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in
* the documentation and/or other materials provided with the
* distribution.
*
* 3. All advertising materials mentioning features or use of this
* software must display the following acknowledgment:
* "This product includes software developed by the OpenSSL Project
* for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
*
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
* endorse or promote products derived from this software without
* prior written permission. For written permission, please contact
* [email protected].
*
* 5. Products derived from this software may not be called "OpenSSL"
* nor may "OpenSSL" appear in their names without prior written
* permission of the OpenSSL Project.
*
* 6. Redistributions of any form whatsoever must retain the following
* acknowledgment:
* "This product includes software developed by the OpenSSL Project
* for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
*
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
Please note that MD2, MD5 and IDEA are publically available standards
that contain sample implementations, I have re-coded them in my own
way but there is nothing special about those implementations. The DES
library is another mater :-).
License Information 67
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
SUCH DAMAGE.
The licence and distribution terms for any publically available version or
derivative of this code cannot be changed. i.e. this code cannot simply be
copied and put under another distribution licence
[including the GNU Public Licence.]
The reason behind this being stated in this direct manner is past
experience in code simply being copied and the attribution removed
from it and then being distributed as part of other packages. This
implementation was a non-trivial and unpaid effort.
68 License Information
Index
Errors
A Framing, 47
ARP, 6 Overrun, 47
AT commands, 59 Parity, 47
escape character, 16
B example applications, 39
baud, 11 F
bits per character, 11
BOOTP, 5 factory default, 57
browser, 10 Flash Management, 55
Flash Update, 56
C flow control, 11
DTR/DSR, 11
character size, 11 RTS/CTS, 11
class, IP, 27 XON/XOFF, 11
COM port, 39 FQDN, 23, 24
compaction, 57
configuration, 5 G
console server, 41
gateway, 31
D
H
DCD, 15
debugging, 58 host route, 31
default configuration, 57
I
default gateway, 32
default route, 32 incoming connection, 8, 12, 60
destination IP address, 15 IP
destination TCP port, 15 address, 26
DHCP, 5 class, 27
dialup modem, 41 destination address, 15
DNS, 29 netmask, 27, 42
domain name, 30 route, 31, 42
DTR/DSR, 11 temporary address, 6
dump memory, 52
K
E
keep-alive, 26, 28
eCos license, 66 keyboard hit, 16
error code, 45
Index 69
L response codes, 63
restart delay, 15
license, 66
restore default configuration, 57
log, 44
RFC-2217, 11
Log/Debug, 51
routes, 42
LPR/LPD, 7
RTS/CTS, 11
M
S
memory dump, 52
S Registers, 63
modem, 40, 41
serious system error, 45
response codes, 63
SSL mode, 23
modem emulation, 9, 14, 59
status, port, 46
modem signals, 46, 64
stop bits, 11
multiplexer, 40
system log, 44
system password, 34
N
name server, 29 T
NativeCOM, 5, 7
task, 48
NativeCOM Configuration Utility, 56
TCP, 26
netmask, 6, 26, 27, 42
destination port, 15
network route, 31
keep-alive, 28
network settings, 26
port 8000-9000, 8, 59
NTP, 33
port 9096, 45
telnet, 16
O
telnet binary mode, 16
outgoing connection, 8, 12, 14, 15, 60 telnet escape character, 16
telnet mode, 16
P Telnet Mode, 16
parity, 11 temporary IP address, 6
password, 34 terminal, 40
peripherals, 39 terminal type, 16
phone number, 65 TFTP server, 33
Ping, 53 time server, 33
Port Server Utility, 56 troubleshooting, 43, 51
port services, 12
port status, 46 U
Product Data Area, 56 Unix, 39
update software, 43, 56
Q utility
quiet mode, 16 NativeCOM Configuration, 56
Port Server, 56
R r4000, 45, 56
r4000 utility, 56 W
reboot, 6, 54
remote network, 31, 42 wait for keyboard hit, 16
Require carrier, 15 web browser, 5, 10, 56
require DCD, 15 Windows, 5
reset ports, 54
70 Index
X XON/XOFF, 11
Index 71