MatchPort™ AR User Guide Datasheet by Lantronix, Inc.
View All Related Products | Download PDF Datasheet LANTQONIX®
 
MarchPorr
LANTQONIX®
 
MarchPorr
Part Number 900-480
Revision E October 2013
MatchPort  AR
 Embedded Device Server
 User Guide
 www Iamromx com/suppon/warramy
www \antromx com/sugport
www.Iamronix.com/aboutlcontact
www antromx om/supgon/documentaf n
www Iamromx com/suppon/warramy
www \antromx com/sugport
www.Iamronix.com/aboutlcontact
www antromx om/supgon/documentaf n
 
MatchPort® AR Embedded Device Server User Guide 2
Intellectual Property
© 2013 Lantronix, Inc. All rights reserved. No part of the contents of this book may be transmitted 
or reproduced in any form or by any means without the written permission of Lantronix. 
Lantronix, XPort, XPort AR, and MatchPort are registered trademarks of Lantronix, Inc. in the 
United States and other countries.  Evolution OS and DSTni are registered trademarks of 
Lantronix, Inc. in the United States.  DeviceInstaller is a trademark of Lantronix, Inc.  U.S. Patent 
8,024,446.  Additional patents pending.
Windows and Internet Explorer are registered trademarks of Microsoft Corporation.  Mozilla and 
Firefox are registered trademarks of the Mozilla Foundation.  Chrome is a trademark of Google, 
Inc.  Opera is a registered trademark of Opera Software ASA Corporation Norway. All other 
trademarks and trade names are the property of their respective holders. 
Warranty
For details on the Lantronix warranty policy, please go to our website at 
www.lantronix.com/support/warranty.
Contacts
Lantronix, Inc. Corporate Headquarters
167 Technology Drive
Irvine, CA 92618, USA
Phone: 949-453-3990
Fax: 949-453-3995
Technical Support
Online:  www.lantronix.com/support
Sales Offices
For a current list of our domestic and international sales offices, go to the Lantronix web site at 
www.lantronix.com/about/contact.
Disclaimer
Note: This product has been designed to comply with the limits for a Class  Rules when 
properly enclosed and grounded. These limits are designed to provide reasonable 
protection against such interference . This equipment generates, uses, and can radiate 
radio frequency energy, and if not installed and used in accordance with this guide, may 
cause interference to radio communications.  See the appendix, Compliance on page 143
The information in this guide may change without notice.  The manufacturer assumes no 
responsibility for any errors that may appear in this guide.  For the latest revision of this product 
document, please check our online documentation at www.lantronix.com/support/documentation.
Revision History
Date Rev. Comments
June 2007 A Initial document.
September 2008 B Technical updates throughout, corresopnding to firmware release 
1.1.0.0.R6.

MatchPort® AR Embedded Device Server User Guide 3
May 2009 C Technical updates throughout; added RoHS notice.
May 2010 D Updated for firmware release 5.1.0.0R10.  Added VIP Access and 
Jultiple Hosts in Connect Mode.
October 2013 E Updated for firmware release 5.2.0.4. 
Date Rev. Comments

MatchPort® AR Embedded Device Server User Guide 4
Table of Contents
Intellectual Property  ________________________________________________________2
Warranty _________________________________________________________________2
Contacts _________________________________________________________________2
Disclaimer ________________________________________________________________2
Revision History  ___________________________________________________________2
List of Tables ______________________________________________________________9
List of Figures  ____________________________________________________________11
1: About This Guide  14
Chapter and Appendix Summaries  ____________________________________________14
Additional Documentation  ___________________________________________________15
2: Introduction  16
Key Features _____________________________________________________________16
Applications ______________________________________________________________17
Protocol Support   _________________________________________________________17
Evolution OS® Operating System _____________________________________________17
Additional Features  ________________________________________________________18
Modem Emulation ______________________________________________________18
Web-Based Configuration and Troubleshooting _______________________________18
Command-Line Interface (CLI)  ____________________________________________18
SNMP Management  ____________________________________________________18
XML-Based Architecture and Device Control  _________________________________18
Really Simple Syndication (RSS)  __________________________________________18
Enterprise-Grade Security  _______________________________________________18
Terminal Server/Device Management  ______________________________________19
Troubleshooting Capabilities _____________________________________________19
Configuration Methods  _____________________________________________________20
Addresses and Port Numbers  ________________________________________________20
Hardware Address  _____________________________________________________20
IP Address  ___________________________________________________________20
Port Numbers  _________________________________________________________20
Product Information Label  ___________________________________________________21
3: Using DeviceInstaller  22
Accessing MatchPort AR Device Server Using DeviceInstaller  ______________________22
Device Details Summary ____________________________________________________22

MatchPort® AR Embedded Device Server User Guide 5
4: Configuration Using Web Manager  24
Accessing Web Manager  ___________________________________________________24
Device Status Page  ____________________________________________________25
Web Manager Page Components _____________________________________________26
Navigating the Web Manager  ________________________________________________27
5: Network Settings  29
Network 1 (eth0) Interface Status  _____________________________________________29
Network 1 (eth0) Interface Configuration  _______________________________________30
Network 1 Ethernet Link  ____________________________________________________32
6: Line and Tunnel Settings  33
Line Settings  _____________________________________________________________33
Line Statistics  _________________________________________________________33
Line Configuration  _____________________________________________________34
Line Command Mode  ___________________________________________________36
Tunnel Settings __________________________________________________________  37
Tunnel – Statistics  _____________________________________________________38
Tunnel – Serial Settings  _________________________________________________40
Tunnel – Packing Mode  _________________________________________________41
Tunnel – Accept Mode  __________________________________________________43
Tunnel – Connect Mode  _________________________________________________46
Tunnel – Disconnect Mode _______________________________________________50
Tunnel – Modem Emulation  ______________________________________________52
7: Terminal and Host Settings  55
Terminal Settings  _________________________________________________________55
Network Terminal Configuration  ___________________________________________55
Line Terminal Configuration  ______________________________________________56
Host Configuration  ________________________________________________________57
8: Configurable Pin Manager  59
Overview ________________________________________________________________59
Default Groups  ________________________________________________________59
Custom Groups  _______________________________________________________59
CPM: CP (Configurable Pins)  ________________________________________________59
View CPs  ____________________________________________________________60
CPM: Groups  ____________________________________________________________62
View Groups  __________________________________________________________62

MatchPort® AR Embedded Device Server User Guide 6
9: Service Settings  66
DNS Settings _____________________________________________________________66
Point-to-Point (PPP) Settings________________________________________________  67
SNMP Settings  ___________________________________________________________69
FTP Settings   ____________________________________________________________71
TFTP Settings   ___________________________________________________________72
Syslog Settings  ___________________________________________________________73
HTTP Settings ____________________________________________________________74
HTTP Statistics ________________________________________________________74
HTTP Configuration  ____________________________________________________75
HTTP Authentication  ___________________________________________________77
RSS Settings _____________________________________________________________79
LPD Settings  _____________________________________________________________80
LPD Statistics  _________________________________________________________80
LPD Configuration  _____________________________________________________81
10: Security Settings  83
SSH Settings _____________________________________________________________83
SSH Server Host Keys   _________________________________________________84
SSH Server Authorized Users  ____________________________________________88
SSH Client Known Hosts  ________________________________________________90
SSH Client Users  ______________________________________________________91
SSL Settings  _____________________________________________________________93
SSL Cipher Suites  _____________________________________________________93
SSL Certificates  _______________________________________________________94
SSL RSA or DSA  ______________________________________________________94
SSL Certificates and Private Keys  _________________________________________94
SSL Utilities  __________________________________________________________95
SSL Configuration  _____________________________________________________96
11: Modbus  99
CP Control via Modbus  _____________________________________________________99
Serial Transmission Mode __________________________________________________101
Modbus Statistics  ________________________________________________________102
Modbus Configuration  _____________________________________________________103
12: Maintenance and Diagnostics Settings  104
Filesystem Settings  _______________________________________________________104
Filesystem Statistics  ___________________________________________________104
Filesystem Browser  ___________________________________________________105
Protocol Stack Settings  ____________________________________________________107
TCP Settings  ________________________________________________________107

MatchPort® AR Embedded Device Server User Guide 7
IP Settings  __________________________________________________________108
ICMP Settings ________________________________________________________109
ARP Settings  ________________________________________________________110
SMTP Settings  _______________________________________________________111
IP Address Filter  _________________________________________________________112
Query Port   _____________________________________________________________113
Diagnostics _____________________________________________________________114
Hardware ___________________________________________________________114
MIB-II Statistics _______________________________________________________115
IP Sockets  __________________________________________________________116
Ping _______________________________________________________________116
Traceroute __________________________________________________________117
Log ________________________________________________________________118
Memory _____________________________________________________________119
Buffer Pools  _________________________________________________________120
Processes ___________________________________________________________121
System Settings  _________________________________________________________122
13: Advanced Settings  124
Email Settings  ___________________________________________________________124
Email Statistics  _______________________________________________________124
Email Configuration  ___________________________________________________125
Command Line Interface Settings ____________________________________________127
CLI Statistics _________________________________________________________127
CLI Configuration  _____________________________________________________127
XML Settings ____________________________________________________________129
XML: Export Configuration  ______________________________________________130
XML: Export Status ____________________________________________________131
XML: Import Configuration  ______________________________________________132
14: Security in Detail  137
Public Key Infrastructure  ___________________________________________________137
TLS (SSL)  ______________________________________________________________137
Digital Certificates  ________________________________________________________137
Trusted Authorities  _______________________________________________________137
Obtaining Certificates  _____________________________________________________138
Self-Signed Certificates ____________________________________________________138
Certificate Formats  _______________________________________________________138
OpenSSL _______________________________________________________________138

MatchPort® AR Embedded Device Server User Guide 8
15: Branding the MatchPort AR Unit  139
Web Manager Customization  _______________________________________________139
Short and Long Name Customization  _________________________________________139
16: Updating Firmware  140
Obtaining Firmware _______________________________________________________140
Loading New Firmware  ____________________________________________________140
Appendix A: Technical Support  141
North America  ___________________________________________________________141
Europe, Middle East, Africa (EMEA)  __________________________________________141
Japan _________________________________________________________________141
Asia / Pacific (APAC)  _____________________________________________________141
Latin America & Caribbean  _________________________________________________141
Online _________________________________________________________________142
Appendix B: Compliance  143
Appendix C: Binary to Hexadecimal Conversions  145
Converting Binary to Hexadecimal  ___________________________________________145
Conversion Table  _____________________________________________________145
Scientific Calculator  ___________________________________________________146
Appendix D: Warranty  147
Index 148

MatchPort® AR Embedded Device Server User Guide 9
List of Tables
Table 3-1 Device Details Summary  __________________________________________________22
Table 4-4 Summary of Web Manager Pages   __________________________________________27
Table 5-3 Network 1 (eth0) Interface Configuration ______________________________________30
Table 5-5 Network 1 Ethernet Link ___________________________________________________32
Table 6-3 Line Configuration  _______________________________________________________35
Table 6-5 Line Command Mode _____________________________________________________36
Table 6-8 Tunnel - Serial Settings  ___________________________________________________40
Table 6-12 Tunnel Packing Mode  ___________________________________________________43
Table 6-14 Tunnel Accept Mode  ____________________________________________________44
Table 6-16 Tunnel Connect Mode  ___________________________________________________48
Table 6-19 Tunnel Disconnect Mode  _________________________________________________51
Table 6-20 Modem Emulation Commands and Descriptions _______________________________52
Table 6-22 Tunnel Modem Emulation  ________________________________________________54
Table 7-2 Terminal on Network Configuration  __________________________________________56
Table 7-4 Terminal on Line 1 Configuration ____________________________________________57
Table 7-6 Host Configuration  _______________________________________________________58
Table 8-2 CPM CPs Current Configuration  ____________________________________________61
Table 8-3 CPM CPs Status  ________________________________________________________61
Table 8-5 CPM Groups Current Configuration __________________________________________62
Table 8-7 Group Status  ___________________________________________________________63
Table 9-3 PPP Configuration _______________________________________________________68
Table 9-5 SNMP _________________________________________________________________70
Table 9-7 FTP Settings  ___________________________________________________________71
Table 9-9 TFTP Server  ___________________________________________________________72
Table 9-11 Syslog  _______________________________________________________________73
Table 9-14 HTTP Configuration  _____________________________________________________75
Table 9-16 HTTP Authentication  ____________________________________________________77
Table 9-18 RSS  _________________________________________________________________79
Table 9-21 LPD Configuration  ______________________________________________________81
Table 10-2 SSH Server Host Keys Settings - Upload Keys Method  _________________________85
Table 10-4 SSH Server Host Keys Settings - Upload Keys Method  _________________________86
Table 10-6 SSH Server Host Keys Settings - Create New Keys Method  _____________________87
Table 10-8 SSH Server Authorized User Settings  _______________________________________89
Table 10-10 SSH Client Known Hosts  ________________________________________________90
Table 10-12 SSH Client Users ______________________________________________________92

MatchPort® AR Embedded Device Server User Guide 10
Table 10-13 Supported Cipher Suites  ________________________________________________93
Table 10-15 SSL  ________________________________________________________________97
Table 11-1 6 Byte Header of Modbus Application Protocol  ________________________________99
Table 11-2 Modbus Local Slave Functions - Query ______________________________________99
Table 11-3 Modbus Local Slave Functions - Response ___________________________________________ 100
Table 11-4 Modbus Transmission Modes  ____________________________________________101
Table 11-7 Modbus Configuration  __________________________________________________103
Table 12-3 Filesystem Browser  ____________________________________________________106
Table 12-5 TCP Protocol Settings  __________________________________________________107
Table 12-7 IP Protocol  Settings  ___________________________________________________108
Table 12-9 ICMP Settings  ________________________________________________________109
Table 12-11 ARP Settings  ________________________________________________________110
Table 12-13 SMTP Settings _______________________________________________________111
Table 12-15 IP Address Filter Settings  ______________________________________________112
Table 12-21 Diagnostics: Ping  _____________________________________________________117
Table 12-23 Diagnostics: Traceroute ________________________________________________118
Table 12-31 System _____________________________________________________________122
Table 13-3 Email Configuration  ____________________________________________________125
Table 13-6 CLI Configuration ______________________________________________________128
Table 13-8 XML Export Configuration  _______________________________________________130
Table 13-10 XML Export Status ____________________________________________________131
Table 13-16 XML: Import Line(s) from Single Line Settings  ______________________________136
Table C-1 Binary to Hexadecimal Conversion Table  ____________________________________145

MatchPort® AR Embedded Device Server User Guide 11
List of Figures
Figure 2-1Sample Hardware Address  ________________________________________________20
Figure 2-2Product Label ___________________________________________________________21
Figure 4-1Prompt for User Name and Password  ________________________________________24
Figure 4-2Web Manager Home Page  ________________________________________________25
Figure 4-3Components of the Web Manager Page  ______________________________________26
Figure 5-1Network 1 (eth0) Interface Status ___________________________________________29
Figure 5-2Network 1 (eth0) Interface Configuration ______________________________________30
Figure 5-4Network 1 Ethernet Link  __________________________________________________32
Figure 6-1Line 1 Statistics  _________________________________________________________33
Figure 6-2Line 1 Configuration ______________________________________________________34
Figure 6-4Line 1 Command Mode  ___________________________________________________36
Figure 6-6Tunnel 1 Statistics  _______________________________________________________39
Figure 6-7Tunnel 1 Serial Settings ___________________________________________________40
Figure 6-9Tunnel 1 Packing Mode (Mode = Disable)  ____________________________________41
Figure 6-10Tunnel 1 Packing Mode (Mode = Timeout)  ___________________________________42
Figure 6-11Tunnel 1 Packing Mode (Mode = Send Character)  _____________________________42
Figure 6-13Tunnel 1 Accept Mode ___________________________________________________44
Figure 6-15Tunnel 1 - Connect  _____________________________________________________47
Figure 6-17Host 1, Host 2, Host 3 Exchanged __________________________________________50
Figure 6-18Tunnel 1 Disconnect Mode  _______________________________________________51
Figure 6-21Tunnel 1 Modem Emulation _______________________________________________53
Figure 7-1Terminal on Network Configuration  __________________________________________55
Figure 7-3 Terminal on Line Configuration _____________________________________________56
Figure 7-5Host Configuration  _______________________________________________________58
Figure 8-1CPM: CPs  _____________________________________________________________60
Figure 8-4CPM: Groups ___________________________________________________________62
Figure 8-6CPM: Group Status  ______________________________________________________63
Figure 9-1DNS Settings  ___________________________________________________________66
Figure 9-2PPP Configuration Settings  ________________________________________________68
Figure 9-4SNMP Configuration  _____________________________________________________69
Figure 9-6FTP Configuration  _______________________________________________________71
Figure 9-8TFTP Configuration  ______________________________________________________72
Figure 9-10Syslog  _______________________________________________________________73
Figure 9-12HTTP Statistics  ________________________________________________________74
Figure 9-13HTTP Configuration  _____________________________________________________75

MatchPort® AR Embedded Device Server User Guide 12
Figure 9-15HTTP Authentication  ____________________________________________________77
Figure 9-17RSS  _________________________________________________________________79
Figure 9-19LPD Statistics  _________________________________________________________80
Figure 9-20LPD Configuration  ______________________________________________________81
Figure 10-1SSH Server: Host Keys (Upload Keys)  ______________________________________84
Figure 10-3SSH Server: Host Keys (Upload Keys)  ______________________________________86
Figure 10-5SSH Server: Host Keys (Create New Keys)  __________________________________87
Figure 10-7SSH Server: Authorized Users  ____________________________________________89
Figure 10-9SSH Client: Known Hosts  ________________________________________________90
Figure 10-11SSH Client: Users _____________________________________________________91
Figure 10-14SSL  ________________________________________________________________96
Figure 11-5Modbus Statistics ______________________________________________________102
Figure 11-6Modbus Configuration  __________________________________________________103
Figure 12-1Filesystem Statistics  ___________________________________________________104
Figure 12-2Filesystem Browser  ____________________________________________________105
Figure 12-4TCP Protocol  _________________________________________________________107
Figure 12-6IP Protocol   __________________________________________________________108
Figure 12-8ICMP Protocol  ________________________________________________________109
Figure 12-10ARP Protocol Page  ___________________________________________________110
Figure 12-12SMTP ______________________________________________________________111
Figure 12-14IP Address Filter Configuration  __________________________________________112
Figure 12-16Query Port Configuration _______________________________________________113
Figure 12-17Diagnostics: Hardware _________________________________________________114
Figure 12-18MIB-II Network Statistics  _______________________________________________115
Figure 12-19IP Sockets  __________________________________________________________116
Figure 12-20Diagnostics: Ping  _____________________________________________________117
Figure 12-22Diagnostics: Traceroute ________________________________________________118
Figure 12-24Diagnostics: Log  _____________________________________________________118
Figure 12-25Diagnostics: Log (Filesystem)  ___________________________________________119
Figure 12-26Diagnostics: Log (Line 1) _______________________________________________119
Figure 12-27Diagnostics: Memory  __________________________________________________120
Figure 12-28Diagnostics: Buffer Pools _______________________________________________120
Figure 12-29Diagnostics: Processes  ________________________________________________121
Figure 12-30System _____________________________________________________________122
Figure 13-1Email Statistics  _______________________________________________________124
Figure 13-2Email Configuration  ____________________________________________________125
Figure 13-4CLI Statistics  _________________________________________________________127
Figure 13-5CLI Configuration ______________________________________________________128

MatchPort® AR Embedded Device Server User Guide 13
Figure 13-7XML: Export Configuration _______________________________________________130
Figure 13-9XML: Export Status  ____________________________________________________131
Figure 13-11XML: Import Configuration ______________________________________________132
Figure 13-12XML: Import Configuration from External File  _______________________________132
Figure 13-13XML: Import from Filesystem   ___________________________________________133
Figure 13-14XML: Import Configuration from Filesystem  ________________________________134
Figure 13-15XML: Import Line(s) from Single Line Settings on the Filesystem  ________________135
Figure 16-1Update Firmware  ______________________________________________________140

MatchPort® AR Embedded Device Server User Guide 14
1: About This Guide
This guide provides the information needed to configure, use, and update the MatchPort® AR 
embedded device server. It is intended for software developers and system integrators who are 
embedding  the embedded device server in their designs. 
Chapter and Appendix Summaries
A summary of each chapter is provided below.
Chapter  Description
Chapter 2: Introduction Main features of the product and the protocols it supports. 
Includes technical specifications. 
Chapter 3: Using DeviceInstaller Instructions for viewing the current configuration using 
DeviceInstaller.
Chapter 4: Configuration Using Web Manager Instructions for accessing Web Manager and using it to 
configure settings for the device.
Chapter 5: Network Settings Instructions for using the web interface to configure 
Ethernet settings.
Chapter 6: Line and Tunnel Settings Instructions for using the web interface to configure line and 
tunnel settings.
Chapter 7: Terminal and Host Settings Instructions for using the web interface to configure terminal 
and host settings.
Chapter 8: Configurable Pin Manager Information about the Configurable Pin Manager (CPM) and 
how to set the configurable pins to work with a device.
Chapter 9: Service Settings Instructions for using the web interface to configure settings 
for DNS, SNMP, FTP, and other services.
Chapter 10: Security Settings Instructions for using the web interface to configure SSH 
and SSL security settings. 
Chapter 11: Modbus Instructions for using the web interface to configure 
Modbus. 
Chapter 12: Maintenance and Diagnostics Settings Instructions for using the web interface to maintain the 
device, view statistics, files, and logs, and diagnose 
problems.
Chapter 13: Advanced Settings Instructions for using the web interface to configure email, 
CLI, and XML settings.
Chapter 14: Security in Detail Provides additional information on security settings 
available.
Chapter 15: Branding the MatchPort AR Unit Instructions for customizing the device.
Chapter 16: Updating Firmware Instructions for obtaining the latest firmware and updating 
the device.
Appendix A: Technical Support  Instructions for contacting Lantronix Technical Support.
Appendix B: Compliance Lantronix compliance information.
Appendix C: Binary to Hexadecimal Conversions  Instructions for converting binary values to hexadecimals.
 www antromx om/suggort/documentatlon
 
www antromx om/suggort/documentatlon
 
1: About This Guide
MatchPort® AR Embedded Device Server User Guide 15
Additional Documentation
Visit the Lantronix web site at www.lantronix.com/support/documentation for the latest 
documentation and the following additional documentation.
Document Description
MatchPort AR Embedded Device 
Server Command Reference
Information about the MatchPort AR hardware along with directions 
on integrating the device server into your product.
MatchPort AR Embedded Device 
Server Integration Guide
Instructions for accessing the command mode (the command line 
interface) using a Telnet connection or th rough the serial port.  
Detailed information about the comands.  Alos provides details for 
XML configuration and status.
MatchPort Embedded Device 
Server Demonstration Kit Quick 
Start Guide
Information about the device hardware installation and initial 
configuration of your device.
DeviceInstaller Online Help Instructions for using the Lantronix Windows-based utility to locate 
the device and to view its current settings.
Com Port Redirector
Quick Start and Online Help
Instructions for using the Lantronix Windows-based utility to create 
virtual com ports.
Secure Com Port Redirector 
User Guide
Instructions for using the Lantronix Windows-based utility to create 
secure virtual com ports.

MatchPort® AR Embedded Device Server User Guide 16
2: Introduction
This chapter introduces the Lantronix MatchPort AR embedded device server. It provides an 
overview of the products, lists their key features, and describes the applications for which they are 
suited.
The MatchPort AR embedded Ethernet Device Server is a complete network–enabling solution on 
a 1.75” x 1.75” PCB. This miniature device server empowers original equipment manufacturers 
(OEMs) to go to market quickly and easily with Ethernet networking and web page serving 
capabilities built into their products.
This chapter contains the following sections:
 Key Features
 Applications
 Protocol Support 
 Evolution OS® Operating System
 Additional Features
 Configuration Methods
 Addresses and Port Numbers
 Product Information Label
Key Features
Power Supply: Regulated 3.3V input required. There is a step-down converter to 1.5 volts for 
the processor core. All voltages have LC filtering to minimize noises and emissions.
Controller: A Lantronix DSTni® -FX 32-bit microprocessor, running at 166 MHz internal bus 
and 83 MHz external bus.
Memory: 4 MB Flash and 8 MB SDRAM. Please contact your sales representative if you need 
larger memory sizes.
Ethernet: 10/100 Mbps Ethernet transceiver (requires external magnetics and RJ45)
Serial Ports: Two full, RS232-supporting serial ports with all hardware handshaking signals. 
Baud rates can be standard or customized up to 230 Kbps. Port 1 also supports RS422 and 
RS485.
Configurable IO Pins (CPs): Up to seven pins are configurable as general purpose I/Os if no 
DTR or DCD is used on serial ports. Not 5V tolerant.
Interface Signals: 3.3V-level interface signals.
Temperature Range: Operates over an extended temperature range of -40°C to +85°C.

2: Introduction
MatchPort® AR Embedded Device Server User Guide 17
Applications
The MatchPort AR embedded device server connects serial devices such as those listed below to 
Ethernet network using the IP protocol family. 
CNC controllers
Data collection devices
Universal Power Supply (UPS) management unit
Telecommunications equipment
Handheld instruments
Security, alarm, and access control devices
Patient monitoring equipment
Medical instrumentation
Industrial Manufacturing/Automation systems
Building Automation equipment
Point of Sale Systems
ATM machines
Data display devices
Modems
Time/attendance clocks and terminals
Protocol Support  
The MatchPort AR embedded device server contains a full-featured TCP/IP stack. Supported 
protocols include: 
ARP, IP, UDP, TCP, ICMP, BOOTP, DHCP, AutoIP, Telnet, DNS, FTP, TFTP, HTTP/HTTPS, 
SSH, SSL/TLS, SNMP, SMTP, RSS, PPP and Syslog for network communications and 
management.
TCP, UDP, TCP/AES, UDP/AES, Telnet, SSH and SSL/TLS for tunneling to the serial port. 
TFTP, FTP, and HTTP for firmware upgrades and uploading files. 
Evolution OS® Operating System
The MatchPort AR embedded device server incorporates the Lantronix Evolution OS operating 
system. Key features of the Evolution OS operating system include:
Built-in Web server for configuration and troubleshooting from Web-based browsers 
CLI configurability
SNMP management
XML data transport and configurability 
Really Simple Syndication (RSS) information feeds 

2: Introduction
MatchPort® AR Embedded Device Server User Guide 18
Enterprise-grade security with SSL and SSH
Comprehensive troubleshooting tools
Additional Features
Modem Emulation
In modem emulation mode, the MatchPort AR device server can replace dial-up modems. The unit 
accepts modem AT commands on the serial port, and then establishes a network connection to 
the end device, leveraging network connections and bandwidth to eliminate dedicated modems 
and phone lines.
Web-Based Configuration and Troubleshooting
Built upon Internet-based standards, the MatchPort AR embedded device serverenables you to 
configure, manage, and troubleshoot through a browser-based interface accessible anytime from 
anywhere. All configuration and troubleshooting options are launched from a web interface. You 
can access all functions via a Web browser, for remote access. As a result, you decrease 
downtime (using the troubleshooting tools) and implement configuration changes (using the 
configuration tools).
Command-Line Interface (CLI)
Making the edge-to-enterprise vision a reality, the MatchPort AR embedded device server with 
Evolution OS uses industry-standard tools for configuration, communication, and control. For 
example, Evolution OS uses a Command Line Interface (CLI) whose syntax is very similar to that 
used by data center equipment such as routers and hubs.
SNMP Management
The MatchPort AR supports full SNMP management, making it ideal for applications where device 
management and monitoring are critical. These features allow networks with SNMP capabilities to 
correctly diagnose and monitor MatchPort AR device servers.
XML-Based Architecture and Device Control
XML is a fundamental building block for the future growth of M2M networks. The MatchPort AR 
embedded device server supports XML-based configuration setup records that make device 
configuration transparent to users and administrators. The XML is easily editable with a standard 
text or XML editor.
Really Simple Syndication (RSS)
The MatchPort AR device server supports Really Simple Syndication (RSS) for streaming and 
managing on-line content. RSS feeds all the configuration changes that occur on the device. An 
RSS aggregator then reads (polls) the feed. More powerful than simple email alerts, RSS uses 
XML as an underlying Web page transport and adds intelligence to the networked device, while 
not taxing already overloaded email systems.
Enterprise-Grade Security
Evolution OS provides the MatchPort AR embedded device server the highest level of networking 
security possible. This ‘data center grade’ protection ensures that each device on the M2M 

2: Introduction
MatchPort® AR Embedded Device Server User Guide 19
network carries the same level of security as traditional IT networking equipment in the corporate 
data center.
With built-in SSH and SSL, secure communications can be established between the  serial ports 
and the remote end device or application. By protecting the privacy of serial data transmitted 
across public networks, users can maintain their existing investment in serial technology, while 
taking advantage of the highest data-protection levels possible.
SSH and SSL are able to do the following:
Verify the data received came from the proper source 
Validate that the data transferred from the source over the network has not changed when it 
arrives at its destination (shared secret and hashing)
Encrypt data to protect it from prying eyes and nefarious individuals
Provide the ability to run popular M2M protocols over a secure SSH or SSL connection 
In addition to keeping data safe and accessible, the MatchPort AR device server has robust 
defenses to hostile Internet attacks such as denial of service (DoS), which can be used to take 
down the network. Moreover, the MatchPort AR embedded device server cannot be used to bring 
down other devices on the network.
You can use the MatchPort AR device server with the Lantronix Secure Com Port Redirector 
(SCPR) to encrypt COM port-based communications between PCs and virtually any electronic 
device. SCPR is a Windows application that creates a secure communications path over a 
network between the computer and serial-based devices that are traditionally controlled via a 
COM port. With SCPR installed at each computer, computers that were formerly “hard-wired” by 
serial cabling for security purposes or to accommodate applications that only understood serial 
data can instead communicate over an Ethernet network or the Internet.
Terminal Server/Device Management 
Remote offices can have routers, PBXs, servers and other networking equipment that require 
remote management from the corporate facility. The MatchPort AR embedded device server 
easily attaches to the serial ports on a server, Private Branch Exchange (PBX), or other 
networking equipment to deliver central, remote monitoring and management capability.
With the menu system on the MatchPort device, connections to the console ports of the attached 
devices as well as network hosts, such as Unix servers or another MatchPort unit, can easily be 
picked from a user-defined menu. This allows console ports across multiple devices to be 
accessed from one MatchPort.
Troubleshooting Capabilities
The MatchPort AR embedded device server offers a comprehensive diagnostic toolset that lets 
you troubleshoot problems quickly and easily. Available from the Web Manager, CLI, and XML 
interfaces, the diagnostic tools let you:
View critical hardware, memory, MIB-II, buffer pool, and IP socket information.
Perform ping and traceroute operations.
Conduct forward or backup DNS lookup operations.
View all processes currently running on the MatchPort AR device server, including CPU 
utilization and total stack space available.

2: Introduction
MatchPort® AR Embedded Device Server User Guide 20
Configuration Methods
After installation, the MatchPort AR embedded device server requires configuration. For the unit to 
operate correctly on a network, it must have a unique IP address on the network. There are four 
basic methods for logging into the MatchPort AR and assigning IP addresses and other 
configurable settings:
DeviceInstaller:  Configure the IP address and related settings and view current settings on the   
using a Graphical User Interface (GUI) on a PC attached to a network.  See Chapter 3: Using 
DeviceInstaller.
Web Manager:  Through a web browser, configure the MatchPort AR settings using the Lantronix 
Web Manager. See Configuration Using Web Manager (on page 24).  
Command Mode:  There are two methods for accessing Command Mode (CLI): making a Telnet 
connection or connecting a terminal (or a PC running a terminal emulation program) to the unit’s 
serial port. (See the MatchPort AR Embedded Device Server Command Reference for instructions 
and available commands.)
XML: The MatchPort AR embedded device server supports XML-based configuration and setup 
records that make device configuration transparent to users and administrators. XML is easily 
editable with a standard text or XML editor. (See the MatchPort AR Embedded Device Server 
Command Reference for instructions and commands.)
Addresses and Port Numbers
Hardware Address
The hardware address is also referred to as the Ethernet address or MAC address. The first three 
bytes of the Ethernet address are fixed and read 00-20-4A, identifying the unit as a Lantronix 
product. The fourth, fifth, and sixth bytes are unique numbers assigned to each unit.
Figure 2-1  Sample Hardware Address
               00-20-4A-14-01-18    or    00:20:4A:14:01:18 
IP Address
Every device connected to an IP network must have a unique IP address. This address references 
the specific unit. 
Port Numbers
Every TCP connection and every UDP datagram is defined by a destination and source IP 
address, and a destination and source port number. For example, a Telnet server commonly uses 
port number 23. 
The following is a list of the default server port numbers running on the MatchPort AR embedded 
device server:
-TCP Port 22: SSH Server (Command Mode configuration)
-TCP Port 23: Telnet Server (Command Mode configuration)
-TCP Port 80: HTTP (Web Manager configuration)
-TCP Port 443: HTTPS (Web Manager configuration)

2: Introduction
MatchPort® AR Embedded Device Server User Guide 21
-UDP Port 161: SNMP
-TCP Port 21: FTP
-UDP Port 69: TFTP
-UDP Port 30718: LDP (Lantronix Discovery Protocol) port
-TCP/UDP Port 10001: Tunnel 1
-TCP/UDP Port 10002: Tunnel 2
Note: Multi-port products include one or more additional supported ports and tunnels 
with default sequential numbering.  For instance:  TCP/UDP Port 10002: Tunnel 2, TCP/
UDP Port 10003: Tunnel 3, etc. 
Product Information Label
The product information label on the unit contains the following information about the specific unit:
-Part Number
-Bar Code
-Revision
-Hardware Address (MAC Address or Serial Number)
Figure 2-2  Product Label
 e
www.Iamronix.com/sugpon/dowmoadsmml
e
www.Iamronix.com/sugpon/dowmoadsmml
 
MatchPort® AR Embedded Device Server User Guide 22
3: Using DeviceInstaller
This chapter covers the steps for locating a device and viewing its properties and details. The 
Lantronix DeviceInstaller™ application is a free utility program provided by Lantronix that 
discovers, configures, upgrades and manages Lantronix device servers. It can be downloaded 
from the Lantronix website at www.lantronix.com/support/downloads.html. For instructions on 
using DeviceInstaller to configure the IP address, related settings or for more advanced features, 
see the DeviceInstaller online help.
Note: AutoIP generates a random IP address in the range of 169.254.0.1 to 
169.254.255.254 if no BOOTP or DHCP server is found.
Accessing MatchPort AR Device Server Using DeviceInstaller
Note: Make note of the MAC address. It is needed to locate the MatchPort AR 
embedded device server using DeviceInstaller. 
1. Click Start > All Programs > Lantronix > DeviceInstaller > DeviceInstaller.
When DeviceInstaller starts, it will perform a network device search.  
2. Click Search to perform additional searches, as desired.
3. Expand the MatchPort folder by clicking the + symbol next to the MatchPort folder icon. The 
list of available Lantronix MatchPort devices appears.
4. Select the MatchPort AR unit by expanding its entry and clicking on its hardware (MAC) or IP 
address to view its configuration.
5. On the right page, click the Device Details tab. The current MatchPort AR configuration 
appears.  This is only a subset of the full configuration; the complete configuration may be 
accessed via Web Manager, CLI, or XML.
Device Details Summary
Note: The settings are Display Only in this table unless otherwise noted.
Table 3-1  Device Details Summary
Current Settings Description
Name Name identifying the MatchPort AR embedded device server. 
DHCP Device Name Shows the name associated with the current IP address, if the IP 
address was obtained dynamically.
Group Configurable field. Enter a group to categorize the MatchPort AR 
embedded device server. Double-click the field, type in the value, and 
press Enter to complete. This group name is local to this PC and is not 
visible on other PCs or laptops using DeviceInstaller.

3: Using DeviceInstaller
MatchPort® AR Embedded Device Server User Guide 23
Comments Configurable field. Enter comments for the MatchPort AR. Double-click 
the field, type in the value, and press Enter to complete. This 
description or comment is local to this PC and is not visible on other 
PCs or laptops using DeviceInstaller.
Device Family Shows the MatchPort AR device family type as “MatchPort.
Short Name Shows “matchport_ar” by default.
Long Name Shows “MatchPort AR” by default.
Type Shows the specific device type, such as “MatchPort AR”.
ID Shows the MatchPort AR ID embedded within the unit.
Hardware Address Shows the MatchPort AR hardware (MAC) address.
Firmware Version Shows the firmware currently installed on the MatchPort AR.
Extended Firmware Version Provides additional information on the firmware version.
Online Status Shows the MatchPort AR status as Online, Offline, Unreachable (the 
MatchPort AR  embedded device serveris on a different subnet), or 
Busy (the MatchPort AR is currently performing a task).
IP Address Shows the MatchPort AR current IP address. To change the IP 
address, click the Assign IP button on the DeviceInstaller menu bar.
IP Address was Obtained Displays “Dynamically” if the MatchPort AR  embedded device 
serverautomatically received an IP address (e.g., from DHCP). 
Displays “Statically” if the IP address was configured manually.
If the IP address was assigned dynamically, the following fields 
appear:
Obtain via DHCP with value of True or False.
Obtain via BOOTP with value of True or False. 
Subnet Mask Shows the subnet mask specifying the network segment on which the 
MatchPort AR  embedded device serverresides. 
Gateway Shows the IP address of the router of this network. There is no default.
Number of Ports Shows the number of serial ports on this MatchPort AR unit.
Supports Configurable Pins Shows , indicating configurable pins are available on the 
MatchPort AR embedded device server.
Supports Email Triggers Shows True, indicating email triggers are available on the 
MatchPort AR unit.
Telnet Supported Indicates whether Telnet is enabled on this MatchPort AR embedded 
device server.
Telnet Port Shows the MatchPort AR port for Telnet sessions.
Web Port Shows the MatchPort AR port for Web Manager configuration.
Firmware Upgradable Shows True, indicating the MatchPort AR firmware is upgradable as 
newer versions become available.
Current Settings (continued) Description
 Authentication Required
 
0 A usEmame and passwnrd we hang rammed by hfip #172 19 229 mm The SitE says “mug“
User Name i
 
 
 
Paschrd .. . \
 
Authentication Required
 
0 A usEmame and passwnrd we hang rammed by hfip #172 19 229 mm The SitE says “mug“
User Name i
 
 
 
Paschrd .. . \
 
 
 
 
MatchPort® AR Embedded Device Server User Guide 24
4: Configuration Using Web Manager
This chapter describes how to configure the MatchPort AR embedded device server using Web 
Manager, the Lantronix browser-based configuration tool. The unit’s configuration is stored in 
nonvolatile memory and is retained without power. All changes take effect immediately, unless 
otherwise noted.  It contains the following sections:
 Accessing Web Manager
 Web Manager Page Components
 Navigating the Web Manager
Summary of Web Manager Pages 
Accessing Web Manager
Note: You can also access the Web Manager by selecting the Web Configuration tab on 
the DeviceInstaller window.
To access Web Manager, perform the following steps:
1. Open a standard web browser. Lantronix supports the latest version of Internet Explorer, 
Mozilla Suite, Mozilla Firefox, Safari, Chrome or Opera. 
2. Enter the IP address of the MatchPort AR in the address bar. The IP address may have been 
assigned manually using DeviceInstaller (see the Embedded Device Server  Quick Start 
Guide) or automatically by DHCP. 
Figure 4-1  Prompt for User Name and Password
3. Enter your username and password.The factory-default username is “admin” and the factory-
default password is “PASS.” The Device Status web page shown in Figure 4-2 displays 
configuration, network settings, line settings, tunneling settings, and product information.
Note: The Logout button is available on any web page.  Logging out of the web page 
would force re-authentication to take place the next time the web page is accessed.
 MarchPori
Ann”
 
Device Status
Produce
Firmware V9790":
Bulld Date:
Serlal Number:
me:
Parmamm coring:
Doflult cutaway:
Domain:
Primary DNI:
secondary nus:
MTU.
VIP conduit
Line 1:
Line 2:
WX‘
EVOLUTION OS“
Lantmmx MatchPunAR
52.0.4}?!
20 2013 171417
D7031567GBIM2Z
a n5'33’n1
Saved
emu
Allin 111mm MbpaAuln Hall/Full (mu Mbps Full)
nu:2n:4a:a7 us All
(Mane)
17215.2251nu/16
172 15 111
(Maria)
172 15 1.1
172 15 1.2
1500
Disabled
R3232. 9600. NDVIE. 9. 1. NDne [0L1
R5232. 9600. NDne. B. 1. NDne
Dlsahlefl Wamng
Disabled Wamng
 
Copynuht O W ZDD7VZD12.AII "gm: VESeNEd.
 
 
MarchPori
Ann”
 
Device Status
Produce
Firmware V9790":
Bulld Date:
Serlal Number:
me:
Parmamm coring:
Doflult cutaway:
Domain:
Primary DNI:
secondary nus:
MTU.
VIP conduit
Line 1:
Line 2:
WX‘
EVOLUTION OS“
Lantmmx MatchPunAR
52.0.4}?!
20 2013 171417
D7031567GBIM2Z
a n5'33’n1
Saved
emu
Allin 111mm MbpaAuln Hall/Full (mu Mbps Full)
nu:2n:4a:a7 us All
(Mane)
17215.2251nu/16
172 15 111
(Maria)
172 15 1.1
172 15 1.2
1500
Disabled
R3232. 9600. NDVIE. 9. 1. NDne [0L1
R5232. 9600. NDne. B. 1. NDne
Dlsahlefl Wamng
Disabled Wamng
 
Copynuht O W ZDD7VZD12.AII "gm: VESeNEd.
 
 
 
4: Configuration Using Web Manager
MatchPort® AR Embedded Device Server User Guide 25
Device Status Page
The Device Status page is the first page that appears after you log into the Web Manager. It also 
appears when you click Status in the Main Menu.
Figure 4-2  Web Manager Home Page
 Items to
 
 
 
O
I I | .
QARGIchPorI N o :
mm
 
Wham Enmmzmfi um I:
Enameu mecummann LINE
lmme (cm I: mm" «m.
sumac: canngnnnon commandMado mmmcmmmmm
I
I
I“mammamhmmm |
mmmmmmmmw I
I
I
 
 
 
 
Llne 1 - Command Mode :nahIeSCnmmanflI/Innemrlhe
mm"
QAIways mums“ 5mm”
OUseSenzISmng lenamescnmmannmunewnsn
M°"°= QuaecPGWP $5,?Ifl"$i§£§iflfim”§"'
Ousehumsanmsmnganmcpsmup hmmmmmmmm|
Qumzmeu lcnmmannmuusnasennnme I
Wan-M I:| mmm :23:L;4::::;:m:.:1:2:m
senalslnnu: \—
 
Items to
 
 
 
O
I I | .
QARGIchPorI N o :
mm
 
Wham Enmmzmfi um I:
Enameu mecummann LINE
lmme (cm I: mm" «m.
sumac: canngnnnon commandMado mmmcmmmmm
I
I
I“mammamhmmm |
mmmmmmmmw I
I
I
 
 
 
 
Llne 1 - Command Mode :nahIeSCnmmanflI/Innemrlhe
mm"
QAIways mums“ 5mm”
OUseSenzISmng lenamescnmmannmunewnsn
M°"°= QuaecPGWP $5,?Ifl"$i§£§iflfim”§"'
Ousehumsanmsmnganmcpsmup hmmmmmmmm|
Qumzmeu lcnmmannmuusnasennnme I
Wan-M I:| mmm :23:L;4::::;:m:.:1:2:m
senalslnnu: \— 4: Configuration Using Web Manager
MatchPort® AR Embedded Device Server User Guide 26
Web Manager Page Components
The layout of a typical Web Manager page is below.
Figure 4-3  Components of the Web Manager Page
The menu bar always appears at the left side of the page, regardless of the page shown. The 
menu bar lists the names of the pages available in the Web Manager. To bring up a page, click it in 
the menu bar.
The main area of the page has these additional sections:
At the very top, many pages, such as the one in the example above, enable you to link to sub 
pages. On some pages, you must also select the item you are configuring, such as a line or a 
tunnel.
Menu 
Bar
Links to 
subpages
Items to 
configure
Information 
and Help Area
Status Area and/or Configuration
Footer
Logout 
button
Header

4: Configuration Using Web Manager
MatchPort® AR Embedded Device Server User Guide 27
In the middle of many pages, you can select or enter new configuration settings. Some pages 
show status or statistics in this area rather than allow you to enter settings.
At the bottom of most pages, the current configuration is displayed. In some cases, you can 
reset or clear a setting. 
The information or help area shows information or instructions associated with the page.
A Logout link is available at the upper right corner of every web page.  In Chrome or Safari, it 
is necessary to close out of the browser to logout.  If necessary, reopen the browser to log 
back in.
The footer appears at the very bottom of the page. It contains copyright information and a link 
to the Lantronix home page.
Navigating the Web Manager
The Web Manager provides an intuitive point-and-click interface. A menu bar on the left side of 
each page provides links you can click to navigate from one page to another. Some pages are 
read-only, while others let you change configuration settings. 
Note: There may be times when you must reboot the MatchPort AR for the new 
configuration settings to take effect. The chapters that follow indicate when a change 
requires a reboot. 
Table 4-4  Summary of Web Manager Pages 
Web Manager Page Description See 
Page
Status Shows product information and network, line, and tunneling settings. 33
CLI Shows Command Line Interface (CLI) statistics and lets you change the 
current CLI configuration settings.
127
CPM Shows information about the Configurable Pins Manager (CPM) and how 
to set the configurable pins and pin groups to work with a device.
59
CPU Power 
Management
Allows you to configure CPU power management, specifically the power 
management of the cpu, the on-chip peripherals and the extended 
memory.
136
Diagnostics Lets you perform various diagnostic procedures. 114
DNS Shows the current configuration of the DNS subsystem and the DNS 
cache.
66
Email Shows email statistics and lets you clear the email log, configure email 
settings, and send an email.
124
Filesystem Shows file system statistics and lets you browse the file system to view a 
file, create a file or directory, upload files using HTTP, copy a file, move a 
file, or perform TFTP actions.
104
FTP Shows statistics and lets you change the current configuration for the 
File Transfer Protocol (FTP) server.
71
Host Lets you view and change settings for a host on the network. 57
HTTP Shows HyperText Transfer Protocol (HTTP) statistics and lets you 
change the current configuration and authentication settings.
74

4: Configuration Using Web Manager
MatchPort® AR Embedded Device Server User Guide 28
IP Address Filter Lets you specify all the IP addresses and subnets that are allowed to 
send data to this device.
112
Line Shows statistics and lets you change the current configuration and 
Command mode settings of a serial line.
33
LPD Shows LPD (Line Printer Daemon) Queue statistics and lets you 
configure the LPD and print a test page.
80
Modbus Shows the current connection status of the Modbus servers listening on 
the TCP ports and lets you configure the Modbus settings.
99
Network Shows status and lets you configure the network interface.  29
Protocol Stack Lets you perform lower level network stack-specific activities. 107
Query Port Lets you change configuration settings for the query port. 113
RSS Lets you change current Really Simple Syndication (RSS) settings. 79
SNMP Lets you change the current Simple Network Management Protocol 
(SNMP) configuration settings.
69
SSH Lets you change the configuration settings for SSH server host keys, 
SSH server authorized users, SSH client known hosts, and SSH client 
users.
83
SSL Lets you upload an existing certificate or create a new self-signed 
certificate.
93
Syslog Lets you specify the severity of events to log and the server and ports to 
which the syslog should be sent.
73
System Lets you reboot device, restore factory defaults, upload new firmware, 
and change the device long and short names.
122
Terminal Lets you change current settings for a terminal. 55
TFTP Shows statistics and lets you change the current configuration for the 
Trivial File Transfer Protocol (TFTP) server.
72
Tunnel Lets you change the current configuration settings for a tunnel. 37
XML Lets you export XML configuration and status records, and import XML 
configuration records.
129
Web Manager Page 
(continued)
Description See 
Page
 Network1
lnlulfzce link
Status
Network 1 (eth0) Interface Status
BOOTP cum:
DHCP Clienl:
IP Mdlm:
Nelwnlk Mask:
Default Gateway:
Hustname:
 
Dnma
DNS Suffix Search lls1:
DHCP Clienl ID:
MTU:
Confluurallun
Curl-III
OW
0W
172192291EIEI
255 255D El
1721901
 
Network1
lnlulfzce link
Status
Network 1 (eth0) Interface Status
BOOTP cum:
DHCP Clienl:
IP Mdlm:
Nelwnlk Mask:
Default Gateway:
Hustname:
 
Dnma
DNS Suffix Search lls1:
DHCP Clienl ID:
MTU:
Confluurallun
Curl-III
OW
0W
172192291EIEI
255 255D El
1721901
MatchPort® AR Embedded Device Server User Guide 29
5: Network Settings
This chapter describes how to access, view, and configure network settings from the Network web 
page. The Network web page contains sub-menus that enable you to view and configure the 
Ethernet network interface and link.
This chapter contains the following sections:
 Network 1 (eth0) Interface Status
 Network 1 (eth0) Interface Configuration
 Network 1 Ethernet Link
Network 1 (eth0) Interface Status
This page shows the status of the Ethernet network interface.  
To view the network interface status:
1. Click Network on the menu then click Network 1 > Interface > Status at the top of the page. 
The Network 1 (eth0) Interface Status page appears.
Figure 5-1  Network 1 (eth0) Interface Status
 Ne'wolk 1
Immaca Link
smus Cunngumiun
Network 1 (eth0) Interface Configuration
 
BOOTP Client: GDn Grow
DHCP Client Can @ufi
IP Address: 17219 223100115
Delaull Gateway: 17219 01
Husiname:
Dumal
DHCP Clienl ID: (MM (5 BMW
Primary DNS: wzwm \
SecondaryDMS: 172m 2 \
MTU: TSUU
 
 
Ne'wolk 1
Immaca Link
smus Cunngumiun
Network 1 (eth0) Interface Configuration
 
BOOTP Client: GDn Grow
DHCP Client Can @ufi
IP Address: 17219 223100115
Delaull Gateway: 17219 01
Husiname:
Dumal
DHCP Clienl ID: (MM (5 BMW
Primary DNS: wzwm \
SecondaryDMS: 172m 2 \
MTU: TSUU
 
 
5: Network Settings
MatchPort® AR Embedded Device Server User Guide 30
Network 1 (eth0) Interface Configuration
This page shows the configuration settings for the Ethernet connection and lets you change these 
settings.
To view and configure network interface settings:
1. Click Network on the menu bar and then Network 1 > Interface > Configuration at the top of 
the page. The Network 1 (eth0) Interface Configuration page appears.
Figure 5-2  Network 1 (eth0) Interface Configuration
2. Enter or modify the following settings:
Table 5-3  Network 1 (eth0) Interface Configuration
Network 1 Interface 
Configuration 
Settings 
Description
BOOTP Client Select On or Off. At boot up, the device will attempt to obtain an IP address from a 
BOOTP server.
Notes: 
Overrides the configured IP address, network mask, gateway, hostname, and 
domain.
When DHCP is On, the system automatically uses DHCP, regardless of whether 
BOOTP Client is On.

5: Network Settings
MatchPort® AR Embedded Device Server User Guide 31
3. Click Submit to save changes. Some changes to the following settings require a reboot for the 
changes to take effect: 
-BOOTP Client
-DHCP Client
-IP Address
-DHCP Client ID
Note: If DHCP or BOOTP fails, AutoIP intervenes and assigns an address.A new DHCP 
negotiation is attempted every 5 minutes to obtain a new IP address. When the DHCP is 
enabled, any configured static IP address is ignored.
DHCP Client Select On or Off. At boot up, the device will attempt to lease an IP address from a 
DHCP server and maintain the lease at regular intervals.
Note: Overrides BOOTP, the configured IP address, network mask, gateway, 
hostname, and domain.
IP Address Enter the device static IP address. 
You may enter it alone, in CIDR format, or with an explicit mask.
The IP address consists of four octets separated by a period and is used if BOOTP and 
DHCP are both set to Off. Changing this value requires you to reboot the device. 
Note: When DHCP is enabled, the device tries to obtain an IP address from DHCP. If 
it cannot, the device uses an AutoIP address in the range of 169.254.xxx.xxx.
Default Gateway Enter the IP address of the router for this network. Or, clear the field (appears as 
<None>). This address is only used for static IP address configuration.
Hostname Enter the device hostname. It must begin with a letter, continue with a sequence of 
letters, numbers, and/or hyphens, and end with a letter or number.
Domain Enter the device domain name.
DHCP Client ID Enter the ID if the DHCP server uses a DHCP ID. The DHCP server’s lease table 
shows IP addresses and MAC addresses for devices. The lease table shows the Client 
ID, in hexadecimal notation, instead of the device MAC address.
Note: "Binary" entry mode allows a mixed mode of text and special characters in 
brackets  For example, "abcd<ctrl>A" would be entered "abcd[0x01]".
Primary DNS IP address of the primary name server. This entry is required if you choose to configure 
DNS (Domain Name Server) servers.
Secondary DNS IP address of the secondary name server.
MTU When DHCP is enabled, the MTU size is (usually) provided with the IP address. When 
not provided by the DHCP server, or using a static configuration, this value is used. The 
MTU size can be from 576 to 1500 bytes.
Network 1 Interface 
Configuration 
Settings  (continued) 
Description
 Netwnrk1
Interface Link
Network 1 (eth0) Ethernet Link
 
Status
Speed: mu Mbps
Duplex: Fun
Configuration
Speeu: @Aum
 
 
Netwnrk1
Interface Link
Network 1 (eth0) Ethernet Link
 
Status
Speed: mu Mbps
Duplex: Fun
Configuration
Speeu: @Aum 5: Network Settings
MatchPort® AR Embedded Device Server User Guide 32
Network 1 Ethernet Link
This page shows the current negotiated Ethernet settings and lets you change the speed and 
duplex settings. 
To view and configure the Ethernet link:
1. Click Network on the menu bar and then click Network 1 > Link at the top of the page. The 
Network 1 (eth0) Ethernet Link page appears. 
-If coming from another Network page, click Network 1 > Link at the top of the page.
Figure 5-4  Network 1 Ethernet Link
The Status table shows the current negotiated settings. The Configuration table shows the 
current range of allowed settings.
2. Enter or modify the following settings:
Table 5-5  Network 1 Ethernet Link
3. Click Submit. The changes take effect immediately. 
Note: The following section describes the steps to view and configure Line 1 settings; 
these steps apply to other line instances of the device.
Network 1-Ethernet Link 
Settings 
Description
Speed Select the Ethernet link speed. Default is Auto.
Duplex Select the Ethernet link duplex mode. Default is Auto.
 Line 1
Sufism: Col
Line 1 - Statistics
Bytes:
Banks:
Flow colmol:
Palily Ell-NS:
le '
 
J Enols:
Ovenun EIIOIS:
No Rx Bllfiel Ennis:
Queued Raceive Bylos:
Onellexl Imusnm Byles:
c‘rs illpul:
ms oll'plll:
DSR inpm:
um mnpm:
Lim 2 Line 3 Lina I
gum on Caluluand Mode
Ihcflvu Tnmmlnol
U D
D D
N/A N/A
U
I]
U
El
I]
U
um assened
assened
nut assenad
um asszned
 
 
Line 1
Sufism: Col
Line 1 - Statistics
Bytes:
Banks:
Flow colmol:
Palily Ell-NS:
le '
 
J Enols:
Ovenun EIIOIS:
No Rx Bllfiel Ennis:
Queued Raceive Bylos:
Onellexl Imusnm Byles:
c‘rs illpul:
ms oll'plll:
DSR inpm:
um mnpm:
Lim 2 Line 3 Lina I
gum on Caluluand Mode
Ihcflvu Tnmmlnol
U D
D D
N/A N/A
U
I]
U
El
I]
U
um assened
assened
nut assenad
um asszned
 
 
 
MatchPort® AR Embedded Device Server User Guide 33
6: Line and Tunnel Settings
This chapter describes how to view 
and configure lines and tunnels. It 
contains the following sections:
 Line Settings
 Tunnel Settings 
Line Settings
View statistics and configure serial interfaces by using the Line web page.  Serial interfaces are 
referred to as lines in this user guide, and a different number of lines, from 1 to 32, may be 
available for selection depending on your product. 
The following sub-menus may be used for a selected line number:
Line Statistics—Displays statistics for the selected line number. For example, the bytes 
received and transmitted, breaks, flow control, parity errors, etc.
Line Configuration—Enables the change of the name, interface, protocol, baud rates, and 
parity, etc. 
Line Command Mode—Enables the types of modes, wait time, serial strings, signon 
message, etc. 
The following sections describe the steps to view and configure specific line number settings.  
These instructions also apply to additional line instances of the device.
Line Statistics
This read-only web page shows 
the status and statistics for the 
serial line selected at the top of 
this page.  
Note: Lines 3 and 4 do 
not apply for MatchPort 
AR embedded device 
server.
1. Select Line on the menu bar. 
The Line web page appears.
2. Select a line number at the 
top of the page.
3. Select Statistics.  The Line 
Statistics page for the 
selected line appears.
4. Repeat above steps as 
desired, according to 
additional line(s) available on 
your product.
Figure 6-1  Line 1 Statistics
Note: The number of lines and tunnels available for 
viewing and configuration differ between Lantronix 
products.  For example, XPort® Pro embedded 
networking module and EDS1100 support only one 
line while other device networking products (such as  
EDS2100, EDS4100, MatchPort b/g Pro, XPort® AR 
embedded networking module, EDS8/16PS and 
EDS8/16/32PR) provide additional lines and tunnels.  
 ”Ill 1
 
 
Slaflnli: Cummmi llnd-
 
 
Line 2 - Configuration
      
 
 
 
    
 
 
 
 
 
 
 
 
 
 
 
 
 
 
lnlnrfacn:
SW:
Pmiucui:
Baud Rm: 9600
Pailly: Nona
Data 3 a
snap ans: E i
Fliwl Cnmml: Non:
Xon Char.
 
 
 
 
”Ill 1
 
 
Slaflnli: Cummmi llnd-
 
 
Line 2 - Configuration
      
 
 
 
    
 
 
 
 
 
 
 
 
 
 
 
 
 
 
lnlnrfacn:
SW:
Pmiucui:
Baud Rm: 9600
Pailly: Nona
Data 3 a
snap ans: E i
Fliwl Cnmml: Non:
Xon Char. 6: Line and Tunnel Settings
MatchPort® AR Embedded Device Server User Guide 34
Line Configuration
This page shows the configuration settings for the serial line selected at the top of the page and 
lets you change the settings for that serial line.
To configure a specific line:
1. Select Line on the menu bar, if you are not already in the Line web page.
2. Select a line number at the top of the page.
3. Select Configuration.  The Configuration page for the selected line appears.
Figure 6-2  Line 1 Configuration

6: Line and Tunnel Settings
MatchPort® AR Embedded Device Server User Guide 35
4. Enter or modify the following settings:
Table 6-3  Line Configuration
5. Click Submit. 
6. Repeat above steps as desired, according to additional line(s) available on your product.
Line - Configuration  
Settings
Description
Name If the Terminal Login Menu feature is being used, enter the name for the line. 
Leaving this field blank will disable this line from appearing in the Terminal Login 
Menu.  The default Name is blank. See Terminal and Host Settings on page 55 
for related configuration information.
Interface Select the interface type from the drop-down menu. The default is RS232.
State Indicates whether the current line is enabled. To change the status, select 
Enabled or Disabled from the drop-down menu.
Protocol Select the protocol from the drop-down menu. The default is Tunnel.
Note: All protocols work in Connect and Accept Mode except the LPD or Tunnel 
protocol option which is supported only in Accept Mode.
Baud Rate Select the baud rate from the drop-down menu. The default is 9600.
Parity Select the parity from the drop-down menu. The default is None.
Data Bits Select the number of data bits from the drop-down menu. The default is 8.
Stop Bits Select the number of stop bits from the drop-down menu. The default is 1.
Flow Control Select the flow control from the drop-down menu. The default is None.
Xon Char Specify the character to use to start the flow of data when Flow Control is set to 
Software. Prefix a decimal character with \ or a hexadecimal character with 0x, or 
provide a single printable character. The default Xon char is 0x11.
Xoff Char Specify the character to use to stop the flow of data when Flow Control is set to 
Software. Prefix a decimal character with \ or a hexadecimal character with 0x, or 
provide a single printable character. The default Xoff char is 0x13.
Gap Timer The driver forwards received serial bytes after the Gap Timer delay from the last 
character received. By default, the delay is four character periods at the current 
baud rate (minimum 1 ms).
Threshold The driver will also forward received characters after Threshold bytes have 
been received.
 Lille 1 Line 2 Line 3 Lille 6
Slnllslivx Collfiglimlloll CoiuilmmlMoile
Line 1 - Command Mode
C ) Always
C Use Seiiai Suing
Made: 0 Use CF' Gmup
OUse min Seiiai suing and CF' GIEILip
O Disaniad
WaiI Tillie: minimums
 
Seiini 5' IN]
 
TQM O Binaiy
 
Echo SeliJISlmIq Oves 0N0
CP Glmlp: Gmup Vaiue
Siquoii Message: 6: Text C Binaiy
 
Current Configuration
Mode: Dlsablzd (mama)
w.iii Tim 5000 milh$econds
Serial Suing:
 
 
Lille 1 Line 2 Line 3 Lille 6
Slnllslivx Collfiglimlloll CoiuilmmlMoile
Line 1 - Command Mode
C ) Always
C Use Seiiai Suing
Made: 0 Use CF' Gmup
OUse min Seiiai suing and CF' GIEILip
O Disaniad
WaiI Tillie: minimums
 
Seiini 5' IN]
 
TQM O Binaiy
 
Echo SeliJISlmIq Oves 0N0
CP Glmlp: Gmup Vaiue
Siquoii Message: 6: Text C Binaiy
 
Current Configuration
Mode: Dlsablzd (mama)
w.iii Tim 5000 milh$econds
Serial Suing: 6: Line and Tunnel Settings
MatchPort® AR Embedded Device Server User Guide 36
4. Enter or modify the following settings:
Table 6-5  Line Command Mode
Line Command Mode
Setting the Command Mode 
enables the CLI on the serial 
line.
Note: Lines 3 and 4 
do not apply for 
MatchPort AR 
embedded device 
server.
To configure Command 
Mode on a specific line:
1. Select Line on the menu 
bar, if you are not already 
in the Line web page.
2. Select a line number at the 
top of the page.
3. Select Command Mode.  
The Command Mode page 
for the selected line 
appears.
Figure 6-4  Line 1 Command Mode
Line – Command Mode 
Settings
Description
Mode Select the method of enabling Command Mode or choose to disable Command 
Mode. 
Always = immediately enables Command Mode for the serial line. 
Use Serial String = enables Command Mode when the serial string is read 
on the serial line during boot time. 
Use CP Group = enables Command Mode based on the status of a CP 
Group. When the value matches the current value of the group, Command 
Mode is enabled on the serial line.
Use both Serial String and CP Group = the serial string and the value of 
the CP group must be matched to enable Command Mode.
Disabled = turns off Command Mode.
Wait Time Enter the wait time for the serial string during boot-up in milliseconds.

6: Line and Tunnel Settings
MatchPort® AR Embedded Device Server User Guide 37
5. Click Submit. 
6. Repeat above steps as desired, according to additional line(s) available on your product.
Tunnel Settings
Note: The number of lines and tunnels available for viewing and configuration differ 
between Lantronix products.  For example, an XPort Pro and EDS1100 support only one 
line while other device networking products (such as EDS2100, EDS4100, MatchPort AR, 
XPort AR, EDS8/16PS and EDS8/16/32PR devices) provide additional lines and tunnels.  
Tunneling allows serial devices to communicate over a network, without “being aware” of the 
devices which establish the network connection between them.Tunneling parameters are 
configured using the Web Manager or Command Mode Tunnel Menu.  See Configuration Using 
Web Manager (on page 24) or the  MatchPort AR Command Reference for the full list of 
commands.
The MatchPort AR embedded device server supports two tunneling connections simultaneously 
per serial port. One of these connections is Connect Mode; the other connection is Accept Mode. 
The connections on one serial port are separate from those on another serial port.
Connect Mode: the  MatchPort AR embedded device server actively makes a connection. 
The receiving node on the network must listen for the Connect Mode’s connection. Connect 
Mode is disabled by default.
Accept Mode: the  MatchPort AR device listens for a connection. A node on the network 
initiates the connection. Accept Mode is enabled by default.
Disconnect Mode: this mode defines how an open connection stops the forwarding of data. 
The specific parameters to stop the connection are configurable. Once the  MatchPort AR 
Disconnect Mode observes the defined event occur, it will disconnect both Accept Mode and 
Connect Mode connections on that port.
Serial String Enter the serial string characters. Select a string type.
Text = string of bytes that must be read on the Serial Line during boot time to 
enable Command Mode. It may contain a time element in x milliseconds, in 
the format {x}, to specify a required delay. 
Binary = string of characters representing byte values where each 
hexadecimal byte value starts with \0x and each decimal byte value starts 
with \. 
Echo Serial String Select Yes to enable echoing of the serial string at boot-up.
CP Group Enter the name and decimal value of the CP Group.  When the value matches 
the current value of the group, Command Mode is enabled on the Serial Line. 
Signon Message Enter the boot-up signon message. Select a string type.
Text = string of bytes sent on the serial line during boot time.
Binary = one or more byte values separated by commas. Each byte value 
may be decimal or hexadecimal. Start hexadecimal values with 0x.
Note: This string will be output on the serial port at boot, regardless of whether 
command mode is enabled or not.
Line – Command Mode 
Settings (continued)
Description

6: Line and Tunnel Settings
MatchPort® AR Embedded Device Server User Guide 38
When any character comes in through the serial port, it gets copied to both the Connect Mode 
connection and the Accept Mode connection (if both are active). 
View statistics and configure a specific tunnel by using the Tunnel web page. When you select 
Tunnel from the Main Menu, tunnels available for your product will display.  Select a specific tunnel 
to configure.
The following sub-menus listed may be used to configure a specific tunnel:
 Tunnel – Statistics
 Tunnel – Serial Settings
 Tunnel – Packing Mode
 Tunnel – Accept Mode
 Tunnel – Connect Mode
 Tunnel – Disconnect Mode
 Tunnel – Modem Emulation
The following sections describe the steps to view and configure specific tunnel number settings.  
These instructions also apply to additional tunnel menu options.
Tunnel – Statistics
The  MatchPort AR embedded device server logs statistics for tunneling. The Dropped statistic 
shows connections ended by the remote location. The Disconnects statistic shows connections 
ended by the  MatchPort AR unit.
To display statistics for a specific tunnel:
1. Select Tunnel on the menu bar. The Tunnel web page appears.
2. Select a tunnel number at the top of the page.
3. Select Statistics.  The Tunnel Statistics page for the specific tunnel appears.
If a particular tunnel is connected, the following becomes available:
-Identifying information about the tunnel connection (i.e., “Connect 1 Counters”)
-Address of connection (i.e., “local:10001 -> 172.22.22.22.10001”)
-Kill Connection(s) link:  Click this link to terminate this active tunnel connection, as 
desired.
-Octets forwarded from Serial
-Octets forwarded form Network
-Uptime
 Tlll-IZ Tull-I3 Yin-I4
Sulalsmnp Packlng Mon.
Accept Mode Connect Moon Dhconned Mode
Modem Emulnllon
 
 
 
 
Tunnel1 - Stati tics
Completed Accepu:
Complelod Connects:
Disconnect:
Dloppofl Amp :
Dropped Connect:
anls lolwilded [mm Selill:
0:10“ lowly-fled (mm Network: 0
Accept Conneaion Time: 0 days 00:03:00
Cannon 1 Connedlon "Inc: B days EIEI‘EIII’UEI
Connect 2 Conneaion Time: D days 00:03:00
Cannon 3 Connection Tllno: D days EIDZEEIIUEI
Connecl 4 Conneaion Time: 0 days UlllIIVUEI
Connoa 5 Connealon Tllno: D days Dflzmflfl
Connect 6 Connection 'Ilme: 0 days UllUlUU
Connea 1 Connection Time: D days 00:03:00
Connofll Connedlon TImI: D d: EID‘III’UEI
Connecl DIIS Addie: Changes: 0
Connoa DMS Add”: Invillfle: D
Thele is no naive conneaion.
    
hulzllm > nulzlzunm
Mb W from Sevi-
Omb M from Mark:
Upthne:
Thele no naive conneaion.
There no naive connection.
There Is no active wnnedlon.
Then I: no active connectlon.
The" Is no naive connonlon.
The" [e no aalve connoalon.
Then I: no naive connoalon.
Thele is no naive conneaion.
10399
31101
5 days 01mm
 
 
Tlll-IZ Tull-I3 Yin-I4
Sulalsmnp Packlng Mon.
Accept Mode Connect Moon Dhconned Mode
Modem Emulnllon
 
 
 
 
Tunnel1 - Stati tics
Completed Accepu:
Complelod Connects:
Disconnect:
Dloppofl Amp :
Dropped Connect:
anls lolwilded [mm Selill:
0:10“ lowly-fled (mm Network: 0
Accept Conneaion Time: 0 days 00:03:00
Cannon 1 Connedlon "Inc: B days EIEI‘EIII’UEI
Connect 2 Conneaion Time: D days 00:03:00
Cannon 3 Connection Tllno: D days EIDZEEIIUEI
Connecl 4 Conneaion Time: 0 days UlllIIVUEI
Connoa 5 Connealon Tllno: D days Dflzmflfl
Connect 6 Connection 'Ilme: 0 days UllUlUU
Connea 1 Connection Time: D days 00:03:00
Connofll Connedlon TImI: D d: EID‘III’UEI
Connecl DIIS Addie: Changes: 0
Connoa DMS Add”: Invillfle: D
Thele is no naive conneaion.
    
hulzllm > nulzlzunm
Mb W from Sevi-
Omb M from Mark:
Upthne:
Thele no naive conneaion.
There no naive connection.
There Is no active wnnedlon.
Then I: no active connectlon.
The" Is no naive connonlon.
The" [e no aalve connoalon.
Then I: no naive connoalon.
Thele is no naive conneaion.
10399
31101
5 days 01mm
 
6: Line and Tunnel Settings
MatchPort® AR Embedded Device Server User Guide 39
4. Repeat above steps as desired, according to additional tunnel(s) available on your product.
Additional information appears 
for each active tunnel 
connection including a link 
allowing you to terminate the 
connection.
Figure 6-6  Tunnel 1 Statistics
Note: Lines 3 and 4 do not apply 
for MatchPort AR embedded device 
server.
 Tunnel 1 Tunnel 2 Tunnel 3 Tunnel 4
Slalislits Sevial Sellings Packing Made
Accept Mode Cannzct Mode Disconnecl Made
Modem Emulation
Tunnel 1- Serial Settings
Line Sailings: R5232 96m None 3,1 None
Protocol: Tunne‘
CUnassened
um: OTumI
@Assened wmle cemented
C Cannnuouswy assened
 
 
Tunnel 1 Tunnel 2 Tunnel 3 Tunnel 4
Slalislits Sevial Sellings Packing Made
Accept Mode Cannzct Mode Disconnecl Made
Modem Emulation
Tunnel 1- Serial Settings
Line Sailings: R5232 96m None 3,1 None
Protocol: Tunne‘
CUnassened
um: OTumI
@Assened wmle cemented
C Cannnuouswy assened
 
 
6: Line and Tunnel Settings
MatchPort® AR Embedded Device Server User Guide 40
Tunnel – Serial Settings
Serial line settings are configurable for the corresponding serial line of the specific tunnel. 
Configure the buffer size to change the maximum amount of data the serial port stores. For any 
active connection, the device sends the data in the buffer. 
The modem control signal DTR on the selected line may be continuously asserted or asserted only 
while either an Accept Mode tunnel or a Connect Mode tunnel is connected.
To configure serial settings for a specific tunnel:
1. Select Tunnel on the menu bar, if you are not already in the Tunnel web page.
2. Select a tunnel number at the top of the page.
3. Select Serial Settings.  The Serial Settings page for the specific tunnel appears.
Figure 6-7  Tunnel 1 Serial Settings
Note: Lines 3 and 4 do not apply for MatchPort AR embedded device server.
4. View or modify the following settings:
Table 6-8  Tunnel - Serial Settings
Tunnel - Serial Settings Description
Line Settings (display only) Current serial settings for the line.
Protocol (display only) The protocol being used on the line. In this case, Tunnel.
 TunnEH Tunnell Tunnel} Tunneld
 
Slalislics Selial Sailings Packing Mode
Accept Mode Connect Mode Disconnect Mode
Modem Elnlllalion
Tunnel 1 - Packing Mode
0 Dwsah‘s
Mode: OTImEqu
05m! Chavactev
 
 
TunnEH Tunnell Tunnel} Tunneld
 
Slalislics Selial Sailings Packing Mode
Accept Mode Connect Mode Disconnect Mode
Modem Elnlllalion
Tunnel 1 - Packing Mode
0 Dwsah‘s
Mode: OTImEqu
05m! Chavactev
 
 
 
 
6: Line and Tunnel Settings
MatchPort® AR Embedded Device Server User Guide 41
5. Click Submit. 
6. Repeat above steps as desired, according to additional tunnel(s) available on your product.
Tunnel – Packing Mode
Packing Mode takes data from the serial port, packs it together, and sends it over the network. 
Packing can be configured based on threshold (size in bytes, timeout (milliseconds), or a single 
character.
Size is set by modifying the threshold field. When the number of bytes reaches the threshold, a 
packet is sent immediately.
The timeout field is used to force a packet to be sent after a maximum time. The packet is sent 
even if the threshold value is not reached.
When Send Character is configured, a single printable character or control character read on the 
Serial Line forces the packet to be sent immediately. There is an optional trailing character 
parameter which can be specified. It can be a single printable character or a control character.
To configure the Packing Mode for a specific tunnel:
1. Select Tunnel on the menu bar, if you are not already in the Tunnel web page.
2. Select a tunnel number at the top of the page.
3. Select Packing Mode.  The Packing Mode page for the specific tunnel appears.
Figure 6-9  Tunnel 1 Packing Mode (Mode = Disable)
Note: Lines 3 and 4 do not apply for MatchPort AR embedded device server.
DTR Select when to assert DTR.
Unasserted = never asserted
TruPort = asserted whenever either a connect or an accept mode tunnel 
connection is active with the Telnet Protocol RFC2217 saying that the 
remote DSR is asserted.
Asserted while connected = asserted whenever either a connect or an 
accept mode tunnel connection is active.
Continuously asserted = asserted regardless of the status of a tunnel 
connection.
Tunnel - Serial Settings  Description
 Tunnell Tunnall Tunnel} Tunnel!
 
Sennl Senlngs
Connect Mode
Modem Emulallon
Packlng Mmle
Discouueu Molle
SIMISIIIS
Accep! Mo lle
Tunnel 1 - Packing Mode
 
 
 
 
O Dlsahle
Mode: @Tlmeuul
0 Send cnaraclev
Tlllesllolll: 512 bytes
Timeout: mun mllllsewnds
Tunnel 1 Tunnel 2 Tunnel 3 Tunnel 4
Slallsllcs Sellal Sefllllgs Packlllg Mode
Accepl Mode
Connect Mode Disconnect Mode
Mollelll Ellllllalioll
Tunnel 1 - Packing Mode
0 Dlsahle
Mode: OTImEOUl
('3 Send Characlev
Tlllesllolll: 5l 2 bytes
Send Chm-)cler: (cuntlubM
Tml lug CllamdeT:
 
 
Tunnell Tunnall Tunnel} Tunnel!
 
Sennl Senlngs
Connect Mode
Modem Emulallon
Packlng Mmle
Discouueu Molle
SIMISIIIS
Accep! Mo lle
Tunnel 1 - Packing Mode
 
 
 
 
O Dlsahle
Mode: @Tlmeuul
0 Send cnaraclev
Tlllesllolll: 512 bytes
Timeout: mun mllllsewnds
Tunnel 1 Tunnel 2 Tunnel 3 Tunnel 4
Slallsllcs Sellal Sefllllgs Packlllg Mode
Accepl Mode
Connect Mode Disconnect Mode
Mollelll Ellllllalioll
Tunnel 1 - Packing Mode
0 Dlsahle
Mode: OTImEOUl
('3 Send Characlev
Tlllesllolll: 5l 2 bytes
Send Chm-)cler: (cuntlubM
Tml lug CllamdeT: 6: Line and Tunnel Settings
MatchPort® AR Embedded Device Server User Guide 42
Depending on the Mode selection, different configurable parameters for the specific tunnel 
number are presented to the user.  The following figures show the display for each of the three 
packing modes.
Note: Lines 3 and 4 do not apply for MatchPort AR embedded device server for Figure 
6-10 and Figure 6-11.
Figure 6-10  Tunnel 1 Packing Mode (Mode = Timeout)
Figure 6-11  Tunnel 1 Packing Mode (Mode = Send Character)
4. Enter or modify the following settings:

6: Line and Tunnel Settings
MatchPort® AR Embedded Device Server User Guide 43
Table 6-12  Tunnel Packing Mode
5. Click Submit.
6. Repeat above steps as desired, according to additional tunnel(s) available on your product.
Tunnel – Accept Mode
Controls how a specific tunnel number behaves when a connection attempt originates from the 
network. In Accept Mode, the  MatchPort AR embedded device server waits for a connection from 
the network. The configurable local port is the port the remote device connects to for this 
connection. There is no remote port or address. The default local port is 10001 for serial port 1 and  
increases sequentially for each additional serial port, if supported.
Accept Mode supports the following protocols:
-SSH (the  MatchPort AR device is the server in Accept Mode). When using this protocol, 
the SSH server host keys and at least one SSH authorized user must be configured.
-SSL
-TCP
-AES encryption over TCP
-Telnet (the  MatchPort AR embedded device server supports IAC codes. It drops the IAC 
codes when Telnetting and does not forward them to the serial port).
Tunnel -  Packing Mode 
Settings
Description
Mode Select Disable to disable Packing Mode completely. 
Select Timeout to send data after the specified time has 
elapsed. 
Select Send Character to send the queued data when the send 
character is received.
Threshold
(Appears for both Timeout 
and Send Character 
Modes)
Send the queued data when the number of queued bytes reaches 
the threshold.  When the buffer fills to this specified amount of data 
in bytes (and the timeout has not elapsed), the device packs the 
data and sends it out; applies only if the Packing Mode is not 
Disabled.
Timeout
(Appears for Timeout 
Mode)
Enter a time, in milliseconds, for the device to send the queued 
data after the first character was received.  Specifies the time 
duration in milliseconds; applies only if the Packing Mode is 
Timeout.
Send Character
(Appears for Send 
Character Mode)
Enter the send character (single printable or control). Upon 
receiving this character, the device sends out the queued data.  
The data is packed until the specified send character is 
encountered. Similar to a start or stop character, the device packs 
the data until it sees the send character. The device then sends the 
packed data and the send character in the packet.  Applies only if 
the Packing Mode is Send Character.
Trailing Character
(Appears for Send 
Character Mode)
Enter the trailing character (single printable or control). This 
character is sent immediately following the send character.  This is 
an optional setting. If a trailing character is defined, this character is 
appended to data put on the network immediately following the 
send character.

6: Line and Tunnel Settings
MatchPort® AR Embedded Device Server User Guide 44
Accept Mode has the following states:
-Disabled (never a connection)
-Enabled (always listening for a connection)
-Active if it receives any character from the serial port
-Active if it receives a specific (configurable) character from the serial port (same start 
character as Connect Mode’s start character)
-Modem control signal (when the modem control pin is asserted on the serial line 
corresponding to the tunnel)
-Modem emulation
To configure the Accept Mode of a specific tunnel:
1. Select Tunnel on the menu bar, if you are not already in the Tunnel web page.
2. Select a tunnel number at the top of the page.
3. Select Accept Mode.  The Accept Mode page for the specific tunnel appears.
Figure 6-13  Tunnel 1 Accept Mode
4. Enter or modify the following settings:
Table 6-14  Tunnel Accept Mode
Tunnel -  Accept Mode 
Settings
Description
Mode Select the method used to start a tunnel in Accept mode. Choices are:
Disabled = do not accept an incoming connection.
Always = accept an incoming connection (default)
Any Character = start waiting for an incoming connection when any 
character is read on the serial line.
Start Character = start waiting for an incoming connection when the start 
character for the specific tunnel is read on the serial line.
Modem Control Asserted = start waiting for an incoming connection as long 
as the Modem Control pin (DSR) is asserted on the serial line until a 
connection is made. 
Modem Emulation = start waiting for an incoming connection when triggered 
by modem emulation AT commands. Connect mode must also be set to 
Modem Emulation.
Local Port Enter the port number for use as the local port. The defaults are port 10001 for 
Tunnel 1.  Additional tunnels, if supported, increase sequentially.
Protocol Select the protocol type for use with Accept Mode. The default protocol is TCP. If 
you select TCP AES you will need to configure the AES keys.
TCP Keep Alive Enter the time, in seconds, the device waits during a silent connection before 
checking if the currently connected network device is still on the network. If the 
unit then gets no response after 8 attempts, it drops that connection.
Flush Serial Data Select Enabled to flush the serial data buffer on a new connection.
Block Serial Data Select On to block, or not tunnel, serial data transmitted to the device. 
Block Network Select On to block, or not tunnel, network data transmitted to the device.

6: Line and Tunnel Settings
MatchPort® AR Embedded Device Server User Guide 45
5. Click Submit. 
6. Repeat above steps as desired, according to additional tunnel(s) available on your product.
Password Enter a password that clients must send to the device within 30 seconds from 
opening a network connection to enable data transmission. 
The password can have up to 31 characters and must contain only alphanumeric 
characters and punctuation. When set, the password sent to the device must be 
terminated with one of the following: (a) 0x0A (LF), (b) 0x00, (c) 0x0D 0x0A (CR 
LF), or (d) 0x0D 0x00. 
Email on Connect Select whether the device sends an email when a connection is made. Select 
None if you do not want to send an email. Otherwise, select the Email profile to 
use for sending.
Email on Disconnect Select whether the device sends an email when a connection is closed. Select 
None if you do not want to send an email. Otherwise, select the Email profile to 
use for sending.
CP Output Identifies a CP or CP Group whose value should change when a connection is 
established and dropped.
Connection value—Specifies the value to set the CP Group to when a 
connection is established.
Disconnection value—Specifies the value to set the CP Group to when the 
connection is closed.
Tunnel -  Accept Mode 
Settings (continued)
Description

6: Line and Tunnel Settings
MatchPort® AR Embedded Device Server User Guide 46
Tunnel – Connect Mode
Connect Mode defines how the device makes an outgoing connection through a specific tunnel. 
When enabled, Connect Mode is always on and attempting a network connection if the connection 
mode condition warrants it. For Connect Mode to function, it must:
Be enabled
Have a remote host configured
Have a remote port configured
Enter the remote host address as an IP address or DNS name. The MatchPort AR device will 
make a connection only if it can resolve the address. For DNS names, the  MatchPort AR 
embedded device server will re-evaluate the address after being established for 4 hours. If re-
evaluation results in a different address, it will close the connection.
Connect Mode supports the following protocols:
TCP
AES encryption over TCP and UDP
When setting AES encryption, both the encrypt key and the decrypt key must be specified. 
The encrypt key is used for data sent out. The decrypt key is used for receiving data. Both of 
the keys may be set to the same value.
SSH
To configure SSH, the SSH client username must be configured. In Connect Mode, the  AR 
unit is the SSH client. Ensure the  MatchPort AR SSH client username is configured on the 
remote SSH server before using it with the  MatchPort AR embedded device server.
SSL
UDP
Is only available in Connect Mode because it is a connectionless protocol. For Connect Mode 
using UDP, the  MatchPort AR unit accepts packets from any device on the network. It will 
send packets to the last device that sent it packets. 
Telnet
Note: The Local Port in Connect Mode is independent of the port configured in Accept 
Mode.
There are six different connect modes:
Disable
No connection is attempted.
Always
A connection is always attempted.
Any Character
A connection is attempted if it detects any 
character from the serial port.  
Start Character
A connection is attempted if it detects a specific and configurable character from the serial 
port.
Note: While in the “Any Character” or “Start 
Character” connection modes, the  
MatchPort AR embedded device server 
waits and retries the connection if the 
connection cannot be made. Once it makes 
a connection and then disconnects, it will 
not reconnect until it sees another character 
or the start character again (depending on 
the configured setting).
 SI:
 
is
Abbe,“ MndE
Tunnel 1 Tunnel 1
 
Serial Sailings Pa 9 Made
Cnnnzd Made l Dismnnen Mnde
Madam Emulation
Tunnel 2 - Connect Mode
Made:
LnL‘al Fun:
H051 1:
Rscnnnad TimEI:
Flush Serial Data:
Black Serial:
Black Netonk:
Email on Connect
Email on
Discnnnect:
CF Output:
Dlsable
 
W
 
 
SI:
 
is
Abbe,“ MndE
Tunnel 1 Tunnel 1
 
Serial Sailings Pa 9 Made
Cnnnzd Made l Dismnnen Mnde
Madam Emulation
Tunnel 2 - Connect Mode
Made:
LnL‘al Fun:
H051 1:
Rscnnnad TimEI:
Flush Serial Data:
Black Serial:
Black Netonk:
Email on Connect
Email on
Discnnnect:
CF Output:
Dlsable
 
W
6: Line and Tunnel Settings
MatchPort® AR Embedded Device Server User Guide 47
Modem Control Asserted
A connection is attempted when the modem control pin is asserted in the serial line.  
Note: Configure the Modem Control Asserted setting (for DSR or DTR) to start a 
Connect Mode connection when the signal is asserted. The MatchPort AR embedded 
device server will try to make a connection indefinitely. If the connection closes, it will 
not make another connection unless the signal is asserted again. 
Modem Emulation
A connection is attempted by an ATD command.
To configure Connect Mode for a specific tunnel:
1. Select Tunnel on the menu bar, if you are not already in the Tunnel web page.
2. Select a tunnel number at the top of the page.
3. Select Connect Mode.  The Connect Mode page for the specific tunnel appears.
Figure 6-15  Tunnel 1 - Connect

6: Line and Tunnel Settings
MatchPort® AR Embedded Device Server User Guide 48
4. Enter or modify the following settings:
Table 6-16  Tunnel Connect Mode
Tunnel – Connect Mode 
Settings
Description
Mode Select the method to be used to attempt a connection to a remote host or 
device. Choices are:
Always = a connection is attempted until one is made. If the connection gets 
disconnected, the MatchPort AR embedded device server retries until it 
makes a connection. (default)
Disable = an outgoing connection is never attempted. 
Any Character = a connection is attempted when any character is read on 
the serial line.
Start Character = a connection is attempted when the start character for the 
specific tunnel is read on the serial line.
Modem Control Asserted = a connection is attempted as long as the 
Modem Control pin (DSR) is asserted, until a connection is made. 
Modem Emulation = a connection is attempted when triggered by modem 
emulation AT commands.
Local Port Enter the port for use as the local port. A random port is selected by default. 
Once you have configured a number, click the Random link in the Current 
Configuration to switch back to random.
Host
Note: If security is a 
concern, it is highly 
recommended that SSH 
be used. When using SSH, 
both the SSH Server Host 
Keys and SSH Server 
Authorized Users must be 
configured.
Click <None> in the Host field to configure the Host parameters.
Address = Enter the remote Host Address as an IP address or DNS name. It 
designates the address of the remote host to connect to.  Displays configured 
IP address or DNS address.
Port = Enter the port for use as the Host Port. It designates the port on the 
remote host to connect to.  Displays configured Port.
Protocol = Select the protocol type for use with Connect Mode. The default 
protocol is TCP. Additional fields may need to be completed depending on 
protocol chosen for the host:
For SSH, also enter an SSH Username. 
For SSL, also select Enabled or Disabled for Validate Certificate. 
For SSL, TCP, TCP AES and Telnet, use the TCP Keep Alive field to 
adjust the value.
For TCP AES, enter the AES Encrypt and AES Decrypt Keys.  Both of 
keys may be set to the same value.
For UDP, there are no additional fields to complete.  In this mode, the 
device accepts packets from any device on the network and sends 
packets to the last device that sent it packets.
For UDP AES, enter the AES Encrypt and AES Decrypt Keys.
SSH Username = Displays configured username, used only if SSH protocol 
is selected.
TCP Keep Alive =  Default is 45000 milliseconds.  Enter zero to disable and 
blank the value to restore the default.
AES Encrypt/Decrypt Key = Displays presence of key, used only if protocol 
with AES is selected.

6: Line and Tunnel Settings
MatchPort® AR Embedded Device Server User Guide 49
5. Click Submit.  The host is configured.Repeat these steps to configure additional hosts as 
necessary.  MatchPort AR supports configuration of up to sixteen hosts.
Reconnect Timer Enter the reconnect time in milliseconds. The device attempts to reconnect after 
this amount of time after failing a connection or exiting an existing connection. 
This behavior depends upon the Disconnect Mode.
Note:
When you configure Tunnel - Connect Mode, you can specify a number 
of milliseconds to attempt  to reconnect after a dropped connection has 
occurred. The default is 1500 milliseconds. 
The Reconnect Timer only applies if a Disconnect Mode is configured. 
With a Disconnect Mode set, the device server maintains a connection 
until the disconnect mode condition is met (at which time the device server 
closes the connection). If the tunnel is dropped due to conditions beyond 
the device server, the device server attempts to re-establish a failed 
connection when the specified reconnect interval reaches its limit.
Any network-side disconnect is considered an error and a reconnect is 
attempted without regard to the Connect Mode settings. Simultaneous 
Connect Mode connections require some Disconnect Mode 
configurations or the connections will never terminate. See Tunnel – 
Disconnect Mode on page 50 for more information about the parameters.
If Disconnect Mode is disabled and the network connection is dropped, 
then the re-establishment of a tunnel connection is governed by the 
configured Connect Mode settings. 
Flush Serial Data Select whether to flush the serial line when a connection is made. Choices are:
Enabled = flush the serial line when a connection is made.
Disabled = do not flush the serial line. (default)
Block Serial Select Enabled to block (not tunnel) serial data transmitted to the device. This 
is a debugging tool that causes serial data sent to the device to be ignored. 
Block Network Select Enabled to block (not tunnel) network data transmitted to the device.  
This is a debugging tool that causes network data sent to the device to be 
ignored. 
Email on Connect Select whether the device sends an email when a connection is made. Select 
None if you do not want to send an email. Otherwise, select the Email profile to 
use.
Email on Disconnect Select whether the device sends an email when a connection is closed. Select 
None if you do not want to send an email. Otherwise, select the Email profile to 
use.
CP Output Identifies a CP or CP Group whose value should change when a connection is 
established and when it is dropped.
Connection value—Specifies the value to set the CP Group to when a 
connection is established.
Disconnection value—Specifies the value to set the CP Group to when the 
connection is closed.
Tunnel – Connect Mode 
Settings (continued)
Description
 Tunnel 1 Tunnel 2
 
 
Sta .3 Serial Settings Packing Mode
Amapl Mud: \ Canned Made Discnnnzcl Made
Mndem Emulalinn
Tunnel 2 - Connect Mode
Made: \Dlsable v
anal Pom
H0511:
 
 
 
Tunnel 1 Tunnel 2
 
 
Sta .3 Serial Settings Packing Mode
Amapl Mud: \ Canned Made Discnnnzcl Made
Mndem Emulalinn
Tunnel 2 - Connect Mode
Made: \Dlsable v
anal Pom
H0511: 6: Line and Tunnel Settings
MatchPort® AR Embedded Device Server User Guide 50
Connecting Multiple Hosts
If more than one host is 
configured, a Host Mode option 
appears. Host Mode controls 
how multiple hosts will be 
accessed. For MatchPort AR 
embedded device server, the 
Connect Mode supports up to 
sixteen Hosts. Hosts may be 
accessed sequentially or 
simultaneously:
Sequential – Sequential 
host lists establish a 
prioritized list of tunnels. 
The host specified as Host 
1 will be attempted first. If 
that fails, it will proceed to 
Host 2, 3, etc, in the order 
they are specified. When a 
connection drops, the cycle 
starts again with Host 1 and 
proceeds in order. 
Establishing the host order 
is accomplished with host 
list promotion (see Host List 
Promotion on page 50). 
Sequential is the default 
Host Mode.  
Simultaneous – A tunnel will connect to all hosts accepting a connection.  Connections occur 
at the same time to all listed hosts.  The device can support a maximum of 64 total aggregate 
connections.
Host List Promotion
This feature allows Host IP promotion of individual hosts in the overall sequence.
To promote a specific Host:
1. Click the   icon in the desired Host field, for example Host 2 and Host 3. 
2. The selected Host(s) exchanges its place with the Host above it.
3. Click Submit. The hosts change sequence.
Tunnel – Disconnect Mode
Relates to the disconnection of a specific tunnel.  Disconnect Mode ends Accept Mode and 
Connect Mode connections. When disconnecting, the  MatchPort AR unit shuts down the specific 
tunnel connection gracefully.
The following settings end a specific tunnel connection:
The  MatchPort AR embedded device server receives the stop character.
Figure 6-17  Host 1, Host 2, Host 3 Exchanged
 Tunnel 1 Tunnel 2 Tunnel 3 Tunnel 4
 
Slalis1ics Selinl Sailings Packing Moxie
Accept Motle Connen Mmle Disconnect Motle
Modem Elnlllalion
Tunnel 1 - Disconnect Mode
 
Slop Clmmclel: (Nana)
Modem Liolmol: OEnamed ’c Dvsab‘ed
Timeou. n mnhsecunds
Flush Selinl Data: OEnamed <~> Dvsamed
 
 
 
~>
 
 
Tunnel 1 Tunnel 2 Tunnel 3 Tunnel 4
 
Slalis1ics Selinl Sailings Packing Moxie
Accept Motle Connen Mmle Disconnect Motle
Modem Elnlllalion
Tunnel 1 - Disconnect Mode
 
Slop Clmmclel: (Nana)
Modem Liolmol: OEnamed ’c Dvsab‘ed
Timeou. n mnhsecunds
Flush Selinl Data: OEnamed <~> Dvsamed
 
 
 
~>6: Line and Tunnel Settings
MatchPort® AR Embedded Device Server User Guide 51
The timeout period has elapsed and no activity is going in or out of the  MatchPort AR device. 
Both Accept Mode and Connect Mode must be idle for the time frame.
The  MatchPort AR unit observes the modem control inactive setting.
Note: To clear data out of the serial buffers upon a disconnect, enable “Flush Serial Data”.
To configure the Disconnect Mode for a specific tunnel:
1. Select Tunnel on the menu bar, if you are not already in the Tunnel web page.
2. Select a tunnel number at the top of the page.
3. Select Disconnect Mode.  The specific tunnel Disconnect Mode page appears.
Note: Lines 3 and 4 do not apply for MatchPort AR embedded device server.
Figure 6-18  Tunnel 1 Disconnect Mode
4. Enter or modify the following settings:
Table 6-19  Tunnel Disconnect Mode
5. Click Submit. 
6. Repeat above steps as desired, according to additional tunnel(s) available on your product.
Tunnel – Disconnect 
Mode Settings
Description
Stop Character  Enter the stop character in ASCII, hexadecimal, or decimal notation. 
Select <None> to disable.
Modem Control Select Enabled to disconnect when the modem control pin is not 
asserted on the serial line.
Timeout Enter a time, in milliseconds, for the device to disconnect on a Timeout. 
The value 0 (zero) disables the idle timeout.
Flush Serial Data Select Enabled to flush the serial data buffer on a disconnection.

6: Line and Tunnel Settings
MatchPort® AR Embedded Device Server User Guide 52
Tunnel – Modem Emulation
A tunnel in Connect Mode can be initiated using modem commands incoming from the Serial Line. 
This page enables you to configure the modem emulation settings when you select Modem 
Emulation as the Tunnel Connect Mode type.The Modem Emulation Command Mode supports the 
standard AT command set. For a list of available commands from the serial or Telnet login, enter 
AT?. Use ATDT, ATD, and ATDP to establish a connection. All of these commands behave like a 
modem. For commands that are valid but not applicable to the  MatchPort AR embedded device 
server, an “OK” message is sent (but the command is silently ignored).
The  MatchPort AR unit attempts to make a Command Mode connection as per the IP/DNS/port 
numbers defined in Connect Mode. It is possible to override the remote address, as well as the 
remote port number.
The following table lists and describes the available commands.
Table 6-20  Modem Emulation Commands and Descriptions
Command Description
+++  Switches to Command Mode if entered from serial port during connection.
AT? Help.
ATDT<Address Info> Establishes the TCP connection to socket (<ipaddress>:<port>).
ATDP<Address Info> See ATDT.
ATD Like ATDT. Dials default Connect Mode remote address and port.
ATD<Address Info> Sets up a TCP connection. A value of 0 begins a command line interface 
session.
ATO Switches to data mode if connection still exists. Vice versa to '+++'.
ATEn Switches echo in Command Mode (off - 0, on - 1).
ATH Disconnects the network session.
ATI Shows modem information.
ATQn Quiet mode (0 - enable results code, 1 - disable results code.)
ATVn Verbose mode (0 - numeric result codes, 1 - text result codes.)
ATXn Command does nothing and returns OK status.
ATUn Accept unknown commands. (n value of 0 = off. n value of 1 = on.)
AT&V Display current and saved settings.
AT&F Reset settings in NVR to factory defaults.
AT&W Save active settings to NVR.
ATZ Restores the current state from the setup settings.
ATS0=n Accept incoming connection. 
N value of 0—Disable
N value of 1—Connect automatically
N value of 2+—Connect with ATA command.
ATA Answer incoming connection (if ATS0 is 2 or greater).
A/  Repeat last valid command.
 Stalistils
Ancepl Mode
Tunnel1 Tunnel 2
Serial swings Fucking Mode
Cnnnec! Made Discunllen Mode
Mndem Emulalinn \
Tunnel 2 - Modem Emulation
 
WARN‘NG Tunne‘ Cunnect Made ‘5 null "Modem Emu‘atlun"
Echn Pluses:
Enhn Cummands:
Velbuse Response:
Response Type:
Error Unknown
Cummands:
Incnming Cunneflinn:
Cunnm Slring:
Display Remme IF:
Conflgumion
OEnablEd @Dlsablsd
®Enablsd ODIsabIEd
@Enablsd ODIsabIEd
@Texl
ONumenc
OEnablEd ®Dlsablsd
@DISab‘ed
OAulomalIc
OManuaI
OEnanIed @ Dlsanled
Enib‘ed
Enib‘ed
Text
Dwsahled
Dwsahlsd
 
 
 
 
Stalistils
Ancepl Mode
Tunnel1 Tunnel 2
Serial swings Fucking Mode
Cnnnec! Made Discunllen Mode
Mndem Emulalinn \
Tunnel 2 - Modem Emulation
 
WARN‘NG Tunne‘ Cunnect Made ‘5 null "Modem Emu‘atlun"
Echn Pluses:
Enhn Cummands:
Velbuse Response:
Response Type:
Error Unknown
Cummands:
Incnming Cunneflinn:
Cunnm Slring:
Display Remme IF:
Conflgumion
OEnablEd @Dlsablsd
®Enablsd ODIsabIEd
@Enablsd ODIsabIEd
@Texl
ONumenc
OEnablEd ®Dlsablsd
@DISab‘ed
OAulomalIc
OManuaI
OEnanIed @ Dlsanled
Enib‘ed
Enib‘ed
Text
Dwsahled
Dwsahlsd
 
 
 
6: Line and Tunnel Settings
MatchPort® AR Embedded Device Server User Guide 53
For commands that can take address information (ATD, ATDT, ATDP), the destination address 
can be specified by entering the IP Address, or entering the IP Address and port number. For 
example, <ipaddress>:<port>. The port number cannot be entered on its own.
For ATDT and ATDP commands less than 255 characters, the  MatchPort AR replaces the last 
segment of the IP address with the configured Connect Mode remote station address. It is possible 
to use the last two segments also, if they are under 255 characters. For example, if the address is 
100.255.15.5, entering ATDT 16.6 results in 100.255.16.6.
When using ATDT and ATDP, enter 0.0.0.0 to switch to the Command Line Interface (CLI). Once 
the CLI is exited by using the CLI exit command, the  MatchPort AR embedded device server 
reverts to modem emulation mode. By default, the +++ characters are not passed through the 
connection. Turn on this capability using the modem echo pluses command.
To configure modem emulation for a specific tunnel:
1. Select Tunnel on the menu bar, if you are not already in the Tunnel web page.
2. Select a tunnel number at the top of the page.
3. Select Modem Emulation. The Modem Emulation page for the specific tunnel appears.
Figure 6-21  Tunnel 1 Modem Emulation
4. Enter or modify the following settings:

6: Line and Tunnel Settings
MatchPort® AR Embedded Device Server User Guide 54
Table 6-22  Tunnel Modem Emulation
5. Click Submit.
6. Repeat above steps as desired, according to additional tunnel(s) available on your product.
Tunnel- Modem 
Emulation Settings
Description
Echo Pluses Select Enabled to echo +++ when entering modem Command Mode.
Echo Commands Select Enabled to echo the modem commands to the console.
Verbose Response  Select Enabled to send modem response codes out on the serial line.
Response Type Select the type of response code: Text or Numeric. 
Error Unknown 
Commands
Select whether an ERROR or OK response is sent in reply to unrecognized AT 
commands. Choices are:
Enabled = ERROR is returned for unrecognized AT commands.
Disabled = OK is returned for unrecognized AT commands. Default is 
Disabled.
Incoming Connection Select whether Incoming Connection requests will be disabled, answered 
automatically, or answered manually. Default is Disabled.
Connect String Enter the connect string. This modem initialization string prepares the modem for 
communications. It is a customized string sent with the “CONNECT” modem 
response code. 
Display Remote IP Selects whether the incoming RING sent on the Serial Line is followed by the IP 
address of the caller. Default is Disabled.
 Network Line1 LineZ
 
Configulalion
Terminal on Network - Configuration
Teimlnal Type: UNKNOWN
Lnain Cnnnm Menu: 0 Enabied ®D|sahled
EinCunnm Menu: OEnabied @Dlsahled
Echu: @Enamzd ODIsahled
Network Line1 LineZ
 
Configulalion
Terminal on Network - Configuration
Teimlnal Type: UNKNOWN
Lnain Cnnnm Menu: 0 Enabied ®D|sahled
EinCunnm Menu: OEnabied @Dlsahled
Echu: @Enamzd ODIsahled
 
 
 
MatchPort® AR Embedded Device Server User Guide 55
7: Terminal and Host Settings
This chapter describes how to view and configure the Terminal Login Connect Menu and 
associated Host configuration. It contains the following sections:
 Terminal Settings
 Host Configuration
The Terminal Login Connect Menu feature allows the MatchPort AR embedded device server to 
present a menu of predefined connections when the device is accessed via telnet, ssh, or a serial 
port. From the menu, a user can choose one of the presented options and the device automatically 
makes the predefined connection.
The Terminal page controls whether a Telnet, SSH, or serial port connection presents the CLI or 
the Login Connect Menu. By default, the CLI is presented when the device is accessed. When 
configured to present the Login Connect Menu, the hosts configured via the Hosts page, and 
named serial lines are presented.
Terminal Settings
This page shows configuration settings for each terminal connection method.  You can configure 
whether each serial line or the telnet/SSH server presents a CLI or a Login Connect menu when a 
connection is made.
Network Terminal Configuration
To configure menu features applicable to CLI access via the network:
1. Select Terminal on the menu bar, if you are not already in the Terminal web page.
2. Select Network at the top of the page. The Configuration submenu is automatically selected. 
The Terminal Configuration page appears for the network.
Figure 7-1  Terminal on Network Configuration
3. Enter or modify the following settings:
 Terminal Type:
Exil Cnnnzfl Menu:
Send Bleak:
Bmak Durzlinn:
Echu:
 
Lugin Cnnnecl Menu:
Network LineI lineZ
Configuration
Terminal on Line 1 - Configuration
UNKNOWN
0 Enabied G Dlsabied
O Enabied Q Disabied
(Nana) i
am ‘mliliSEcunds
(9Enabiad C Dlsabied
 
 
Terminal Type:
Exil Cnnnzfl Menu:
Send Bleak:
Bmak Durzlinn:
Echu:
 
Lugin Cnnnecl Menu:
Network LineI lineZ
Configuration
Terminal on Line 1 - Configuration
UNKNOWN
0 Enabied G Dlsabied
O Enabied Q Disabied
(Nana) i
am ‘mliliSEcunds
(9Enabiad C Dlsabied
 
 
7: Terminal and Host Settings
MatchPort® AR Embedded Device Server User Guide 56
Table 7-2  Terminal on Network Configuration
4. Click Submit to save changes.
Line Terminal Configuration
To configure a specific line to support an attached terminal: 
1. Select Terminal on the menu bar.  The Terminal web page appears.
2. Select the line number at the top of the page connected to the terminal you want to configure. 
The default is Line 1.
Figure 7-3   Terminal on Line Configuration
3. Enter or modify the following settings:
Terminal on Network 
Configuration Settings
Description
Terminal Type Enter text to describe the type of terminal. The text will be sent to a host via IAC. 
Note: IAC means, “interpret as command.” It is a way to send commands over 
the network such as send break or start echoing.
Login Connect Menu Select the interface to display when the user logs in. Choices are:
Enabled = shows the Login Connect Menu. 
Disabled = shows the CLI
Exit Connect Menu Select whether to display a choice for the user to exit the Login Connect Menu 
and reach the CLI. Choices are:
Enabled = a choice allows the user to exit to the CLI.
Disabled = there is no exit to the CLI.
Echo Applies only to Connect Mode Telnet connections, not to Accept Mode. Only 
disable Echo if your terminal echoes, in which case you will see double of each 
character typed.

7: Terminal and Host Settings
MatchPort® AR Embedded Device Server User Guide 57
Table 7-4  Terminal on Line 1 Configuration
4. Click Submit to save changes.
5. Repeat above steps as desired, according to the additional line(s) available on your product.
Host Configuration
This Host web page is where you may view and modify current settings for a selected remote host.  
To configure a selected remote host:
1. Select Host on the menu bar.  The Host web page appears.
2. Select a specific host number at the top of the page.  The Host Configuration page for the 
selected host appears. 
Note: Number of hosts available differ among Lantronix products.  Hosts available for 
selection may appear listed on the screen (see Figure 7-5) or within a drop-down menu 
above the Configuration button. 
Terminal on Line 
Configuration Settings
Description
Terminal Type Enter text to describe the type of terminal. The text will be sent to a host via IAC. 
Note: IAC means, “interpret as command.” It is a way to send commands over 
the network such as send break or start echoing.
Login Connect Menu Select the interface to display when the user logs in. Choices are:
Enabled = shows the Login Connect Menu. 
Disabled = shows the CLI
Exit Connect Menu Select whether to display a choice for the user to exit the Login Connect Menu 
and reach the CLI. Choices are:
Enabled = a choice allows the user to exit to the CLI.
Disabled = there is no exit to the CLI.
Send Break Enter a Send Break control character, e.g., <control> Y, or blank to disable.
When the Send Break control character is received from the network on its way 
to the serial line, it is not sent to the line; instead, the line output is forced to be 
inactive (the break condition). 
Break Duration Enter how long the break should last in milliseconds.
Echo Applies only to Connect Mode Telnet connections, not to Accept Mode. Only 
disable Echo if your terminal echoes, in which case you will see double of each 
character typed.
 H0511 H0512 Hosll‘) Hosll
 
Name:
PIMDCDI:
Remole Pan:
 
Coungmmiou
Host 1 - Configuration
(“mm C SSH
Remote AIMIQ§Z
 
 
H0511 H0512 Hosll‘) Hosll
 
Name:
PIMDCDI:
Remole Pan:
 
Coungmmiou
Host 1 - Configuration
(“mm C SSH
Remote AIMIQ§Z
 
 
 
 
 
 
 
 
7: Terminal and Host Settings
MatchPort® AR Embedded Device Server User Guide 58
Figure 7-5  Host Configuration
3. Enter or modify the following settings:
Table 7-6  Host Configuration
4. Click Submit to save changes.
5. Repeat above steps as desired, according to additional host(s) available on your product.
Host Settings Description
Name Enter a name for the host. This name appears on the Login Connect 
Menu. To leave a host out of the menu, leave this field blank. 
Protocol Select the protocol to use to connect to the host. Choices are:
Telnet 
SSH 
Note: SSH keys must be loaded or created on the SSH page for the 
SSH protocol to work.
SSH Username Appears if you selected SSH as the protocol. Enter a username to 
select a pre-configured Username/Password/Key (configured on the 
SSH: Client Users page), or leave it blank to be prompted for a 
username and password at connect time.
Remote Address Enter an IP address for the host to which the device will connect. 
Remote Port Enter the port on the host to which the device will connect.

 MatchPort® AR Embedded Device Server User Guide 59
8: Configurable Pin Manager
The Configurable Pin Manager is responsible for assignment and control of the configurable pins 
(CPs) available on the  MatchPort AR embedded device server. There are seven configurable pins 
on the MatchPort AR unit.
You can configure the CPs by making them part of a group.  A CP Group may consist of one or 
more CPs. This increases flexibility when incorporating the MatchPort AR embedded device 
server into another system. 
This chapter contains the following sections:
Overview
CPM: CP (Configurable Pins)
CPM: Groups
Overview
Each CP is associated with an external hardware pin. CPs can be configured and used as digital 
inputs or outputs.
When used as input, device functionality can be triggered based on the state of a CP. For 
example, an email can be sent when a CP is asserted to a preconfigured level. When used as an 
output, logic levels of the CP can be manipulated when a preconfigured event occurs on the 
device server, such as when a tunnel connection is accepted.
CPs are configured and manipulated within a group. Each group is named and is referenced in the 
feature that is triggering a CP or being triggered by a CP. Sophisticated use of CPs can be 
accommodated by adding more than one CP into a group.  
Default Groups
MatchPort AR unit has several predefined CP groups used to assign a CP to a needed function. 
For instance, when working with an RS485 driver that requires a signal to be asserted when in 
half–duplex mode, the CP that is driving that signal (chosen by the engineer designing the circuit) 
is added to the default group named Line1_RS485_HDpx. The MatchPort AR device asserts the 
CP at the correct time via the default group. 
Custom Groups
The email, tunneling, and CLI features can interact with CPs. This is accomplished by creating a 
custom group and adding CPs of your choice into that group. Once a CP group is created and 
populated with one or more CPs, actions can be triggered when the CPs match a specified value. 
CPs can be placed in any bit position within a group, allowing for sophisticated use of the available 
CPs.
CPM: CP (Configurable Pins)
Each CP is associated with an external hardware pin. CPs can trigger an outside event, like 
sending an email message or starting Command Mode on a serial Line.
 em.—
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
CPM: CPs
Currant Configuraflon
F113 Inpul <3val|ab|e>
PMS Input
 
 
 
 
 
em.—
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
CPM: CPs
Currant Configuraflon
F113 Inpul <3val|ab|e>
PMS Input 8: Configurable Pin Manager
 MatchPort® AR Embedded Device Server User Guide 60
The CPM web page is used to experimentally configure the state of the CPs. CPs can be changed 
to be a digital input or a digital output, and whether it is asserted high or low. Changes made on 
this page do not -persist through a reboot.
Rules for configuring a CP are as follows. A CP:
Can be in any number of groups.
Can be only in one active group. Two groups with the same CP cannot be enabled at the 
same time.
Becomes locked and is not configurable if it is in an enabled group. Disable the group to 
change the CP configuration.
When you are ready to permanently configure the CPs, use the CPM Groups web page. See 
CPM: Groups on page 62.
View CPs
1. Select CPM on the menu bar and then CPs at the top of the page. The CPM: CPs page 
appears.
Figure 8-1  CPM: CPs
The Current Configuration table shows the current settings for each CP.

8: Configurable Pin Manager
 MatchPort® AR Embedded Device Server User Guide 61
Table 8-2  CPM CPs Current Configuration
2. Select a CP number (CP column) in the Current Configuration table  to display the status of 
that pin. The CP Status table shows the information about the CP.
Table 8-3  CPM CPs Status
Note: To modify a CP, all groups in which it is a member must be disabled.
To change a CP output value:
1. Select the CP number (in CP column) from the current configuration table.
2. Enter the CP value in the CP Status table.
3. Click Set. The changed CP value appears in the current configuration table.
CPM – CPs  Current 
Configuration
Description
CP Indicates the configurable pin number.
Ref Indicates the hardware pin number associated with the CP.
Configured As Shows the CP configuration. A CP configured as Input is set to read 
input. A CP configured as Output drives data out of the device.
Value Indicates the current status of the CP:
1 = asserted
0 = de-asserted
Inv = the CP logic is inverted
Groups Indicates the number of groups in which the CP is a member.
Active In Group Shows the group in which the CP is active. A CP can be a member of 
several groups. However, it may only be active in one group.
CPM – CPs Status Description
Name Shows the CP number.
State Shows the current enable state of the CP.
Type Indicates whether the CP is set for input or output.
Value Shows the last bit in the CP current value.
Bit Visual display of the 32 bit placeholders for a CP.
Level  A “+” symbol indicates the CP is asserted (the voltage is high). 
A “-“indicates the CP voltage is low.
I/O Indicates the current status of the pin:
I = input
O = output
<blank> = unassigned
Logic An “I” indicates the CP is inverted.
Binary Shows the assertion value of the corresponding bit.
CP# Shows the CP number.
Groups Lists the groups in which the CP is a member.

8: Configurable Pin Manager
 MatchPort® AR Embedded Device Server User Guide 62
To change a CP configuration:
1. Select the CP number (in CP column) from the current configuration table.
2. Select the CP configuration from the Type drop-down list in the CP Status table.
3. (If necessary) Select the Assert Low checkbox.
4. Click Change.
Note: These changes to a CP are not saved in FLASH.  Instead, these settings are used 
when the CP is added to a CP Group.  When the CP Group is saved, its CP settings are 
saved with it.  Thus, a particular CP may be defined as “Input” in one group but as 
“Output” in another.  Only one group containing a particular CP may be enabled at once.
CPM: Groups
The CP Groups page allows for the adding, removing and managing of CP groups. Groups can be 
created or deleted. CPs can be added to or removed from groups.  A group, based on its state, 
can trigger outside events such as sending email messages. Only an enabled group can be a 
trigger.
View Groups
1. Select CPM on the menu bar and then Groups at the top of the page. The CPM: Groups page 
appears.
Figure 8-4  CPM: Groups
2. The Current Configuration table shows the current settings for each CP group.
Table 8-5  CPM Groups Current Configuration
CPM – Groups Current 
Configuration
Description
Group (Name) Shows the CP group’s name.
State Indicates whether the group is enabled or disabled.
CP Info Indicates the number of CPs assigned to this particular group.
 cps Groups
CPM: Groups
Current Configuration
Gruup Name sme CP Inln
1 Enamw u cps Asmgned
120 Disablad 2 on; Assgnad
Lme‘LMudemictUn Disabled 0 cps Ass1gned
L1n21_Mnd2m_Ct\_O Disablsd 0 CF; Ass1gn2d
LmeLPSABSiHDpx Enameu 1 CF Asmgned
Lmz1j$485§s1m Enema 1 CF Asmgnzd
LmeLMademictUn Disabled 0 CF; Awgned
Lme2_Mudem_CH_O Disabled 0 cps Asmgned
MudbugCtUn Disablad n on; Agsgnad
MndbusictLOul Disabled 0 cps Ass1gned
umput Enema 1 CF Asmgnzd
(3mm Gmup:
Group Status
Nam: LineLMndemicflio
meameu AND Locket
5‘" usev may Enab‘e/Dsable avAdd/Remave CF
 
Value Dwamed
an s 5 A 3 2 1 n
Level
l/O
Luaic
Einaly 1 1 1 1 1 1 1
cm
 
0P1 v athit u v as 1nput v DAssen Luw
 
 
 
cps Groups
CPM: Groups
Current Configuration
Gruup Name sme CP Inln
1 Enamw u cps Asmgned
120 Disablad 2 on; Assgnad
Lme‘LMudemictUn Disabled 0 cps Ass1gned
L1n21_Mnd2m_Ct\_O Disablsd 0 CF; Ass1gn2d
LmeLPSABSiHDpx Enameu 1 CF Asmgned
Lmz1j$485§s1m Enema 1 CF Asmgnzd
LmeLMademictUn Disabled 0 CF; Awgned
Lme2_Mudem_CH_O Disabled 0 cps Asmgned
MudbugCtUn Disablad n on; Agsgnad
MndbusictLOul Disabled 0 cps Ass1gned
umput Enema 1 CF Asmgnzd
(3mm Gmup:
Group Status
Nam: LineLMndemicflio
meameu AND Locket
5‘" usev may Enab‘e/Dsable avAdd/Remave CF
 
Value Dwamed
an s 5 A 3 2 1 n
Level
l/O
Luaic
Einaly 1 1 1 1 1 1 1
cm
 
0P1 v athit u v as 1nput v DAssen Luw
 
 
 
8: Configurable Pin Manager
 MatchPort® AR Embedded Device Server User Guide 63
To display the status of a 
specific group:
1. Select CPM > Groups.
2. Select the CP group name in 
the Current Configuration 
table. 
Table 8-7  Group Status
CPM – Groups Page 
Group Status
Description
Name Shows the CP Group name.
State Shows the current state of the CP group. Locked groups are Lantronix 
default groups and cannot be deleted. Use the button in this field to 
enable or disable the group.
Value Shows the CP group’s current value.
Figure 8-6  CPM: Group Status

8: Configurable Pin Manager
 MatchPort® AR Embedded Device Server User Guide 64
To create a custom CP group:
1. Select CPM > Groups. 
2. Enter a group name in the Create Group field.
3. Click Submit.
To add a CP to a Group
1. Select CPM > Groups.
2. Select a specific Group Name to select it.  The Group Status information for the group 
appears in a table below the current configuration.
3. Select a CP from the drop-down list. beneath the Group Status table.  
4. Select a bit position from the drop-down list.
5. Select Input or Output from the drop-down list.
6. Check the Assert Low checkbox to specify negative logic (inverted assertion), as desired.  
This box is unchecked by default.
7. Click Add to complete adding the CP to the group.
To delete a custom CP group:
1. Select CPM > Groups.
2. Select a custom CP Group Name from the drop-down list beside the current configuration 
table.
3. Click the red X next to the corresponding Name in the Group Status table. 
To enable or disable a CP group:
1. Select CPM > Groups.
2. Select the Group name in the table representing the group you wish to enable.  The Group 
Status information for this group appears in a table below.
3. Click Enable to enable, as appropriate.
4. Click Disable to disable, as appropriate.
Bit Displays the individual bit positions for the available CPs.
Level Indicates the voltage level of the CP. A plus sign (+) indicates the CP bit 
is asserted (the voltage is high). A minus sign (-) indicates the CP 
voltage is low.
I/O Indicates the current status of the pin:
I = input
O = output
<blank> = unassigned
Logic Indicates the logic level of the CP.  An "I" indicates the CP  is inverted.  
A blank field indicates that the CP is not inverted.
Binary Shows the assertion value of the corresponding bit.  An X means that 
the group is disabled or the bit is unassigned in the group
CP# Shows the configurable pin number and its bit position in the CP group.
CPM – Groups Page 
Group Status 
Description

8: Configurable Pin Manager
 MatchPort® AR Embedded Device Server User Guide 65
To set a CP group’s value:
1. Create a custom group and add a CP to it.
2. Select CPM > Groups.
3. Select the custom group from the current configuration table.
4. Enter a Group Status Value.
5. Click Set.
To remove a CP from a Group:
1. Select CPM > Groups.
2. Select a the group in the Group Name column that contains the CP to be removed. 
3. Select the CP from the drop-down list beside the Remove button.
4. Click Remove. 
 DNS
Domaln: ang Iammmx cnm
Plimaly nus: 172.191 1 (DHCF)
Secondary nus: 172 1a 1 2 (won)
DNS
Domaln: ang Iammmx cnm
Plimaly nus: 172.191 1 (DHCF)
Secondary nus: 172 1a 1 2 (won)
 
 
 
 
 
 
 
 
 
 
MatchPort® AR Embedded Device Server User Guide 66
9: Service Settings
This chapter describes the available services and how to configure each. It contains the following 
sections:
 DNS Settings
 Point-to-Point (PPP) Settings 
 SNMP Settings
 FTP Settings 
 TFTP Settings 
 Syslog Settings
 HTTP Settings
 RSS Settings
 LPD Settings
DNS Settings
The primary and secondary domain name system (DNS) addresses come from the active 
interface. The static addresses from the Network Interface Configuration page may be overridden 
by DHCP or BOOTP. The DNS web page enables you to view the status and cache.
When a DNS name is resolved using a forward lookup, the results are stored in the DNS cache 
temporarily. The MatchPort AR checks this cache when performing forward lookups. Each item in 
the cache eventually times out and is removed automatically after a certain period, or you can 
delete it manually.
To view the DNS status:
1. Select DNS on the menu bar. The DNS page appears. 
Figure 9-1  DNS Settings

9: Service Settings
MatchPort® AR Embedded Device Server User Guide 67
To find a DNS Name or IP Address:
1. Enter either a DNS name or an IP address.
2. Click Lookup.  
-When a DNS name is resolved, the results appear in the DNS cache.
-When an IP address is resolved, the results appear in a text below the Lookup field.
To clear cache entries:
1. Click Remove All to remove all listed cache entries.
2. Click Delete next to a specirfic cache entry to remove only that one.
Point-to-Point (PPP) Settings
Point-to-Point Protocol establishes a direct connection between two nodes. It defines a method for 
data link connectivity between devices using physical layers (such as serial lines).
The MatchPort AR device server supports two types of PPP authentication: Password 
Authentication Protocol (PAP) and Challenge Handshake Authentication Protocol (CHAP). Both of 
these authentication methods require the configuration of a username and password.  The 
MatchPort AR embedded device server also supports the authentication scheme of “None” when 
no authentication is required during link negotation.
PAP authentication offers a straightforward method for the peer to determine its identity. Upon the 
link establishment, the user ID and password are repeatedly sent to the authenticator until it is 
acknowledged or the connection is terminated. However, PAP is not a strong authentication 
process. There is no protection against trial-and-error attacks. The peer is responsible for the 
frequency of the authentication communication attempts.
CHAP is a more secure method than PAP. It works by sending a challenge message to the 
connection requestor. Using a one-way hash function, the requestor responds with its value. If the 
value matches the server’s own calculations, authentication is provided. Otherwise, the connection 
is terminated.
Note: RFC1334 defines both CHAP and PAP.
The MatchPort AR embedded device server also supports authentication scheme of “None” when 
no authentication is required during link negotiation.
Since the MatchPort AR unit does not support Network Address and Port Translation (NAPT), 
static routing table entries must be added to the serial-side and network-side devices (both of 
which are external devices). 
Use the MatchPort AR Web Manager or CLI to configure a network link using PPP over a serial 
line. Turn off Connect Mode, Accept Mode, and Command mode before enabling PPP. The  
device acts as the server side of the PPP link; it can require authentication and assign an IP 
address to the peer. Upon PPP configuration, IP packets are routed between Ethernet and PPP 
interfaces. 
Note: The MatchPort AR embedded device server does not perform network address 
translation (NAT) between the serial-side network interface and the Ethernet/WLAN 
network interface. Therefore, to pass packets through the  unit, a static route must be 
configured on both the PPP Peer device and the remote device it wishes to communicate 
 Line1 linEZ
 
Cunligumtinn
PPP on Line 1 - Configuration
WARN‘NG Swa‘ pmlum‘ ‘9 not PPP
Local IP Addless: (None)
Peer IP Address: (None) \
C None (9 PAP O CHAP
Aulhenlicntinn Mada: C MSVCHAP O MSVCHAPVZ
Usemame:
Pawuld: (None)
 
 
 
Line1 linEZ
 
Cunligumtinn
PPP on Line 1 - Configuration
WARN‘NG Swa‘ pmlum‘ ‘9 not PPP
Local IP Addless: (None)
Peer IP Address: (None) \
C None (9 PAP O CHAP
Aulhenlicntinn Mada: C MSVCHAP O MSVCHAPVZ
Usemame:
Pawuld: (None)
 
 
 
9: Service Settings
MatchPort® AR Embedded Device Server User Guide 68
with. The static route in the PPP Peer device must use the PPP Local IP Address as its 
gateway, and the static route in the remote device must use the network interface IP 
Address of the MatchPort AR embedded device server as its gateway.  
The following section describes the steps to configure PPP 1 (PPP on serial line 1); these steps 
also apply to any line instance of the device.  Since the MatchPort AR unit does not support NAPT 
(Network Address and Port Translation), static routing table entries must be added to both the 
serial-side and network-side devices (both of which are external to the MatchPort AR embedded 
device server).
To configure PPP:
1. Select PPP on the menu bar. The PPP web page appears.
2. Select a line number at the top of the page.  The PPP Configuration page for the selected line 
number appears. 
Figure 9-2  PPP Configuration Settings
3. Enter or modify the following settings:
Table 9-3  PPP Configuration
PPP Configuration Settings Description
Local IP Address Enter the IP address assigned to the device’s PPP interface.
Peer IP Address Enter the IP address assigned to the peer (when requested during 
negotiation).
 SNMP
Sldle:
Read Community:
Wlile Column
 
Sysleln Cnnmcl:
Sysmn Name:
 
Sysleln Des I 1i»
Sysleln Locar
 
Traps Slaw:
Traps Plillmry
Deslilmvimu:
Traps Secomlaly
Deslilmliun:
 
 
‘3‘ Enab‘zd C‘ Disablsd
 
 
SNMP
Sldle:
Read Community:
Wlile Column
 
Sysleln Cnnmcl:
Sysmn Name:
 
Sysleln Des I 1i»
Sysleln Locar
 
Traps Slaw:
Traps Plillmry
Deslilmvimu:
Traps Secomlaly
Deslilmliun:
 
 
‘3‘ Enab‘zd C‘ Disablsd
9: Service Settings
MatchPort® AR Embedded Device Server User Guide 69
4. Click Submit.
5. Repeat above steps as desired, according to additional line(s) available on your product.
SNMP Settings
Simple Network Management Protocol (SNMP) is a network management tool that monitors 
network devices for conditions that need attention. The SNMP service responds to SNMP 
requests and generates SNMP Traps.
This page is used to configure the SNMP agent. 
To configure SNMP:
1. Select SNMP on the menu bar. The SNMP page opens and shows the current SNMP 
configuration.
Figure 9-4  SNMP Configuration
Authentication Mode Choose the authentication mode:
None = no authentication is required
PAP = Password Authentication Protocol
CHAP = Challenge Handshake Authentication Protocol
MS-CHAP = Microsoft Challenge-Handshake Authentication Protocol
MS-CHAPV2 = Microsoft Challenge-Handshake Authentication Protocol 
Version 2
Username Enter a username if authentication is to be used on the PPP interface.  The 
peer must be configured to use the same username.
Password Enter a password if authentication is to be used on the PPP interface. The 
peer must be configured to use the same password.
PPP Configuration Settings  Description
Note: The system 
description string will 
reflect the specific 
Lantronix product.

9: Service Settings
MatchPort® AR Embedded Device Server User Guide 70
2. Enter or modify the following settings:
Table 9-5  SNMP
3. Click Submit.
SNMP Settings Description
State Select Enabled to enable SNMP.
Read Community Enter the SNMP read-only community string.
Write Community Enter the SNMP read/write community string.
System Contact Enter the name of the system contact. 
System Name Enter the system name.
System Description Enter the system description.
System Location Enter the system location.
Traps State Select Enabled to enable the transmission of SNMP Traps. 
The Cold Start trap is sent on device boot up, and the 
Linkdown trap is sent when the device is rebooted from 
software control.
Traps Primary Destination Enter the primary SNMP trap host.
Traps Secondary 
Destination
Enter the secondary SNMP trap host.
 FTP
Collflgnralloll
Sl-Ile:
Admin Usellmlue:
Admin Passwol
 
Slallstlts
Slams:
Conneclious Rejecled:
Aclive Conllecliolls:
Last Clienl:
 
Lonnecliolls Accepted:
(9 Enab‘ed 0‘ Disabled
Bdrm"
(Cnnhguretb
Rummy
u
u
0
Nu dawn: has connzclsd
 
 
FTP
Collflgnralloll
Sl-Ile:
Admin Usellmlue:
Admin Passwol
 
Slallstlts
Slams:
Conneclious Rejecled:
Aclive Conllecliolls:
Last Clienl:
 
Lonnecliolls Accepted:
(9 Enab‘ed 0‘ Disabled
Bdrm"
(Cnnhguretb
Rummy
u
u
0
Nu dawn: has connzclsd
 
 
9: Service Settings
MatchPort® AR Embedded Device Server User Guide 71
FTP Settings 
The FTP web page shows the current File Transfer Protocol (FTP) configuration and various 
statistics about the FTP server.
To configure FTP:
1. Select FTP on the menu bar. The FTP page opens to display the current configuration.
Figure 9-6  FTP Configuration
2. Enter or modify the following settings:
Table 9-7  FTP Settings
3. Click Submit.
FTP Settings Description
State Select Enabled to enable the FTP server.
Admin Username Enter the username to use when logging in via FTP.
Admin Password Enter the password to use when logging in via FTP.
 TFTP Server
Conngumlon
sme:
Allow File Clearioll:
Allow XCR Illlpolt:
Slalislics
Slams:
Files Downloaded:
Files Uploaded:
File Not Found Ennis:
File Read Ellols:
File Wlile Ellols:
Unknown EflfllS:
Lasl Clielll:
 
Allow FiIIIIw-lle U|Hlnle1
®Enabled C’Dvsahled
OEnabled @Dvsabled
OEnabled @Dvsabled
OEnabled @Dvsabled
Running
DGDDGD
Nu dewce has connected
 
 
TFTP Server
Conngumlon
sme:
Allow File Clearioll:
Allow XCR Illlpolt:
Slalislics
Slams:
Files Downloaded:
Files Uploaded:
File Not Found Ennis:
File Read Ellols:
File Wlile Ellols:
Unknown EflfllS:
Lasl Clielll:
 
Allow FiIIIIw-lle U|Hlnle1
®Enabled C’Dvsahled
OEnabled @Dvsabled
OEnabled @Dvsabled
OEnabled @Dvsabled
Running
DGDDGD
Nu dewce has connected
 
 
9: Service Settings
MatchPort® AR Embedded Device Server User Guide 72
TFTP Settings 
In the TFTP web page, you can configure the server and view the statistics about the Trivial File 
Transfer Protocol (TFTP) server.
To configure TFTP:
1. Select TFTP on the menu bar. The TFTP page opens to display the current configuration.
Figure 9-8  TFTP Configuration
2. Enter or modify the following settings:
Table 9-9  TFTP Server
3. Click Submit.
TFTP Settings Description
State Select Enabled to enable the TFTP server.
Allow TFTP File Creation Select whether to allow the creation of new files stored on the TFTP server.
Allow Firmware Update Specifies whether or not the TFTP Server is allowed to accept a firmware 
update for the device. An attempt to update firmware is recognized based on 
the name of the file. 
Note: TFTP cannot authenticate the client, so the device is open to 
malicious update.
Allow XCR Import Specifies whether the TFTP server is allowed to accept an XML configuration 
file for update. An attempt to import configuration is recognized based on the 
name of the file.
Note: TFTP cannot authenticate the client, so the device is open to 
malicious update.
 Syslog
Collfiglflalioll
sum:
"05!:
Lac-II Poll:
Relllole Poll:
Slflllfllfi
Status:
Messages Sent:
Mesmqes Failed:
 
Sevelily Log Level:
<-‘ enahlzd="" ostab‘ed="" 172153923="" 514="" \="" 5m="" \="" debug="" v="" runnlng="" 484="" el="">-‘>
 
 
Syslog
Collfiglflalioll
sum:
"05!:
Lac-II Poll:
Relllole Poll:
Slflllfllfi
Status:
Messages Sent:
Mesmqes Failed:
 
Sevelily Log Level:
<-‘ enahlzd="" ostab‘ed="" 172153923="" 514="" \="" 5m="" \="" debug="" v="" runnlng="" 484="" el="">-‘>9: Service Settings
MatchPort® AR Embedded Device Server User Guide 73
Syslog Settings
The Syslog web page shows the current configuration and statistics of the system log. Here you 
may configure the syslog destination and the severity of the events to log.
To configure the Syslog:
Note: The syslog file is always saved to local storage, but it is not retained through 
reboots. Saving the syslog file to a server that supports remote logging services (see RFC 
3164) allows the administrator to save the complete syslog history. The default port is 514.
1. Select Syslog on the menu bar. The Syslog page opens to display the current configuration.
Figure 9-10  Syslog
2. Enter or modify the following settings:
Table 9-11  Syslog
3. Click Submit.
Syslog Settings Description
State Select to enable or disable the syslog.
Host Enter the IP address of the remote server to which system logs are sent 
for storage.
Local Port Enter the number of the local port on the device from which system logs 
are sent.
Remote Port Enter the number of the port on the remote server that supports logging 
services. The default is 514.
Severity Log Level From the drop-down box, select the minimum level of system message 
the device should log. This setting applies to all syslog facilities. The 
drop-down list is in descending order of severity (e.g., Emergency is 
more severe than Alert.)
 Slalistics Collliglll dlioll Alllhelllicalioll
HTTP Statis ics
Rx Bers
Tx Byves
zoo . 0K
301 , Moved Permanently
mo . and Request
401 -Aulhmizalion Required
404 , Not Folllul
m . Request Tlmeoul
413 rRquIestTno Large
500 . lluelnal Ellol
5m rum Implememed
Slams Unknown
wm odeue Full
Socke! Enol
Memory Enol
Logs:
ZEZBS
138244
15
no
aoaaoaoao
42 enmes (5291 hytas) [V‘ew] [mead
 
 
 
Slalistics Collliglll dlioll Alllhelllicalioll
HTTP Statis ics
Rx Bers
Tx Byves
zoo . 0K
301 , Moved Permanently
mo . and Request
401 -Aulhmizalion Required
404 , Not Folllul
m . Request Tlmeoul
413 rRquIestTno Large
500 . lluelnal Ellol
5m rum Implememed
Slams Unknown
wm odeue Full
Socke! Enol
Memory Enol
Logs:
ZEZBS
138244
15
no
aoaaoaoao
42 enmes (5291 hytas) [V‘ew] [mead
 
 
 
9: Service Settings
MatchPort® AR Embedded Device Server User Guide 74
HTTP Settings
Hypertext Transfer Protocol (HTTP) is the transport protocol for communicating hypertext 
documents on the Internet. HTTP defines how messages are formatted and transmitted. It also 
defines the actions web servers and browsers should take in response to different commands.  
HTTP Authentication enables the requirement of usernames and passwords for access to the 
MatchPort AR device. 
This page has three links at the top for viewing statistics and for viewing and changing 
configuration and authentication settings.
 HTTP Statistics—Viewing statistics such as bytes received and transmitted, bad requests, 
authorizations required, etc.
 HTTP Configuration—Configuring and viewing the current configuration.
 HTTP Authentication—Configuring and viewing the authentication.
HTTP Statistics
To view HTTP statistics:
This page shows various statistics about the HTTP server. 
1. Select HTTP on the menu bar and then Statistics at the top of the page. The HTTP Statistics 
page appears.
Figure 9-12  HTTP Statistics
Note: The HTTP log is a scrolling log, with the last Max Log Entries cached and 
viewable. You can change the maximum number of entries that can be viewed on the 
HTTP Configuration Page.
 Slalisflts Configul mi on Aulll emi calia n
HTTP Configurafion
Slale: Q Enab‘sd O Dwsab‘sd
Poll: Bl]
Secure Poll: 443
Secure
   
Pmmols: ESL} L51 D Emsw 1
Max Tillieom: 10 seconds
Max Bytes: man
333"” 6 Enamad QDwsab‘Ed
Max Lou
Enllies: 5”
Log Fomml: m m “x.” was 25 uxmavmow “%(USay-Agen1}w‘
Amhe
  
 
Tim” """‘ 3n mmutES
 
 
Slalisflts Configul mi on Aulll emi calia n
HTTP Configurafion
Slale: Q Enab‘sd O Dwsab‘sd
Poll: Bl]
Secure Poll: 443
Secure
   
Pmmols: ESL} L51 D Emsw 1
Max Tillieom: 10 seconds
Max Bytes: man
333"” 6 Enamad QDwsab‘Ed
Max Lou
Enllies: 5”
Log Fomml: m m “x.” was 25 uxmavmow “%(USay-Agen1}w‘
Amhe
  
 
Tim” """‘ 3n mmutES
 
 
 
 
9: Service Settings
MatchPort® AR Embedded Device Server User Guide 75
HTTP Configuration
On this page you may change HTTP configuration settings.  
To configure HTTP:
1. Select HTTP on the menu bar and then Configuration at the top of the page. The HTTP 
Configuration page opens.
Figure 9-13  HTTP Configuration
2. Enter or modify the following settings:
Table 9-14  HTTP Configuration
HTTP Configuration 
Settings
Description
State Select Enabled to enable the HTTP server.
Port Enter the port for the HTTP server to use. The default is 80.
Secure Port Enter the port for the HTTPS server to use. The default is 443. The HTTP 
server only listens on the HTTPS Port when an SSL certificate is 
configured.

9: Service Settings
MatchPort® AR Embedded Device Server User Guide 76
3. Click Submit. 
Secure Protocols Select  to enable or disable the following protocols:
SSL3 = Secure Sockets Layer version 3
TLS1.0 = Transport Layer Security version 1.0. TLS 1.0 is the successor 
of SSL3 as defined by the IETF.
TLS1.1 = Transport Layer Security version 1.1
The protocols are enabled by default.
Note: A server certificate and associated private key need to be installed in 
the SSL configuration section to use HTTPS. 
Max Timeout Enter the maximum time for the HTTP server to wait when receiving a 
request. This prevents Denial-of-Service (DoS) attacks. The default is 10 
seconds.
Max Bytes Enter the maximum number of bytes the HTTP server accepts when 
receiving a request. The default is 40 KB (this prevents DoS attacks).
Logging State Select Enabled to enable HTTP server logging.
Max Log Entries Sets the maximum number of HTTP server log entries. Only the last Max 
Log Entries are cached and viewable.
Log Format Set the log format string for the HTTP server. Follow these Log Format 
rules:
%a -  remote IP address (could be a proxy) 
%b -  bytes sent excluding headers 
%B - bytes sent excluding headers (0 = '-') 
%h - remote host (same as '%a') 
%{h}i - header contents from request (h = header string) 
%m - request method 
%p - ephemeral local port value used for request 
%q - query string (prepend with '?' or empty '-') 
%t - timestamp HH:MM:SS (same as Apache '%(%H:%M:%S)t' or 
'%(%T)t') 
%u - remote user (could be bogus for 401 status) 
%U - URL path info 
%r - first line of request (same as '%m %U%q <version>') 
%s - return status
Authentication 
Timeout
The timeout period applies if the selected authentication type is either 
Digest or SSL/Digest.  After this period of inactivity, the client must 
authenticate again.
HTTP Configuration 
Settings (continued)
Description
 Slaliincs Configuration AIIlIIeI
 
HTTP Authentication
URI:
Realm:
"""TWE 82m ((33%n Pgéé‘suu‘gzs.
Usenmme:
mem
 
 
 
Current Configuration
URI: HM]
Realm: config
Athype: Dwgest
Users: admm [M]
 
 
 
Slaliincs Configuration AIIlIIeI
 
HTTP Authentication
URI:
Realm:
"""TWE 82m ((33%n Pgéé‘suu‘gzs.
Usenmme:
mem
 
 
 
Current Configuration
URI: HM]
Realm: config
Athype: Dwgest
Users: admm [M]
 
 
 
9: Service Settings
MatchPort® AR Embedded Device Server User Guide 77
HTTP Authentication
HTTP Authentication enables you to require usernames and passwords to access specific web 
pages or directories on the MatchPort AR' built-in web server.
To configure HTTP authentication settings:
1. Select HTTP on the menu bar and then Authentication at the top of the page. The HTTP 
Authentication page opens.
Figure 9-15  HTTP Authentication
2. Enter or modify the following settings:
Table 9-16  HTTP Authentication
Note: To properly view data entries in RSS Settings in certain web browsers, it may be 
nececessary to first remove authentication from RSS.  Enter the following under HTTP 
Authentication:  URI: "/rss", Realm: "rss", and AuthType: "None".
HTTP Authentication 
Settings
Description
URI Enter the Uniform Resource Identifier (URI).
Note: The URI must begin with ‘/’ to refer to the filesystem.
Realm Enter the domain, or realm, used for HTTP. Required with the 
URI field.

9: Service Settings
MatchPort® AR Embedded Device Server User Guide 78
3. Click Submit. 
4. To delete the URI and users,  click Delete in the current configuration table.
Note: The URI, realm, username, and password are user-specified, free-form fields. The 
URI must match the directory created on the MatchPort AR file system. 
Auth Type Select the authentication type: 
None = no authentication is necessary. 
Basic = encodes passwords using Base64. 
Digest = encodes passwords using MD5. 
SSL = the page can only be accessed over SSL (no password 
is required).
SSL/Basic = the page is accessible only over SSL and 
encodes passwords using Base64. 
SSL/Digest = the page is accessible only over SSL and 
encodes passwords using MD5.
Note: When changing the parameters of Digest or SSL Digest 
authentication, it is often best to close and reopen the browser to 
ensure it does not attempt to use cached authentication 
information.
Username Enter the Username used to access the URI.  More than one 
Username per URI is permitted. 
Click Submit and enter the next Username as necessary.
Password Enter the Password for the Username.
HTTP Authentication 
Settings (continued)
Description
 RSS
 
Collliglnalinn
RSS Feed: C On (won
Persislem: (ion G>0fi
Max Enll' mu
sminiu
Dan: 0 Emma: (u bytss) [m] [m]
 
 
 
RSS
 
Collliglnalinn
RSS Feed: C On (won
Persislem: (ion G>0fi
Max Enll' mu
sminiu
Dan: 0 Emma: (u bytss) [m] [m]
 
 
 
9: Service Settings
MatchPort® AR Embedded Device Server User Guide 79
RSS Settings
Really Simple Syndication (RSS) (sometimes referred to as Rich Site Summary) is a method of 
feeding online content to Web users. Instead of actively searching for MatchPort AR configuration 
changes, RSS feeds permit viewing only relevant and new information regarding changes made to 
the MatchPort AR embedded device server via an RSS publisher. The RSS feeds may also be 
stored to the file system cfg_log.txt file.
To configure RSS settings:
1. Select RSS on the menu bar. The RSS page opens and shows the current RSS configuration.
Figure 9-17  RSS
2. Enter or modify the following settings:
Table 9-18  RSS
3. Select Submit. 
4. In the Current Status table, view and clear stored RSS Feed entries, as necessary.
RSS Settings Description
RSS Feed Select On to enable RSS feeds to an RSS publisher.
Persistent Select On to enable the RSS feed to be written to a file (cfg_log.txt) 
and to be available across reboots.
Max Entries Sets the maximum number of log entries. Only the last Max Entries 
are cached and viewable.
View Click View to view current data entries.
Note: It may be necessary to remove authentication from RSS 
access to view data entries on certain web browsers.  Go to HTTP 
Authentication on page 77 for more information.
Clear Click Clear to clear data entries.
 LPD1 LPD 2
 
Statisths Cnnfigulaliun PtianestPage
LPD 1 - Statistics
Juhs Primed: 0
Bytes Printed: a
Currenl Clle
 
No dewce \s cunnecled
Last Client: No dewcz has conneclsd
 
 
 
 
LPD1 LPD 2
 
Statisths Cnnfigulaliun PtianestPage
LPD 1 - Statistics
Juhs Primed: 0
Bytes Printed: a
Currenl Clle
 
No dewce \s cunnecled
Last Client: No dewcz has conneclsd
 
 
 
9: Service Settings
MatchPort® AR Embedded Device Server User Guide 80
LPD Settings
The MatchPort AR device acts as a print server if a printer gets connected to one of its serial ports. 
Selecting the Line Printer Daemon (LPD) link in the Main Menu displays the LPD web page. The 
LPD web page has three sub-menus for viewing print queue statistics, changing print queue 
configuration, and printing a test page. Because the LPD lines operate independently, you can 
specify different configuration settings for each.
LPD Statistics
This read-only page shows various statistics about the LPD server. 
To view LPD statistics for a specific LPD line:
1. Select LPD on the menu bar.  The LPD web page appears.Select an LPD line at the top of the 
page.Select Statistics. The LPD Statistics page for the selected LPD line appears.Repeat 
above steps as desired, according to additional LPD(s) available on your product.
Figure 9-19  LPD Statistics
 LPD1 LPDZ
Slinslius Cunfiguralion PrimTes1Page
LPD 1 - Configuration
WARN‘NG Sena‘ pvutum‘ IS nut “LPD"
Banner: @Enamw Ostab‘ed
Binary: OEnamsu @stabbd
Slan uunh: 0 Enema 6) Dwsab‘ed
End nlJnh: OEnamsd @Dxfib‘ed
Farmfeed: OEnamgd GD‘gabwed
Cnnven Newlines: O Enab‘ed (3) Dwaab‘ed
SOJ Slring:
(93TH! (1‘ Emery
W 5m”: @‘sz C‘Bmavy
Queun Name:
 
 
LPD1 LPDZ
Slinslius Cunfiguralion PrimTes1Page
LPD 1 - Configuration
WARN‘NG Sena‘ pvutum‘ IS nut “LPD"
Banner: @Enamw Ostab‘ed
Binary: OEnamsu @stabbd
Slan uunh: 0 Enema 6) Dwsab‘ed
End nlJnh: OEnamsd @Dxfib‘ed
Farmfeed: OEnamgd GD‘gabwed
Cnnven Newlines: O Enab‘ed (3) Dwaab‘ed
SOJ Slring:
(93TH! (1‘ Emery
W 5m”: @‘sz C‘Bmavy
Queun Name:
 
 
 
 
 
 
 
 
9: Service Settings
MatchPort® AR Embedded Device Server User Guide 81
LPD Configuration
Here you can change LPD configuration settings.
To configure LPD settings for a specific LPD line:
1. Select LPD on the menu bar, if you are not already at the LPD web page.Select a LPD line at 
the top of the page.Select Configuration. The LPD Configuration for the selected LPD line 
appears.
Figure 9-20  LPD Configuration
2. Enter or modify the following settings:
Table 9-21  LPD Configuration
LPD Configuration 
Settings
Description
Banner Select Enabled to print the banner even if the print job does not specify to do so. 
Selected by default.
Binary Select Enabled for the device to pass the entire file to the printer unchanged. 
Otherwise, the device passes only valid ASCII and valid control characters to the 
printer. Valid control characters include the tab, linefeed, formfeed, backspace, and 
newline characters. All others are stripped. Disabled by default.
Start of Job Select Enabled to print a "start of job" string before sending the print data.
End of Job Select Enabled to send an "end of job" string.

9: Service Settings
MatchPort® AR Embedded Device Server User Guide 82
3. Click Submit. Repeat above steps as desired, according to additional LPD lines available on 
your product.
Formfeed Select Enabled to force the printer to advance to the next page at the end of each 
print job. 
Convert Newlines Select Enabled to convert single newlines and carriage returns to DOS-style line 
endings.
SOJ String If Start of Job (above) is enabled, enter the string to be sent to the printer at the 
beginning of a print job. The limit is 100 characters.
Indicate whether the string is in text or binary format.
EOJ String If End of Job (above) is enabled, enter the string to send at the end of a print job. 
The limit is 100 characters. Indicate whether the string is in text or binary format.
Queue Name To change the name of the print queue, enter a new name. The name cannot have 
white space in it and is limited to 31 characters. The default is LPDQueueX (for line 
number X) 
LPD Configuration 
Settings 
Description

MatchPort® AR Embedded Device Server User Guide 83
10: Security Settings
The  MatchPort AR embedded device server supports Secure Shell (SSH) and Secure Sockets 
Layer (SSL). SSH is a network protocol for securely accessing a remote device. SSH provides a 
secure, encrypted communication channel between two hosts over a network. It provides 
authentication and message integrity services. 
Secure Sockets Layer (SSL) is a protocol that manages data transmission security over the 
Internet. It uses digital certificates for authentication and cryptography against eavesdropping and 
tampering. It provides encryption and message integrity services. SSL is widely used for secure 
communication to a web server. SSL uses certificates and private keys.
Note: The MatchPort AR device server supports SSLv3 and its successors, TLS1.0 and 
TLS1.1. An incoming SSlv2 connection attempt is answered with an SSlv3 response. If 
the initiator also supports SSLv3, SSLv3 handles the rest of the connection.
This chapter contains the following sections:
 SSH Server Host Keys 
 SSH Server Authorized Users
 SSH Client Known Hosts
 SSH Client Users
 SSL Cipher Suites
 SSL Certificates
 SSL RSA or DSA
 SSL Certificates and Private Keys
 SSL Utilities
 SSL Configuration
Note: For more information, see Chapter 14: Security in Detail on page 137.
SSH Settings
SSH is a network protocol for securely accessing a remote device over an encrypted channel. This 
protocol manages the security of internet data transmission between two hosts over a network by 
providing encryption, authentication, and message integrity services.  
Two instances require configuration: when the MatchPort AR unit is the SSH server and when it is 
an SSH client. The SSH server is used by the CLI (Command Mode) and for tunneling in Accept 
Mode. The SSH client is for tunneling in Connect Mode. 
To configure the MatchPort AR embedded device server as an SSH server, there are two 
requirements:
Defined Host Keys: both private and public keys are required. These keys are used for the 
Diffie-Hellman key exchange (used for the underlying encryption protocol).
Defined Users: these users are permitted to connect to the MatchPort AR SSH server. 
 SSH server: Host Key: SSH client: Known Hosts
SSH Server: Authorized Users SSH client: Users
SSH Server: Host Keys
Upload Keys
 
Private Key: No Yiie seieoied
Public Key: No me seiected
Kev'lvpe: 0 REA 0 USA
 
Create New Keys
Kevae: 0 REA 0 BSA
Hits 0512 0763 01024
 
 
 
Current Configuration
Public RSA Key: [View Key] [Deiete Key]
Public DSA Key: No USA Key Configured
 
 
 
SSH server: Host Key: SSH client: Known Hosts
SSH Server: Authorized Users SSH client: Users
SSH Server: Host Keys
Upload Keys
 
Private Key: No Yiie seieoied
Public Key: No me seiected
Kev'lvpe: 0 REA 0 USA
 
Create New Keys
Kevae: 0 REA 0 BSA
Hits 0512 0763 01024
 
 
 
Current Configuration
Public RSA Key: [View Key] [Deiete Key]
Public DSA Key: No USA Key Configured
 
 
 
10: Security Settings
MatchPort® AR Embedded Device Server User Guide 84
This page has four links at the top for viewing and changing SSH server host keys, SSH server 
authorized keys, SSH client known hosts, and SSH client users.
SSH Server Host Keys 
SSH Host Keys can be obtained in a few different ways:
Uploading keys via PUTTY or other tools which generate RFC4716 format keys.
Creating keys through the device.
The steps for creating or uploading keys is described below.
To upload SSH server host keys generated from PuTTY:
1. Create the keys with puttygen.exe.  The keys are in PuTTY format.
2. Use puttygen.exe again to convert the private key to Open SSH format as follows: 
a. Import the private key using "Conversions…Import key."
b. Create a new file using "Conversions…Export OpenSSH key."
3. Use ssh-keygen to convert the public key to OpenSSH format.
   ssh-keygen -i -f putty_file > openssh_file
4. Select SSH on the menu bar and SSH Server: Host Keys at the top of the page. The SSH 
Server Host Keys page appears.
Figure 10-1  SSH Server: Host Keys (Upload Keys)

10: Security Settings
MatchPort® AR Embedded Device Server User Guide 85
5. Enter or modify the following settings in the part of the screen related to uploading keys:
Table 10-2  SSH Server Host Keys Settings - Upload Keys Method
6. Click Submit. 
To upload SSH server host RFC4716 format keys:
1. Use any program that can produce keys in the RFC4716 format.
2. Use ssh-keygen to convert the format to OpenSSH.
   ssh-keygen -i -f RFC4716_file > output_file
Note: If the keys do not exist, follow directions under To create new SSH server host 
keys (on page 87).
3. Select SSH on the menu bar and SSH Server: Host Keys at the top of the page. The SSH 
Server Host Keys page appears.
SSH Server: Host Keys 
Settings (continued)
Description
Private Key Enter the path and name of the existing private key you 
want to upload or use the Browse button to select the key. 
Be sure the private key will not be compromised in transit. 
This implies the data is uploaded over some kind of secure 
private network.
Public Key Enter the path and name of the existing public key you want 
to upload or use the Browse button to select the key.
Key Type Select a key type to use for the new key:
RSA = use this key with the SSH1 and SSH2 protocols.
DSA = use this key with the SSH2 protocol.
 SSH server: Host Keys 55H cliem: Known Hosts
SSH Server: Authorized Users SSH Client: Users
SSH Server: Host Keys
Upload Keys
Private Key: No me se‘eoted
Public Key: No Me se‘eded
KevTVPeI O PSA 0 BSA
 
Create New Keys
KeVTVpe: ORSA C‘DSA
ensue: 0512 0765 01024
 
 
Current Configuration
Public RSA Kev: [mew Key] [De‘ete Key]
Fubllc DSA Key: NH USA Key Cunflgured
 
 
SSH server: Host Keys 55H cliem: Known Hosts
SSH Server: Authorized Users SSH Client: Users
SSH Server: Host Keys
Upload Keys
Private Key: No me se‘eoted
Public Key: No Me se‘eded
KevTVPeI O PSA 0 BSA
 
Create New Keys
KeVTVpe: ORSA C‘DSA
ensue: 0512 0765 01024
 
 
Current Configuration
Public RSA Kev: [mew Key] [De‘ete Key]
Fubllc DSA Key: NH USA Key Cunflgured
 
 
 
 
10: Security Settings
MatchPort® AR Embedded Device Server User Guide 86
Figure 10-3  SSH Server: Host Keys (Upload Keys)
4. Enter or modify the following settings in the part of the screen related to uploading keys:
Table 10-4  SSH Server Host Keys Settings - Upload Keys Method
5. Click Submit. 
Note: SSH keys may be created on another computer and uploaded to the MatchPort 
AR embedded device server. For example, use the following command using Open SSH 
to create a 1024-bit DSA key pair:  ssh-keygen –b 1024 –t dsa
SSH Server: Host Keys 
Settings (continued)
Description
Private Key Enter the path and name of the existing private key you 
want to upload or use the Browse button to select the key. 
Be sure the private key will not be compromised in transit. 
This implies the data is uploaded over some kind of secure 
private network.
Public Key Enter the path and name of the existing public key you want 
to upload or use the Browse button to select the key.
Key Type Select a key type to use for the new key:
RSA = use this key with the SSH1 and SSH2 protocols.
DSA = use this key with the SSH2 protocol.
 SSH server: Host Keys 55H cliem: Known Hosts
SSH Server: Authorized Users SSH Client: Users
SSH Server: Host Keys
Upload Keys
Private Key: No me se‘eoted
Public Key: No Me se‘eded
KevTVPeI O PSA 0 BSA
 
Create New Keys
KeVTVpe: ORSA C‘DSA
ensue: 0512 0765 01024
 
 
Current Configuration
Public RSA Kev: [mew Key] [De‘ete Key]
Fubllc DSA Key: NH USA Key Cunflgured
 
 
SSH server: Host Keys 55H cliem: Known Hosts
SSH Server: Authorized Users SSH Client: Users
SSH Server: Host Keys
Upload Keys
Private Key: No me se‘eoted
Public Key: No Me se‘eded
KevTVPeI O PSA 0 BSA
 
Create New Keys
KeVTVpe: ORSA C‘DSA
ensue: 0512 0765 01024
 
 
Current Configuration
Public RSA Kev: [mew Key] [De‘ete Key]
Fubllc DSA Key: NH USA Key Cunflgured
 
 
 
 
10: Security Settings
MatchPort® AR Embedded Device Server User Guide 87
To create new SSH server host keys
Note: Generating new keys with large bit size results in longer key generation times.
1. Select SSH on the menu bar and SSH Server: Host Keys at the top of the page. The SSH 
Server Host Keys page appears.
Figure 10-5  SSH Server: Host Keys (Create New Keys)
2. Enter or modify the following settings in the part of the screen related to creating new keys:
Table 10-6  SSH Server Host Keys Settings - Create New Keys Method
SSH Server: Host Keys 
Settings
Description
Key Type Select a key type to use:
RSA = use this key with SSH1 and SSH2 protocols.
DSA = use this key with the SSH2 protocol.
Note: RSA is more secure.

10: Security Settings
MatchPort® AR Embedded Device Server User Guide 88
3. Click Submit. 
Note: SSH Keys from other programs may be converted to the required MatchPort AR 
format. Use Open SSH to perform the conversion. 
SSH Server Authorized Users
On this page you can change SSH server settings for Authorized Users.  SSH Server Authorized 
Users are accounts on the MatchPort AR embedded device server that can be used to log into the  
using SSH. For instance, these accounts can be used to SSH into the CLI or open an SSH 
connection to a device port. Every account must have a password.
The user's public keys are optional and only necessary if public key authentication is required. 
Using public key authentication allows a connection to be made without the password being 
asked.
Under Current Configuration, User has a Delete User link, and Public RSA Key and Public 
DSA Key have View Key and Delete Key links. If you click a Delete link, a message asks whether 
you are sure you want to delete this information. Click OK to proceed or Cancel to cancel the 
operation.
To configure the SSH server for authorized users:
1. Select SSH on the menu bar and then Server Authorized Users at the top of the page. The 
SSH Server: Authorized Users page appears.
Bit Size Select a bit length for the new key:
512
768
1024
Using a larger bit size takes more time to generate the key. 
Approximate times are: 
10 seconds for a 512 bit RSA Key
15 seconds for a 768 bit RSA Key
1 minute for a 1024 bit RSA Key
30 seconds for a 512 bit DSA Key
1 minute for a 768 bit DSA Key
2 minutes for a 1024 bit DSA Key
Note: Some SSH clients require RSA host keys to be at 
least 1024 bits long. This device generates keys up to 1024 
bits long. It can work with larger keys (up to 2048 bit) if they 
are imported or otherwise created.
SSH Server: Host Keys 
Settings (continued)
Description
 55H serve ost Keys SSH client: Known Hosts
SSH server: Authorized Users SSH client: Users
 
SSH Server: Authorized Users
Username:
Password:
Publlt RsA Kev
 
~10 Ne se‘ected
 
Publlc DsA Key No Me se‘ected
 
 
Current Configuration
User: admm [De‘ete User]
Password: Cunflgured
Fubllc REA Kev: Nu PEA KEV Cnnfiguren
Publlc DSA Kev: Nu DSA Key Cnnngured
 
 
 
55H serve ost Keys SSH client: Known Hosts
SSH server: Authorized Users SSH client: Users
 
SSH Server: Authorized Users
Username:
Password:
Publlt RsA Kev
 
~10 Ne se‘ected
 
Publlc DsA Key No Me se‘ected
 
 
Current Configuration
User: admm [De‘ete User]
Password: Cunflgured
Fubllc REA Kev: Nu PEA KEV Cnnfiguren
Publlc DSA Kev: Nu DSA Key Cnnngured
 
 
 
10: Security Settings
MatchPort® AR Embedded Device Server User Guide 89
Figure 10-7  SSH Server: Authorized Users
2. Enter or modify the following settings:
Table 10-8  SSH Server Authorized User Settings
3. Click Submit. 
Note: When uploading the security keys, ensure the keys are not compromised in 
transit.
SSH Server: 
Authorized Users 
Settings
Description
Username Enter the name of the user authorized to access the SSH server.
Password Enter the password associated with the username. 
Public RSA Key Enter the path and name of the existing public RSA key you want 
to use with this user or use the Browse button to select the key. If 
authentication is successful with the key, no password is required.
Public DSA Key Enter the path and name of the existing public DSA key you want 
to use with this user or use the Browse button to select the key. If 
authentication is successful with the key, no password is required.
 SSH server: Host Keys 55H CIIOM: Known Hosts
SSH server: Authorized Users SSH client: Users
SSH Client: Known Hosts
Server:
Fubllc RSA Ke No me se‘ec'ed
Fubllc DSA Ke No we se‘ecled
 
 
Current Configuration
Nu Knnwn Husts are :mrenuy cunhguved mrthe SSH Chant
 
 
SSH server: Host Keys 55H CIIOM: Known Hosts
SSH server: Authorized Users SSH client: Users
SSH Client: Known Hosts
Server:
Fubllc RSA Ke No me se‘ec'ed
Fubllc DSA Ke No we se‘ecled
 
 
Current Configuration
Nu Knnwn Husts are :mrenuy cunhguved mrthe SSH Chant
 
 
 
 
10: Security Settings
MatchPort® AR Embedded Device Server User Guide 90
SSH Client Known Hosts
On this page you can change SSH client settings for known hosts.
Note: You do not have to complete the fields on this page for communication to occur. 
However, completing them adds another layer of security that protects against Man-In-
The-Middle (MITM) attacks.
To configure the SSH client for known hosts:
1. Select SSH on the menu bar and then Client Known Hosts at the top of the page. The SSH 
Client: Known Hosts page appears.
Figure 10-9  SSH Client: Known Hosts
2. Enter or modify the following settings:
Table 10-10  SSH Client Known Hosts
Note: These settings are not required for communication. They protect against Man-In-
The-Middle (MITM) attacks.
3. Click Submit.  
4. In the Current Configuration table, delete currently stored settings as necessary.
SSH Client: 
Known Hosts Settings
Description
Server Enter the name or IP address of a known host. If you enter a server name, 
the name should match the name of the server used as the Remote 
Address in Connect mode tunneling. 
Public RSA Key Enter the path and name of the existing public RSA key you want to use 
with this known host or use the Browse button to select the key.
Public DSA Key Enter the path and name of the existing public DSA key you want to use 
with this known host or use the Browse button to select the key.
 ssH server: Host Keys SSH chant: Known Hosts
ssH server: Authorized Users ssH client: Users
SSH Client: Users
Usemzme: |
Password: ‘
=\
Remote commnnd
 
Publlc Key: Nome se‘ecled
Kev WP
rum. K0 No me se‘ecled
0 REA 0 BSA
 
    
Create New Key:
Usernzme:
Kev “(Per 0 REA 0 BSA
EItSIz 0512 07% 0 mm
 
Current Configuration
ND Users are :urrermy Eurmgured fur me SSH Chem
 
 
 
ssH server: Host Keys SSH chant: Known Hosts
ssH server: Authorized Users ssH client: Users
SSH Client: Users
Usemzme: |
Password: ‘
=\
Remote commnnd
 
Publlc Key: Nome se‘ecled
Kev WP
rum. K0 No me se‘ecled
0 REA 0 BSA
 
    
Create New Key:
Usernzme:
Kev “(Per 0 REA 0 BSA
EItSIz 0512 07% 0 mm
 
Current Configuration
ND Users are :urrermy Eurmgured fur me SSH Chem
 
 
 
10: Security Settings
MatchPort® AR Embedded Device Server User Guide 91
SSH Client Users
On this page you can change SSH client settings for users.  To configure the MatchPort AR 
embedded device server as an SSH client, an SSH client user must be both configured and also 
exist on the remote SSH server.
SSH client known users are used by all applications that play the role of an SSH client, specifically 
tunneling in Connect Mode. At the very least, a password or key pair must be configured for a 
user. The keys for public key authentication can be created elsewhere and uploaded to the device 
or automatically generated on the device. If uploading existing keys, be sure the private key will 
not be compromised in transit. This implies the data is uploaded over some kind of secure private 
network.
Note: If you are providing a key by uploading a file, make sure that the key is not 
password protected.
To configure the SSH client users:
1. Select SSH on the menu bar and then SSH Client Users at the top of the page. The SSH 
Client: Users page appears.
Figure 10-11  SSH Client: Users

10: Security Settings
MatchPort® AR Embedded Device Server User Guide 92
2. Enter or modify the following settings:
Table 10-12  SSH Client Users
3. Click Submit. 
4. In the Current Configuration table, delete currently stored settings as necessary.
SSH Client: Users 
Settings
Description
Username Enter the name that the device uses to connect to a SSH server.
Password Enter the password associated with the username. 
Remote Command Enter the command that can be executed remotely. Default is shell, which tells the 
SSH server to execute a remote shell upon connection. This command can be 
changed to anything the remote host can perform. 
Private Key Enter the name of the existing private key you want to use with this SSH client user. 
You can either enter the path and name of the key, or use the Browse button to 
select the key.
Public Key Enter the path and name of the existing public key you want to use with this SSH 
client user or use the Browse button to select the key.
Note: If the user public key is known on the remote SSH server, the SSH server 
does not require a password.  The Remote Command is provided to the SSH server 
upon connection. It specifies the application to execute upon connection. The default 
is a command shell.
Note: Configuring the SSH client’s known hosts is optional. It prevents Man-In-The-
Middle (MITM) attacks
Key Type Select the key type to be used. Choices are:
RSA = use this key with the SSH1 and SSH2 protocols.
DSA = use this key with the SSH2 protocol.
Create New Keys
     Username Enter the name of the user associated with the new key.
     Key Type Select the key type to be used for the new key. Choices are:
RSA = use this key with the SSH1 and SSH2 protocols.
DSA = use this key with the SSH2 protocol.
     Bit Size Select the bit length of the new key:
512
768
1024
Using a larger Bit Size takes more time to generate the key. Approximate times are: 
10 seconds for a 512 bit RSA Key
15 seconds for a 768 bit RSA Key
1 minute for a 1024 bit RSA key
30 seconds for a 512 bit DSA key
1 minute for a 768 bit DSA key
2 minutes for a 1024 bit DSA key
Note: Some SSH clients require RSA host keys to be at least 1024 bits long. This 
device generates keys up to 1024 bits long. It can work with larger keys (up to 2048 
bit) if they are imported or otherwise created.

10: Security Settings
MatchPort® AR Embedded Device Server User Guide 93
SSL Settings
Secure Sockets Layer (SSL) is a protocol for managing the security of data transmission over the 
Internet. It provides encryption, authentication, and message integrity services. SSL is widely used 
for secure communication to a web server.
Certificate/Private key combinations can be obtained from an external Certificate Authority (CA) 
and downloaded into the unit.  Self-signed certificates with associated private key can be 
generated by the device server itself.
For more information regarding Certificates and how to obtain them, see SSL Certificates and 
Private Keys (on page 94).
SSL uses digital certificates for authentication and cryptography against eavesdropping and 
tampering. Sometimes only the server is authenticated; sometimes both server and client are 
authenticated. The AR embedded device server can be server and/or client, depending on the 
application. Public key encryption systems exchange information and keys and set up the 
encrypted tunnel. 
Efficient symmetric encryption methods encrypt the data going through the tunnel after it is 
established. Hashing provides tamper detection.
Applications that can make use of SSL are Tunneling, Secure Web Server, and WLAN interface.
The MatchPort AR unit supports SSlv3 and its successors, TLS1.0 and TLS1.1. 
Note: An incoming SSlv2 connection attempt is answered with an SSlv3 response. If the 
initiator also supports SSLv3, SSLv3 handles the rest of the connection.
SSL Cipher Suites
The SSL standard defines only certain combinations of certificate type, key exchange method, 
symmetric encryption, and hash method. Such a combination is called a cipher suite. Supported 
cipher suites include the following:
Whichever side is acting as server decides which cipher suite to use for a connection. It is usually 
the strongest common denominator of the cipher suite lists supported by both sides.
Table 10-13  Supported Cipher Suites
Certificate Key Exchange Encryption Hash
DSA DHE 3DES SHA1
RSA RSA 128 bits AES SHA1
RSA RSA Triple DES SHA1
RSA RSA 128 bits RC4 MD5
RSA RSA 128 bits RC4 SHA1
RSA 1024 bits RSA 56 bits RC4 MD5
RSA 1024 bits RSA 56 bits RC4 SHA1
RSA 1024 bits RSA 40 bits RC4 MD5

10: Security Settings
MatchPort® AR Embedded Device Server User Guide 94
SSL Certificates
The goal of a certificate is to authenticate its sender. It is analogous to a paper document that 
contains personal identification information and is signed by an authority, for example a notary or 
government agency.
The principles of Security Certificate require that in order to sign other certificates, the authority 
uses a private key. The published authority certificate contains the matching public key that allows 
another to verify the signature but not recreate it.
The authority’s certificate can be signed by itself, resulting in a self-signed or trusted-root 
certificate, or by another (higher) authority, resulting in an intermediate authority certificate. You 
can build up a chain of intermediate authority certificates, and the last certification will always be a 
trusted-root certificate.
An authority that signs other certificates is also called a Certificate Authority (CA). The last in line is 
then the root-CA. VeriSign is a famous example of such a root-CA. Its certificate is often built into 
web browsers to allow verifying the identity of website servers, which need to have certificates 
signed by VeriSign or another public CA. Since obtaining a certificate signed by a CA that is 
managed by another company can be expensive, it is possible to have your own CA. Tools exist to 
generate self-signed CA certificates or to sign other certificates.
A certificate request is a certificate that has not been signed and only contains the identifying 
information. Signing it makes it a certificate. A certificate is also used to sign any message 
transmitted to the peer to identify the originator and prevent tampering while transported.
When using HTTPS and/or SSL Tunneling in Accept mode, the MatchPort AR unit needs a 
personal certificate with a matching private key to identify itself and sign its messages. When using 
SSL Tunneling in Connect mode, the MatchPort AR embedded device server needs the authority 
certificate that can authenticate users with which it wishes to communicate.
SSL RSA or DSA
As mentioned above, the certificates contain a public key. Different key exchange methods require 
different public keys and thus different styles of certificate. The MatchPort AR embedded device 
server supports key exchange methods that require a RSA-style certificate and key exchange 
methods that require a DSA-style certificate. If only one of these certificates is stored in the 
MatchPort AR unit, only those key exchange methods that can work with that style certificate are 
enabled. RSA is sufficient in most cases.
SSL Certificates and Private Keys
You can obtain a certificate by completing a certificate request and sending it to a certificate 
authority that will create a certificate/key combo, usually for a fee, or you can generate your own. A 
few utilities exist to generate self-signed certificates or sign certificate requests. The MatchPort AR 
embedded device server also has the ability to generate its own self-signed certificate/key combo. 
You can use XML to export the certificate in PEM format, but you cannot export the key. Hence the 
internal certificate generator can only be used for certificates that are to identify that particular  
MatchPort AR unit.
Certificates and private keys can be stored in several file formats. Best known are PKCS12, DER 
and PEM. Certificate and key can be in the same file or in separate files. The key can be encrypted 
with a password or not. The MatchPort AR embedded device server currently only accepts 
separate PEM files. The key needs to be unencrypted.
 www.ogenssl.org www.madboa.com/geeklogenssl
 
www.ogenssl.org www.madboa.com/geeklogenssl
 
10: Security Settings
MatchPort® AR Embedded Device Server User Guide 95
SSL Utilities
Several utilities exist to convert between the formats.
OpenSSL
Open source is a set of SSL related command line utilities. It can act as server or client. It can 
generate or sign certificate requests. It can convert all kinds of formats. Executables are available 
for Linux and Windows. To generate a self-signed RSA certificate/key combo use the following 
commands in the order shown:
openssl req –x509 –nodes –days 365 –newkey rsa:1024 –keyout 
mp_key.pem –out mp_cert.pem
Note: Signing other certificate requests is also possible with OpenSSL. See 
www.openssl.org or www.madboa.com/geek/openssl for more information.
 SSL
Upload Certificate
 
 
Upload Authority Certificate
    
 
Alllhml
Create New Self-Signed Certificate
Country (2 Letter Code): —\
State Province:
yum»: :
Organizallon: :|
Organilalioll Un"
Common Name: —\
Expiles: uvuvzm u mm/dd/yyyy
Key length: 0512 but 0758 bu 01024 rm
Tim 0 REA 0 BSA
 
 
    
 
Current SSL Certificates
 
 
 
SSL
Upload Certificate
 
 
Upload Authority Certificate
    
 
Alllhml
Create New Self-Signed Certificate
Country (2 Letter Code): —\
State Province:
yum»: :
Organizallon: :|
Organilalioll Un"
Common Name: —\
Expiles: uvuvzm u mm/dd/yyyy
Key length: 0512 but 0758 bu 01024 rm
Tim 0 REA 0 BSA
 
 
    
 
Current SSL Certificates
10: Security Settings
MatchPort® AR Embedded Device Server User Guide 96
SSL Configuration
To configure SSL settings:
1. Select SSL from the main menu. The SSL page appears.
Figure 10-14  SSL

10: Security Settings
MatchPort® AR Embedded Device Server User Guide 97
2. Enter or modify the following settings:
Table 10-15  SSL
SSL Settings Description
Upload Certificate
     New Certificate This certificate identifies the device to peers. It is used for HTTPS and SSL 
Tunneling.
Enter the path and name of the certificate you want to upload, or use the 
Browse button to select the certificate.
RSA or DSA certificates with 512 to 1024 bit public keys are allowed.
The format of the file must be PEM. The file must start with “-----BEGIN 
CERTIFICATE-----“ and end with “-----END CERTIFICATE-----“. Some 
Certificate Authorities add comments before and/or after these lines. Those 
need to be deleted before upload.
     New Private Key Enter the path and name of the private key you want to upload, or use the 
Browse button to select the private key. The key needs to belong to the 
certificate entered above.
The format of the file must be PEM. The file must start with “-----BEGIN 
RSA PRIVATE KEY-----” and end with “-----END RSA PRIVATE KEY-----”. 
Read DSA instead of RSA in case of a DSA key. Some Certificate 
Authorities add comments before and/or after these lines. Those need to be 
deleted before upload.
Upload Authority Certificate
     Authority One or more authority certificates are needed to verify a peer's identity. It is 
used for SSL Tunneling. These certificates do not require a private key.
Enter the path and name of the certificate you want to upload, or use the 
Browse button to select the certificate.
RSA or DSA certificates with 512 to 1024 bit public keys are allowed.
The format of the file must be PEM. The file must start with “-----BEGIN 
CERTIFICATE-----” and end with “-----END CERTIFICATE-----”. Some 
Certificate Authorities add comments before and/or after these lines. Those 
need to be deleted before upload.
Create New Self-Signed Certificate
     Country (2 Letter Code) Enter the 2-letter country code to be assigned to the new self-signed 
certificate. 
Examples: US for United States and CA for Canada
     State/Province Enter the state or province to be assigned to the new self-signed certificate.
     Locality (City) Enter the city or locality to be assigned to the new self-signed certificate.
     Organization Enter the organization to be associated with the new self-signed certificate.
Example: If your company is called Widgets, and you are setting up a web 
server for the Sales department, enter Widgets for the organization.
     Organization Unit Enter the organizational unit to be associated with the new self-signed 
certificate.
Example: If your company is setting up a web server for the Sales 
department, enter Sales for your organizational unit.
 http://wwwwidgels.abccomgany.com
www.widge‘sabccompanycom
 
http://wwwwidgels.abccomgany.com
www.widge‘sabccompanycom
 
10: Security Settings
MatchPort® AR Embedded Device Server User Guide 98
3. Click Submit.
     Common Name Enter the same name that the user will enter when requesting your web 
site. 
Example: If a user enters http://www.widgets.abccompany.com to 
access your web site, the Common Name would be 
www.widgets.abccompany.com. 
     Expires Enter the expiration date, in mm/dd/yyyy format, for the new self-signed 
certificate.
Example: An expiration date of May 9, 2010 is entered as 05/09/2010.
     Key length Select the bit size of the new self-signed certificate. Choices are:
512 bits
768 bits
1024 bits
The larger the bit size, the longer it takes to generate the key. Approximate 
times are: 
10 seconds for a 512-bit RSA key
30 seconds for a 768-bit RSA key
1 minute for a 1024-bit RSA key
30 seconds for a 512-bit DSA key
2 minutes for a 768-bit DSA key
6 minute for a 1024-bit DSA key 
     Type Select the type of key:
RSA = Public-Key Cryptography algorithm based on large prime 
numbers, invented by Rivest Shamir and Adleman. Used for encryption 
and signing. 
DSA = Digital Signature Algorithm also based on large prime numbers, 
but can only be used for signing. Developed by the US government to 
avoid the patents on RSA.
SSL Settings (continued) Description

MatchPort® AR Embedded Device Server User Guide 99
11: Modbus
Modbus ASCII/RTU based serial slave devices can be connected via the ethernet through an 
existing Modbus TCP/IP network.  Any device having access to a given Modbus implementation 
will be able to perform full range of operations that the implementation supports.   Modbus/TCP 
uses a reserved TCP port of 502 and include a single byte function code (1=255) preceded by a 6 
byte header:
Table 11-1  6 Byte Header of Modbus Application Protocol
CP Control via Modbus
Default groups are mapped to Modbus registers.  CPs added to groups will result in the CP being 
read and written based on the reading or writing to the register which maps to that CP group.  
Default Modbus group names include:
Modbus_Ctl_In
Modbus_Ctl_Out
Note: Refer to Chapter 8: CPM: Groups on page 62 for instructions on adding a CP to a 
Group.  
When the Modbus slave address is set to 0xFF, the message is addressed to the internal default 
groups and thus processed by the MatchPort AR embedded device server. The Modbus 'local 
slave' supported functions are listed in the table below. 
Table 11-2  Modbus Local Slave Functions - Query
Transaction ID (2 bytes) Identification of request/response transaction - copied by slave
Protocol ID (2 bytes) 0 - Modbus protocol
Length (2 bytes) Number of following bytes includes the unit identifier
Address (1 byte) Identification of remove slave
Name Number Address 
Hi [0]
Address
Lo [1]
Data Hi
[2]
Data Lo
[3]
Bytes 
Count [4]
Value [5]
Read Coils 0x01 0x00 0x00-0x02
Starting CP
CP1 – CP3
0x00 0x01-0x03
No of CPs to 
output
N/A N/A
Read Input 
status
0x02 0x00 0x00-0x02
Starting CP
CP1 – CP3
0x00 0x01-0x03
No of CPs to 
output
N/A N/A
Read Holding 
Registers
0x03 0x00 0x00-0x02
Starting CP
CP1 – CP3
0x00 0x01-0x03
No of CPs to 
output
N/A N/A
Read Input 
Registers
0x04 0x00 0x00-0x02
Starting CP
CP1 – CP3
0x00 0x01-0x03
No of CPs to 
output
N/A N/A

11: Modbus
MatchPort® AR Embedded Device Server User Guide 100
Table 11-3  Modbus Local Slave Functions - Response
Force Single Coil 0x05 0x00 0x00-0x02
Output CP
CP1 – CP3
0xff (set CPx 
to 1) or
0x00 (set CPx 
to 0)
0x00 N/A N/A
Preset Single 
Register
0x06 0x00 0x00-0x02
CP1 – CP3
0x00 0x00  or 0x01 N/A N/A
Force Multiple 
Coils
0x0F 0x00 0x00-0x02
Starting CP
CP1 – CP3
0x00 0x01-0x03
No of CPs to 
set
0x01 0B00000xyz
CP values ,Lo 
CP# in low bit
Preset Multiple 
Registers
0x10 0x00 0x00-0x02
Starting CP
CP1 – CP3
0x00 0x01-0x03
No of CPs to 
set
0x02-0x06
(No of CPs 
to set) * 2
Max [6]..
0x00, 0x0Y
0x00 ,0x0Y
0x00, 0x0Y
Y = 0 or 1
Read/Write 4X 
Registers
0x17 0x00 0x00-0x02
Starting CP
CP1 – CP3 to 
read
0x00 0x01-0x03
Quantity to 
read
0x00 0x00-0x02
Starting CP
CP1 – CP3 to 
write
0x00 0x01-0x03
Quantity to 
write
0x02-0x06
(Quantity to 
write) * 2
Max [6]..
0x00, 0x0Y
0x00 ,0x0Y
0x00, 0x0Y
Y = 0 or 1
Name Number Byte 
Count
Data [0] Data [1] Data 
[2]
Data [3] Data
[4]
Data [5]
Read 
Coils
0x01 0x01 0B00000xyz
CP output 
values ,Lo CP# 
in high bit
N/A N/A N/A N/A N/A
Read 
Input 
status
0x02 0x01 0B00000xyz
CP output 
values ,Lo CP# 
in high bit
N/A N/A N/A N/A N/A
Read 
Holding 
Registers
0x03 0x02-0x06 0x00 Starting CP 
Value
0x00 or 0x01
0x00 Next CP  or 
End CP value
0x00 or 0x01
0x00 End CP value
0x00 or 0x01
Read 
Input 
Registers
0x04 0x02-0x06 0x00 Starting CP 
Value
0x00 or 0x01
0x00 Next CP  or 
End CP value
0x00 or 0x01
0x00 End CP value
0x00 or 0x01
Force 
Single 
Cell
0x05 Echo query Echo query Echo query Echo 
query
N/A N/A N/A
Preset 
Single 
Register
0x06 Echo query Echo query Echo query Echo 
query
N/A N/A N/A
Name Number Address 
Hi [0]
Address
Lo [1]
Data Hi
[2]
Data Lo
[3]
Bytes 
Count [4]
Value [5]

11: Modbus
MatchPort® AR Embedded Device Server User Guide 101
Serial Transmission Mode
Evolution OS® products can be set up to communicate on standard Modbus networks using either 
RTU or ASCII.  Users select the desired mode and serial port communication parameters (baud 
rate, parity mode, etc) when in the line configuration options.
Table 11-4  Modbus Transmission Modes
The Modbus web pages allow you to check Modbus status and make configuration changes.  This 
chapter contains the following sections:
 Modbus Statistics
 Modbus Configuration
Force 
Multiple 
Coil
0x0F Echo query Echo query Echo query Echo 
query
N/A N/A N/A
Preset 
Multiple 
Registers
0x10 Echo query Echo query Echo query Echo 
query
N/A N/A N/A
Read/
Write 4X 
Registers
0x17 0x02-0x06
(Quantity of 
Read) * 2
Max [6]..
0x00, 0x0Y
0x00 ,0x0Y
0x00, 0x0Y
Y = 0 or 1
RTU ASCII
Address:  8 bits (0 to 247 decimal, 0 is used 
for broadcast)
Function: 8 bits (1 to 255, 0 is not valid)
Data: N X 8 bits (N=0 to 252 bytes)
CRC Check: 16 bits
Address:  2 CHARS
Function: 2 CHARS
Data: N CHARS (N=0 to 252 CHARS)
LRC Check: 2 CHARS
Name Number Byte 
Count
Data [0] Data [1] Data 
[2]
Data [3] Data
[4]
Data [5]
 Conngnmlon
Modbus Statistics
 
 
 
51m: Up
Pom 5:12
Lm Connenion: local 5132 <‘ 172.19="" 2115="" 11139133="" upflmo:="" 11="" days="" 112352:="" total="" pdu:="" in:="" i:="" tonal="" pdu:="" mm="" 11="" total="" connections:="" 1="" local="" 502="">‘><-172,1a 20510:?enrallq_ll]="" uptima‘="" 11="" days="" 02="" 35.45="" fdus="" in,="" el="" fdus="" 0m:="" :1="" cullen!="" connections="" sme:="" up="" fun:="" 535="" lasl="" connection:="" (mime)="" uplimn:="" a="" days="" 132="" 35:53="" total="" pdu:="" in:="" toul="" pdu:="" 0m:="" total="" connonlons:="" cullen!="" connections:="" total="" pdu:="" in:="" tolal="" pdui="" out:="" exception="" count:="">-172,1a>
 
 
 
 
Conngnmlon
Modbus Statistics
 
 
 
51m: Up
Pom 5:12
Lm Connenion: local 5132 <‘ 172.19="" 2115="" 11139133="" upflmo:="" 11="" days="" 112352:="" total="" pdu:="" in:="" i:="" tonal="" pdu:="" mm="" 11="" total="" connections:="" 1="" local="" 502="">‘><-172,1a 20510:?enrallq_ll]="" uptima‘="" 11="" days="" 02="" 35.45="" fdus="" in,="" el="" fdus="" 0m:="" :1="" cullen!="" connections="" sme:="" up="" fun:="" 535="" lasl="" connection:="" (mime)="" uplimn:="" a="" days="" 132="" 35:53="" total="" pdu:="" in:="" toul="" pdu:="" 0m:="" total="" connonlons:="" cullen!="" connections:="" total="" pdu:="" in:="" tolal="" pdui="" out:="" exception="" count:="">-172,1a>11: Modbus
MatchPort® AR Embedded Device Server User Guide 102
Modbus Statistics
This read-only web page displays the current connection status of the Modbus servers listening on 
the TCP ports.  When a connection is active, the remote client information is displayed as well as 
the number of PDUs that have been sent and received. Additionally, a Kill link will be present 
which can be used to kill the connection.
To view modbus statistics:
1. Click Modbus on the menu bar and click Statistics at the top of the page. The Modbus 
Statistics page appears.
Figure 11-5  Modbus Statistics
 Slalisfics Configumlion
Modbus Configuration
TCP Selvel Slale: C‘ On :‘3 Off
Alldilimml
TCP Selvel Poll: “a"?
Response Tilueoul: anon mlmsmnus
RSS Tmce lnplll am (a m,
 
 
Slalisfics Configumlion
Modbus Configuration
TCP Selvel Slale: C‘ On :‘3 Off
Alldilimml
TCP Selvel Poll: “a"?
Response Tilueoul: anon mlmsmnus
RSS Tmce lnplll am (a m,
 
 
 
 
11: Modbus
MatchPort® AR Embedded Device Server User Guide 103
Modbus Configuration
This web page shows the current negotiated Modbus settings and allows configuration changes. 
To view and configure the Modbus Server:
1. Click Modbus on the menu bar and then click Configuration at the top of the page. The 
Modbus Configuration page appears. 
Figure 11-6  Modbus Configuration
2. Enter or modify the following settings:
Table 11-7  Modbus Configuration
3. Click Submit. The changes take effect immediately. 
Note: The serial line protocol must also be configured for Modbus, in addition to 
configuring the Modbus server. See Chapter 6: Line and Tunnel Settings on page 33 for 
details.
Modbus Configuration 
Settings
Description
TCP Server State If On, the Modbus server is active on TCP 502.
Additional TCP Server Port If present, is used in addition to TCP port 502.
Response Timeout The number of milliseconds to wait for a response on the serial 
side.  The device returns exception code 11 to the network 
master controller if the slave serial device fails to reply within 
this time out.
RSS Trace Input If On, each PDU received on the Modbus serial line creates a 
non-persistent descriptive item in the RSS feed.
 Figure 1
 
2-1 Filesystem Sta
 
 
statistiis Blows.
Filesystem Statistics
Filesysiem Sile:
Available Space:
Clean Space:
Dilly Space:
File a Dir 5pm Unit:
mm Space Used:
lube! ol File
 
lube] oi nlis:
 
Opened Files:
Locked Files:
Opened (or Slim 1]:
c" em Bank:
Fw Seclois:
Bank A Semis
 
Bank B Seaolm
Busy:
Actions:
liel olSyslelii Files:
7 500000 Mbyles (7054320 byies)
7 474250 Mbytes (7037320 byies) (99%)
7 336500 Mbyles (7592972 hyles) (37%)
(40 964 Kbytes (144340 bytes) (we)
25 357 Kbyies WEBB bytes) (0%)
22 030 Kby'es (23(94 bytes)
0
DJGGUND
02 , 07, a eiase cycles
00 2 57, 0 eiase cycles
00 - 127‘ 2 class cycles
N0
[52mm] liwmal]
Figure 1
 
2-1 Filesystem Sta
 
 
statistiis Blows.
Filesystem Statistics
Filesysiem Sile:
Available Space:
Clean Space:
Dilly Space:
File a Dir 5pm Unit:
mm Space Used:
lube! ol File
 
lube] oi nlis:
 
Opened Files:
Locked Files:
Opened (or Slim 1]:
c" em Bank:
Fw Seclois:
Bank A Semis
 
Bank B Seaolm
Busy:
Actions:
liel olSyslelii Files:
7 500000 Mbyles (7054320 byies)
7 474250 Mbytes (7037320 byies) (99%)
7 336500 Mbyles (7592972 hyles) (37%)
(40 964 Kbytes (144340 bytes) (we)
25 357 Kbyies WEBB bytes) (0%)
22 030 Kby'es (23(94 bytes)
0
DJGGUND
02 , 07, a eiase cycles
00 2 57, 0 eiase cycles
00 - 127‘ 2 class cycles
N0
[52mm] liwmal]
 
 
 
MatchPort® AR Embedded Device Server User Guide 104
12: Maintenance and Diagnostics Settings
This chapter describes maintenance and diagnostic methods and contains the following sections:
 Filesystem Settings
 Protocol Stack Settings
 IP Address Filter
 Query Port 
 Diagnostics
 System Settings
Filesystem Settings
The  embedded device server uses a flash filesystem to store files. Use the Filesystem option to 
view current file statistics or modify files. There are two subsections: Statistics and Browse.
The Statistics section of the Filesystem web page shows current statistics and usage information 
of the flash filesystem. In the Browser section of the Filesystem web page,  you can create files 
and folders, upload files, copy and move files, and use TFTP.
Filesystem Statistics
This page shows various statistics and current usage information of the flash filesystem. 
To view filesystem statistics:
1. Select Filesystem on the menu 
bar. The Filesystem page opens 
and shows the current filesystem 
statistics and usage.
To compact or format the filesystem:
1. Back up all files as necessary.
2. Select Filesystem on the menubar, 
if you are not already  in the 
Filesystem page.
3. Click Compact in the Actions row.
Note: The compact should not be 
needed under normal circumstances as 
the system manages this automatically.
4. Back up all files before you perform 
the next (Format) step, because all 
user files get erased in that step.
5. Click Format in the Actions row. 
The configuration gets retained.
Figure 12-1  Filesystem Statistics
 Slallsllrs Bmwse
Filesystem Browser
a /
 
Create
Flle:
 
Direanry:
 
Upload File
:1
 
 
 
Copy File
 
 
Move
 
 
TFTP
Action: 062! ON
Mode: OAscn OBInavy
Local Flle:
 
 
Host:
Pon:
 
 
 
Slallsllrs Bmwse
Filesystem Browser
a /
 
Create
Flle:
 
Direanry:
 
Upload File
:1
 
 
 
Copy File
 
 
Move
 
 
TFTP
Action: 062! ON
Mode: OAscn OBInavy
Local Flle:
 
 
Host:
Pon:
 
 
 
 
12: Maintenance and Diagnostics Settings
MatchPort® AR Embedded Device Server User Guide 105
Filesystem Browser
To browse the filesystem:
1. Select Filesystem on the menu bar and then Browse at the top of the page. The Filesystem 
Browser page opens.
Figure 12-2  Filesystem Browser
2. Select a filename to view the contents.

12: Maintenance and Diagnostics Settings
MatchPort® AR Embedded Device Server User Guide 106
3. Click the X next to a filename to delete the file or directory. You can only delete a directory if it 
is empty.
4. Enter or modify the following settings:
Note: Changes apply to the current directory view. To make changes within other 
folders, select the folder or directory and then enter the parameters in the settings listed 
below.
Table 12-3  Filesystem Browser
Filesystem Browser 
Settings
Description
Create
     File Enter the name of the file you want to create, and then click Create.
     Directory Enter the name of the directory you want to create, and then click 
Create.
    Upload File Enter the path and name of the file you want to upload by means of 
HTTP/HTTPS or use the Browse button to select the file, and then 
click Upload.
Copy File
     Source Enter the location where the file you want to copy resides.
     Destination Enter the location where you want the file copied. 
After you specify a source and destination, click Copy to copy the file.
Move
     Source Enter the location where the file you want to move resides.
     Destination Enter the location where you want the file moved. 
After you specify a source and destination, click Move to move the file.
TFTP
     Action Select the action that is to be performed via TFTP:
Get = a “get” command will be executed to store a file locally.
Put = a “put” command will be executed to send a file to a remote 
location.
     Mode Select a TFTP mode to use. Choices are:
ASCII
Binary
     Local File Enter the name of the local file on which the specified “get” or “put” 
action is to be performed.
     Remote File Enter the name of the file at the remote location that is to be stored 
locally (“get’) or externally (“put”).
     Host Enter the IP address or name of the host involved in this operation.
     Port Enter the number of the port involved in TFTP operations on which the 
specified TFTP get or put command will be performed. 
Click Transfer to perform the TFTP transfer.
 TCP IP ICMP ARP SMTP
TCP
Collllgnmtlon
Send R515: (5) Enabled O Dasabwu
Ack Limit: 3 paEkEIs
Send Data: 6* Standard O Expadmad
Max Relmus: 12
Max Relmns Syn Ack: 2
Max Timeout: 5n setunds
Slalisfits
Total Out R515:
Total In R515: 5
 
 
TCP IP ICMP ARP SMTP
TCP
Collllgnmtlon
Send R515: (5) Enabled O Dasabwu
Ack Limit: 3 paEkEIs
Send Data: 6* Standard O Expadmad
Max Relmus: 12
Max Relmns Syn Ack: 2
Max Timeout: 5n setunds
Slalisfits
Total Out R515:
Total In R515: 5
 
 
 
 
12: Maintenance and Diagnostics Settings
MatchPort® AR Embedded Device Server User Guide 107
Protocol Stack Settings
In the Protocol Stack web page, you can configure TCP, IP, ICMP, SMTP and ARP.
TCP Settings
To configure the TCP network protocol:
1. Select Protocol Stack on the menu bar.
2. Select TCP.  
Figure 12-4  TCP Protocol
3. Modify the following settings:
Table 12-5  TCP Protocol Settings
Protocol Stack
TCP Settings
Description
Send RSTs Click Enabled to send RSTs or Disabled to stop sending RSTs. TCP contains six 
control bits, with one or more defined in each packet. RST is one of the control bits. 
The RST bit is responsible for telling the receiving TCP stack to end a connection 
immediately. 
Note: Setting the RSTs may pose a security risk.
Ack Limit Enter a number to limit how many packets get received before an ACK gets forced. 
If there is a large amount of data to acknowledge, an ACK gets forced. If the sender 
TCP implementation waits for an ACK before sending more data even though the 
window is open, setting the Ack Limit to 1 packet  improves performance by forcing 
immediate acknowledgements.
Send Data The Send Data selection governs when data may be sent into the network. The 
Standard implementation waits for an ACK before sending a packet less than the 
maximum length. Select Expedited to send data whenever the window allows it.
 TCP IP ICMP ARP SMTP
IP
Configuration
IP Time to live: 54 hups
Mu cast Time to Live: 1 nap;
 
 
TCP IP ICMP ARP SMTP
IP
Configuration
IP Time to live: 54 hups
Mu cast Time to Live: 1 nap;
 
 
 
 
12: Maintenance and Diagnostics Settings
MatchPort® AR Embedded Device Server User Guide 108
4. Click Submit.
IP Settings
To configure the network protocol settings for IP:
1. Select Protocol Stack on the menu bar.
2. Select IP.  
Figure 12-6  IP Protocol 
3. Modify the following settings:
Table 12-7  IP Protocol  Settings
4. Click Submit. 
Max Retrans Enter the maximum number of retransmissions of a packet that will be attempted 
before failing.
Max Retrans Syn/Ack Enter the maximum number of retransmissions of a SYN that will be attempted 
before failing.  It is lower than “Max Retrans” to thwart denial-of-service attacks.
Max Timeout Enter the maximum time between retransmissions.
Protocol Stack
IP Settings
Description
IP Time to Live This value typically fills the Time To Live in the IP header. SNMP refers to this 
value as "ipDefaultTTL". 
Enter the number of hops to be transmitted before the packet is discarded. 
Multicast Time to Live This value fills the Time To Live in any multicast IP header. Normally this value 
will be one so the packet will be blocked at the first router.  It is the number of 
hops allowed before a Multicast packet is discarded. 
Enter the value to be greater than one to intentionally propagate multicast 
packets to additional routers.
Protocol Stack
TCP Settings 
Description
 TCP IP ICMP ARP SMTP
ICMP
Configuration
sme: EIEnzbled C Dlsakfled
 
 
TCP IP ICMP ARP SMTP
ICMP
Configuration
sme: EIEnzbled C Dlsakfled
 
 
 
 
12: Maintenance and Diagnostics Settings
MatchPort® AR Embedded Device Server User Guide 109
ICMP Settings
To configure the ICMP network protocol:
1. Select Protocol Stack on the menu bar.
2. Select ICMP.  
Figure 12-8  ICMP Protocol
3. Select the appropriate state.
4. Click Submit. 
Table 12-9  ICMP Settings
Protocol Stack
ICMP Settings
Description
State The State selection is used to turn on/off processing of ICMP messages. 
This includes both incoming and outgoing messages.  Choose Enabled or 
Disabled.
 TCF‘ IP ICMP ARP SMTP
ARP
Conflgnlaflon
0 hours
ARP Timenul: 1 1mmmes
0 sacnuds
ARP Cache
IP Address:
MAC Addtess:
 
Address A; MM: Address Type Imam:
172191003 Remove] so 0016 76 D123 50 Dynamic 1
17219 217 2 [Remove] 43 3 DD 251131) C16 Dynamlc 1
17219 39 20 Remove] 41 8 [JD 01 23 11219 36 Dynamlc 1
1721911 Remme] 154 U“ H) 2109 3d 14 Dynamuc 1
17219 H 1 Remove] 7 7 110 do DA'HZ C0 DU Dynamlc 1
17219 250 250 Remow U U [m 2511 3147M} Dynamc 1
17219100181[R9mm‘e] 15 7 001517-42 6d 51 Dynamlc 1
17219 39 23 Remove] 6 2 [1017 31-3719 71 DynaMIc 1
Remove AH
 
 
TCF‘ IP ICMP ARP SMTP
ARP
Conflgnlaflon
0 hours
ARP Timenul: 1 1mmmes
0 sacnuds
ARP Cache
IP Address:
MAC Addtess:
 
Address A; MM: Address Type Imam:
172191003 Remove] so 0016 76 D123 50 Dynamic 1
17219 217 2 [Remove] 43 3 DD 251131) C16 Dynamlc 1
17219 39 20 Remove] 41 8 [JD 01 23 11219 36 Dynamlc 1
1721911 Remme] 154 U“ H) 2109 3d 14 Dynamuc 1
17219 H 1 Remove] 7 7 110 do DA'HZ C0 DU Dynamlc 1
17219 250 250 Remow U U [m 2511 3147M} Dynamc 1
17219100181[R9mm‘e] 15 7 001517-42 6d 51 Dynamlc 1
17219 39 23 Remove] 6 2 [1017 31-3719 71 DynaMIc 1
Remove AH
 
 
 
 
12: Maintenance and Diagnostics Settings
MatchPort® AR Embedded Device Server User Guide 110
ARP Settings
To configure the ARP network protocol:
1. Select Protocol Stack on the menu bar.
2. Select ARP.  
Figure 12-10  ARP Protocol Page
3. Modify the following settings:
Table 12-11  ARP Settings
Protocol Stack
ARP Settings
Description
ARP Timeout This is the maximum duration an address remains in the cache.  
Enter the time, in hours, minutes and seconds. 
IP Address Enter the IP address to add to the ARP cache.
 TCP IP ICMP ARP SMTP
SMTP
Configumlinn
Relay
Addless:
Renmle Poll: 25
 
 
TCP IP ICMP ARP SMTP
SMTP
Configumlinn
Relay
Addless:
Renmle Poll: 25
 
 
 
 
12: Maintenance and Diagnostics Settings
MatchPort® AR Embedded Device Server User Guide 111
Note: Both the IP and MAC addresses are required for the ARP cache.
4. Click Submit for ARP or Add after supplying both address fields for ARP cache. 
5. Remove entries from the ARP cache, as desired:
-Click Remove All to remove all entries in the ARP cache.
OR
-Click Remove beside a specific entry to remove it from the ARP cache.
SMTP Settings
SMTP is configuration for a basic SMTP proxy.  An SMTP proxy in this sense is a simple 
forwarding agent. 
Note: Lantronix does not support SMTP AUTH or any other authentication or encryption 
schemes for email.  Please see  Email Settings for additional information.
To configure the SMTP network protocol:
1. Select Protocol Stack on the menu bar.
2. Select SMTP.
Figure 12-12  SMTP
3. Modify the following settings:
MAC Address Enter the MAC address to add to the ARP cache.
Table 12-13  SMTP Settings
Protocol Stack SMTP 
Settings
Description
Relay Address Address of all outbound email messages through a mail server.  
Can contain either a hostname or an IP address. 
Remote Port Port utilized for the delivery of outbound email messages.
Table 12-11  ARP Settings
Protocol Stack
ARP Settings (continued)
Description
 IP Address Filter
IP Address:
NeMmk Mask:
 
CUTIE!“ State
The ”7 F‘lterTab‘e \S empty so ALL addvessei ave aHowed
 
 
IP Address Filter
IP Address:
NeMmk Mask:
 
CUTIE!“ State
The ”7 F‘lterTab‘e \S empty so ALL addvessei ave aHowed
 
 
 
 
12: Maintenance and Diagnostics Settings
MatchPort® AR Embedded Device Server User Guide 112
4. Click Submit.
IP Address Filter
The IP address filter specifies the hosts and subnets permitted to communicate with the  
MatchPort AR embedded device server. When the filter list is empty, then all IP addresses are 
allowed.
Note: If using DHCP/BOOTP, ensure the DHCP/BOOTP server is in this list.
To configure the IP address filter:
1. Select IP Address Filter on the menu bar. The IP Address Filter page opens to display the 
current configuration.
Figure 12-14  IP Address Filter Configuration
Note: If you enter any filter, be careful to make sure that your network IP address is 
covered.  Otherwise you will loose access to the MatchPort AR unit.  You will have to then 
access the MatchPort AR embedded device serverfrom a different computer to reset the 
configuration.
2. Enter or modify the following settings:
Table 12-15  IP Address Filter Settings
3. Click Add. 
Note: In the Current State table, click Remove to delete any existing settings, as 
necessary.
IP Address Filter  
Settings
Description
IP Address Enter the IP address to add to the IP filter table.
Network Mask Enter the IP address’ network mask in dotted notation.
 Query Port
00er Pm! Server: OOH 00"
Current Configuration and Statistics
Query Port Sums: 0n (mnnlng)
 
 
In Valid Queries: 135
In Unknown Que es: 124
In Erroneous Packers: 0
0m Query Repli 135
um Errors: 0
L351 Conneminn: 172 19 22950 28633
 
 
 
Query Port
00er Pm! Server: OOH 00"
Current Configuration and Statistics
Query Port Sums: 0n (mnnlng)
 
 
In Valid Queries: 135
In Unknown Que es: 124
In Erroneous Packers: 0
0m Query Repli 135
um Errors: 0
L351 Conneminn: 172 19 22950 28633
 
 
 
12: Maintenance and Diagnostics Settings
MatchPort® AR Embedded Device Server User Guide 113
Query Port 
The query port (0x77FE) is used for the automatic discovery of the device by the DeviceInstaller 
utility. Only 0x77FE discover messages from DeviceInstaller are supported. For more information 
on DeviceInstaller, see Using DeviceInstaller (on page 22).
To configure the query port server:
1. Select Query Port on the menu bar. The Query Port page opens to display the current 
configuration.
Figure 12-16  Query Port Configuration
2. Select On to enable the query port server.
3. Click Submit. 
 Hardware Ills—ll IP 50mm
Ping Tmcewme Log
Memory Bauer Pools Processes
Diagnostics: Hardware
Current Configuration
cpu Type: DSTnIFX
cpu Speed: 166 666666 MHz
CPU Instruction Cache: 4,000 Kbyles (4096 bytes)
cpu Data Cache: 4 (ma we: (4096 bytes)
RAM Size: aoooooo Mbyles (8388608 byles)
Flash Site: 16,000000 Mbytes (16777216 bytes)
Flush Semi Size: 128 000 Kbyles (13io72 Wes)
Flash Seem Count: 125
Flash ID: flxI
 
 
 
Hardware Ills—ll IP 50mm
Ping Tmcewme Log
Memory Bauer Pools Processes
Diagnostics: Hardware
Current Configuration
cpu Type: DSTnIFX
cpu Speed: 166 666666 MHz
CPU Instruction Cache: 4,000 Kbyles (4096 bytes)
cpu Data Cache: 4 (ma we: (4096 bytes)
RAM Size: aoooooo Mbyles (8388608 byles)
Flash Site: 16,000000 Mbytes (16777216 bytes)
Flush Semi Size: 128 000 Kbyles (13io72 Wes)
Flash Seem Count: 125
Flash ID: flxI
 
 
 
12: Maintenance and Diagnostics Settings
MatchPort® AR Embedded Device Server User Guide 114
Diagnostics
The MatchPort AR embedded device server has several tools to perform diagnostics and view 
device statistics. These include information on:
Hardware
MIB-II
IP Sockets
Ping
Traceroute
Note: Lines 3 and 4 do not apply for MatchPort AR embedded device server.
Log
Memory
Buffer Pools
Processes
Hardware
This read-only page shows the current device’s hardware configuration.
To display hardware diagnostics:
1. Select Diagnostics on the menu bar. The Diagnostics: Hardware page opens and shows the 
current hardware configuration.
Figure 12-17  Diagnostics: Hardware
 Hardware MIBVII IP Socket:
Ping mom-m Log
Mammy Eufler Pools Pm -
 
MIB-ll Network Statistics
lmerface Group
Interface Table
IP Group
IP Address Table
IP Mg T9 MEI; nglg
IP Forward Gloup
IP Forward Table
ICMP Group
TCP Gmup
T n I n
UDP Gvoup
UDP Table
System Gmug
 
 
 
Hardware MIBVII IP Socket:
Ping mom-m Log
Mammy Eufler Pools Pm -
 
MIB-ll Network Statistics
lmerface Group
Interface Table
IP Group
IP Address Table
IP Mg T9 MEI; nglg
IP Forward Gloup
IP Forward Table
ICMP Group
TCP Gmup
T n I n
UDP Gvoup
UDP Table
System Gmug
 
 
 
12: Maintenance and Diagnostics Settings
MatchPort® AR Embedded Device Server User Guide 115
MIB-II Statistics
The MIB-II Network Statistics page shows the various SNMP-served Management Information 
Bases (MIBs) available on the MatchPort AR embedded device server. 
To view MIB-II statistics:
1. Select Diagnostics on the menu bar and then MIB-II at the top of the page menu. The MIB-II 
Network Statistics page opens.
Figure 12-18  MIB-II Network Statistics
2. Click any of the available links to open the corresponding table and statistics. For more 
information, refer to the table below:
Requests for Comments (RFCs)
RFC 1213 Original MIB-II definitions.
RFC 2011 Updated definitions for IP and ICMP.
RFC 2012 Updated definitions for TCP.
RFC 2013 Updated definitions for UDP.
RFC 2096 Definitions for IP forwarding.
 Haldwam MIB-II IP Shekels
Ping Tlacetoute Log
Memory BIIflovPools Procesos
IP Soc ket s
Protml m M memmn Won m
UDP D 0 17219100199161 2552552552550
YCP D D 172191DE| 199 21 255 255 255 255 0 USYEN
LIDP D 0 17219109199 69 255 255 255 255 0
LIDP D D 172191DD 199 514 17219 39 23 514 ESIAEUSHED
YCP D D 172191DD 199 SD 255 255 255 255 D USYEN
LIDP El 0 17219100199 30718 17219 229 5fl32770 ESIAEUSHED
w» u u 17219100199 23 255 255 255 255 u usrew
IO? U U 17219100199 22 255 255 255 255 U USTEN
w: u r. 17219100199 so 17219 250 25mm emausneo
 
 
 
Haldwam MIB-II IP Shekels
Ping Tlacetoute Log
Memory BIIflovPools Procesos
IP Soc ket s
Protml m M memmn Won m
UDP D 0 17219100199161 2552552552550
YCP D D 172191DE| 199 21 255 255 255 255 0 USYEN
LIDP D 0 17219109199 69 255 255 255 255 0
LIDP D D 172191DD 199 514 17219 39 23 514 ESIAEUSHED
YCP D D 172191DD 199 SD 255 255 255 255 D USYEN
LIDP El 0 17219100199 30718 17219 229 5fl32770 ESIAEUSHED
w» u u 17219100199 23 255 255 255 255 u usrew
IO? U U 17219100199 22 255 255 255 255 U USTEN
w: u r. 17219100199 so 17219 250 25mm emausneo
 
 
 
12: Maintenance and Diagnostics Settings
MatchPort® AR Embedded Device Server User Guide 116
IP Sockets
To display open IP sockets:
1. Select Diagnostics on the menu bar and then IP Sockets at the top of the page. The IP 
Sockets page opens and shows all of the open IP sockets on the device.
Figure 12-19  IP Sockets
Ping
MatchPort AR embedded device server uses 56 bytes of data in a ping packet.  Ping size is not 
configurable.
To ping a remote device or computer:
1. Select Diagnostics on the menu bar and then Ping at the top of the page. The Diagnostics: 
Ping page opens.
 Hamwate MIBVII IP Sockets
Ping Tracemute Log
Memory Buflel Pools Processes
Diagnostics: Ping
H054:
Cnum: 3
Timenut 5 seconds
 
 
 
Hamwate MIBVII IP Sockets
Ping Tracemute Log
Memory Buflel Pools Processes
Diagnostics: Ping
H054:
Cnum: 3
Timenut 5 seconds
 
 
 
 
12: Maintenance and Diagnostics Settings
MatchPort® AR Embedded Device Server User Guide 117
Figure 12-20  Diagnostics: Ping
2. Enter or modify the following settings:
Table 12-21  Diagnostics: Ping
3. Click Submit. The results of the ping display in the page.
Traceroute
Here you can trace a packet from the MatchPort AR unit to an Internet host, showing how many 
hops the packet requires to reach the host and how long each hop takes. If you visit a web site 
whose pages appear slowly, you can use traceroute to determine where the longest delays are 
occurring.
To use Traceroute:
1. Select Diagnostics on the menu bar and then Traceroute at the top of the page. The 
Diagnostics: Traceroute page opens.
Diagnostics: 
Ping Settings
Description
Host Enter the IP address or host name for the device to ping.
Count Enter the number of ping packets the device should attempt to 
send to the Host. The default is 3.
Timeout Enter the time, in seconds, for the device to wait for a 
response from the host before timing out. The default is 5 
seconds.
 Hatdwam MIEVII IP Suckels
Ping Tracemule Log
Memory Bufler Pools Flooesses
Diagnostics: Traceroute
Hos 1
   
Traceroute Results
1 172 19 (l 1 2 ms
 
 
 
 
Hnlnlwme MIBVII IP Sockeis
Ping Tmceuome Lou
Memory Bone. Pools Processes
Diagnostics: Log
Configuration
0qu . Dwsabb v
 
 
Hatdwam MIEVII IP Suckels
Ping Tracemule Log
Memory Bufler Pools Flooesses
Diagnostics: Traceroute
Hos 1
   
Traceroute Results
1 172 19 (l 1 2 ms
 
 
 
 
Hnlnlwme MIBVII IP Sockeis
Ping Tmceuome Lou
Memory Bone. Pools Processes
Diagnostics: Log
Configuration
0qu . Dwsabb v
 
 
 
 
12: Maintenance and Diagnostics Settings
MatchPort® AR Embedded Device Server User Guide 118
Figure 12-22  Diagnostics: Traceroute
2. Enter or modify the following setting:
Table 12-23  Diagnostics: Traceroute
3. Click Submit. The results of the traceroute display in the page.
Log
Here you can enable a diagnostics log of configuration items:
To use diagnostics logging:
1. Select Diagnostics on the menu bar and then Log at the top of the page. The Diagnostics: 
Log page opens.
Figure 12-24  Diagnostics: Log
Diagnostics: Traceroute 
Settings
Description
Host Enter the IP address or DNS hostname. This address is used 
to show the path between it and the device when issuing the 
traceroute command.
 Haulwale MIBVII IP Sockets
Ping Tlacelollle Log
Memory BuflerPools houses
 
Diagnostics: Log
 
 
 
 
Configuration
Oulpul:
MuxLeugm: ism \Khyies
SeveuiiyLeveI: \Debug vi
Hunlwme MIBVII IP Sockets
Ping Tlaceloule Log
Memory BllfieIPnols Pmcesses
 
Diagnostics: Log
Conflguullon
Olllpul: LINE 1 v
Sevemy Level: iNouce v
 
 
 
Haulwale MIBVII IP Sockets
Ping Tlacelollle Log
Memory BuflerPools houses
 
Diagnostics: Log
 
 
 
 
Configuration
Oulpul:
MuxLeugm: ism \Khyies
SeveuiiyLeveI: \Debug vi
Hunlwme MIBVII IP Sockets
Ping Tlaceloule Log
Memory BllfieIPnols Pmcesses
 
Diagnostics: Log
Conflguullon
Olllpul: LINE 1 v
Sevemy Level: iNouce v
 
 
 
 
12: Maintenance and Diagnostics Settings
MatchPort® AR Embedded Device Server User Guide 119
2. Select the Output type and select one of the following:
-Disable (default)
-Filesystem
-Line1
-Line 2
Figure 12-25  Diagnostics: Log (Filesystem)
Figure 12-26  Diagnostics: Log (Line 1)
Memory
This read-only web page shows the total memory and available memory (in bytes), along with the 
number of fragments, allocated blocks, and memory status.
To display memory statistics:
1. Select Diagnostics on the menu bar and then Memory at the top of the page. The 
Diagnostics: Memory page appears.
 Haulwnle MIBVII IP Sockets
Plllg
Tlacemllle Log
Mellloly BllfielPools Pumas»
Diagnostics: Memory
  
 
 
 
Maln "up
Tomi Mellloly lllylesl: EEHEIBZEI
Available Memory (bytes): 3132304
Nun-he. Dl mun-en a
largesi Fragment Av 3123055
Allocmell Blacks: 1530
Nlllnher OiAllolS Failed: n
Sums 0K
Hanlwalu Mlllll IP Sackm
Pillg
lmemme Log
Memoly Bllflel Pools Plocesses
Diagnostics: Buffer pools
Buflel Heallels
Clllslel Pool
Size: 2048
Bllflel Heallels
Clllslel Pool
Silo: 2018
NOMoIk Slick HIM" Pool
Total Free Used MaxUsell
512 510 2 l 1
255 254 2 9
Elhemel Dlivel Bullet Pool
Tolal Flee Used MaxUsed
2MB 18M 54 7|]
102A 950 54 69
 
 
 
Haulwnle MIBVII IP Sockets
Plllg
Tlacemllle Log
Mellloly BllfielPools Pumas»
Diagnostics: Memory
  
 
 
 
Maln "up
Tomi Mellloly lllylesl: EEHEIBZEI
Available Memory (bytes): 3132304
Nun-he. Dl mun-en a
largesi Fragment Av 3123055
Allocmell Blacks: 1530
Nlllnher OiAllolS Failed: n
Sums 0K
Hanlwalu Mlllll IP Sackm
Pillg
lmemme Log
Memoly Bllflel Pools Plocesses
Diagnostics: Buffer pools
Buflel Heallels
Clllslel Pool
Size: 2048
Bllflel Heallels
Clllslel Pool
Silo: 2018
NOMoIk Slick HIM" Pool
Total Free Used MaxUsell
512 510 2 l 1
255 254 2 9
Elhemel Dlivel Bullet Pool
Tolal Flee Used MaxUsed
2MB 18M 54 7|]
102A 950 54 69
 
 
 
12: Maintenance and Diagnostics Settings
MatchPort® AR Embedded Device Server User Guide 120
Figure 12-27  Diagnostics: Memory
Buffer Pools
Several parts of the MatchPort AR system use private buffer pools to ensure deterministic memory 
management. 
To display the buffer pools:
1. Select Diagnostics on the menu bar and then Buffer Pools at the top of the page. The 
Diagnostics: Buffer Pools page opens.
Figure 12-28  Diagnostics: Buffer Pools
 Haulware MIBVII IP Sockets
Plug Traceroule log
Memoly 3mm Pools Processes
Diagnostic ' Processes
PID CPU '1' Staci/SIR Process llama
2 99.07% 32/2340 1dle Task
3 0.14% 403/2343 T!meuu\ Server
A 0 44% 1054/4036 Evenl Server
5 0 00% 264/2040 DNS Cache
6 0.01% 476/4096 Ethemel Manage!
7 0 00% 6645330 Snmp Agent
E 0 00% 338/7072 Dynamic 1P Daemon (am)
0 0.00% 440/2048 FTP SeNe!
10 0.00% 564/3372 TFTP SeNe!
11 0 00% 19245120 Sys‘ug
12 0 00% 2476/13003 Hltp1
13 0.55% 2532/13008 Hltp2
14 0.00% 32003008 Him?!
15 0 00% 524/512 H11p0
16 0 00% $573172 Quevy Pun (77FE)
17 0.00% 220/3330 Nelwo!kr>Se!!al Daemun Po!I1
18 0.15% BID/3330 Sev!a1->Ne1wurk Daemon Po!I1
19 0 00% 376/3330 Accept Made Daemun Par”
20 0 00% 343/9216 Canned Made Daemnn Pan1
21 0.00% 812/3192 SMTP Che!!!
22 0.00% 406/2512 Te‘ne1CL1Serve!
23 0 00% ACE/2512 SSH CLI Serve!
24 0 00% $300300 Sena1Cnmmandlme!p!ele!Pnn1
26 0.00% 453051440 VIP Access
27 0.00% 7035120 LPD Daemon
2S 0 00% 10100I420|I| Math Task
Total ylocessol load: 0.93%
043% .50-74% .75»!ou%
cm! Lntl(3 52mm! snapshfls)
 
 
 
Haulware MIBVII IP Sockets
Plug Traceroule log
Memoly 3mm Pools Processes
Diagnostic ' Processes
PID CPU '1' Staci/SIR Process llama
2 99.07% 32/2340 1dle Task
3 0.14% 403/2343 T!meuu\ Server
A 0 44% 1054/4036 Evenl Server
5 0 00% 264/2040 DNS Cache
6 0.01% 476/4096 Ethemel Manage!
7 0 00% 6645330 Snmp Agent
E 0 00% 338/7072 Dynamic 1P Daemon (am)
0 0.00% 440/2048 FTP SeNe!
10 0.00% 564/3372 TFTP SeNe!
11 0 00% 19245120 Sys‘ug
12 0 00% 2476/13003 Hltp1
13 0.55% 2532/13008 Hltp2
14 0.00% 32003008 Him?!
15 0 00% 524/512 H11p0
16 0 00% $573172 Quevy Pun (77FE)
17 0.00% 220/3330 Nelwo!kr>Se!!al Daemun Po!I1
18 0.15% BID/3330 Sev!a1->Ne1wurk Daemon Po!I1
19 0 00% 376/3330 Accept Made Daemun Par”
20 0 00% 343/9216 Canned Made Daemnn Pan1
21 0.00% 812/3192 SMTP Che!!!
22 0.00% 406/2512 Te‘ne1CL1Serve!
23 0 00% ACE/2512 SSH CLI Serve!
24 0 00% $300300 Sena1Cnmmandlme!p!ele!Pnn1
26 0.00% 453051440 VIP Access
27 0.00% 7035120 LPD Daemon
2S 0 00% 10100I420|I| Math Task
Total ylocessol load: 0.93%
043% .50-74% .75»!ou%
cm! Lntl(3 52mm! snapshfls)
 
 
 
 
 
12: Maintenance and Diagnostics Settings
MatchPort® AR Embedded Device Server User Guide 121
Processes
The Processes web page shows all 
the processes currently running on 
the system. It shows the Process ID 
(PID), the percentage of total CPU 
cycles a process used within the 
last three seconds, the total stack 
space available, the maximum 
amount of stack space used by the 
process since it started, and the 
process name.
To display the processes 
running and their associated 
statistics:
1. Select Diagnostics on the 
menu bar and then Processes 
at the top of the page.
Note: The Adobe SVG plug-in is 
required to view the CPU Load 
Graph.
Figure 12-29  Diagnostics: Processes
 System
 
Reboot Device
 
 
Restore Factory Defaults
Fammy De{au\ls
 
Upload New Firmware
 
 
 
Name
Sllolt Name:
 
Long Na
    
 
Current Configurmian
 
Filluwara Velsi .: 5 2 o 0R12
Shon Name: myidwceiservev
Long Name: Lantmmx Devlceme
 
 
 
System
 
Reboot Device
 
 
Restore Factory Defaults
Fammy De{au\ls
 
Upload New Firmware
 
 
 
Name
Sllolt Name:
 
Long Na
    
 
Current Configurmian
 
Filluwara Velsi .: 5 2 o 0R12
Shon Name: myidwceiservev
Long Name: Lantmmx Devlceme
 
 
 
12: Maintenance and Diagnostics Settings
MatchPort® AR Embedded Device Server User Guide 122
System Settings
The MatchPort AR System web page allows for rebooting the device, restoring factory defaults, 
uploading new firmware, configuring the short and long name, and viewing the current system 
configuration.
To configure system settings:
1. Select System on the menu bar. The System page opens.
Figure 12-30  System
2. Configure the following settings:
Table 12-31  System
System Settings Description
Reboot Device Click Reboot to reboot the device. The system refreshes and redirects the 
browser to the device home page.
Restore Factory Defaults Click Factory Defaults to restore the device to the original factory settings. All 
configurations will be lost. The device automatically reboots upon setting back 
to the defaults.

12: Maintenance and Diagnostics Settings
MatchPort® AR Embedded Device Server User Guide 123
3. Click Submit.  
Upload New Firmware Click Browse to locate the firmware file location. Click Upload to install the 
firmware on the device. The device automatically reboots upon the installation 
of new firmware.
Note: Close and reopen the web manager browser upon a firmware update.
Name Enter a new Short Name and a Long Name (if necessary). The Short Name 
maximum is 32 characters. The Long Name maximum is 64 characters. 
Changes take place upon the next reboot.
Note: Additional information about long and short name customization is 
available in Short and Long Name Customization on page 139 of Chapter 15: 
Branding the MatchPort AR Unit.
System Settings (continued) Description
 EIIIaiI1 EmailZ Em
 
3 Email 4
 
Slallslles Conflgurallon SoIIdEmall
Email 1 - Statistics
Senl sllccessfillly:
Rallies:
Not sent due lo exce§ive enols:
 
cam;
III 'I ans!
   
sslou queue:
Log [Clean]
JZfl 15:49 220 Zputt,1nt,lantxonlx,cun chrusafl: xsm mu
Sixvxci, Vazsxun: 59093
12D:15:4S 1mm eng.lancrcnxx.con
lzu:15:49 ZSD>2puccvanJancronxxvcon Hello [172.19.10UV123]
urn-15:49 zso-mm
   
12:. 2513-5sz
12a 25011-11"
12a. zsowzpnmws
xzu: 2507175"
no: zso»xmcxvsnrvscovxs
JZEI' ZSD-bemxme
JZfl zso-nmmmma
129. 2504mm:
12D: 2507mm!
12a: zsorxdxrs GSSAPI mm 1.091)!
)zn- zsn»x»lxps=msnl
12m zso-mm sssux mm mum
JZfl ZED-AUTH=LOGIH
12a. zsorXruuKzsnn
xzu: zsorxaxcflso
12m: 250 UK
)zn- any. nun:(skuppusumyelmuamx,um)
no 250 z LEI Skuppusumyfllm:xun1x,tnn, ,,Sander ox
12a num- TD'
 
 
EIIIaiI1 EmailZ Em
 
3 Email 4
 
Slallslles Conflgurallon SoIIdEmall
Email 1 - Statistics
Senl sllccessfillly:
Rallies:
Not sent due lo exce§ive enols:
 
cam;
III 'I ans!
   
sslou queue:
Log [Clean]
JZfl 15:49 220 Zputt,1nt,lantxonlx,cun chrusafl: xsm mu
Sixvxci, Vazsxun: 59093
12D:15:4S 1mm eng.lancrcnxx.con
lzu:15:49 ZSD>2puccvanJancronxxvcon Hello [172.19.10UV123]
urn-15:49 zso-mm
   
12:. 2513-5sz
12a 25011-11"
12a. zsowzpnmws
xzu: 2507175"
no: zso»xmcxvsnrvscovxs
JZEI' ZSD-bemxme
JZfl zso-nmmmma
129. 2504mm:
12D: 2507mm!
12a: zsorxdxrs GSSAPI mm 1.091)!
)zn- zsn»x»lxps=msnl
12m zso-mm sssux mm mum
JZfl ZED-AUTH=LOGIH
12a. zsorXruuKzsnn
xzu: zsorxaxcflso
12m: 250 UK
)zn- any. nun:(skuppusumyelmuamx,um)
no 250 z LEI Skuppusumyfllm:xun1x,tnn, ,,Sander ox
12a num- TD'MatchPort® AR Embedded Device Server User Guide 124
13: Advanced Settings
This chapter describes the configuration of Email, CLI, and XML. It contains the following sections:
 Email Settings
 Command Line Interface Settings
 XML Settings
Email Settings
The MatchPort AR allows you to 
view and configure email alerts 
relating to the events occurring 
within the system.   Please see 
SMTP Settings on page 111 for 
additional information.
Note: The following section 
describes the steps to configure 
Email 1; these steps also apply to 
the other Email instances.
Email Statistics
This read-only page shows 
various statistics and current 
usage information about the 
email subsystem. When you 
transmit an email, the 
transmission to the SMTP server 
gets logged and displayed in the 
bottom portion of the page.
1. Select Email on the menu 
bar.  The Email web page 
appears. 
2. Select an email number at 
the top of the page.
3. Select Statistics. The Email 
Statistics page for the 
selected email appears.
4. Repeat above steps as 
desired, according to 
additional email(s) available.
Figure 13-1  Email Statistics
 EIImiII EnmilZ Email3 Em H
 
 
To:
C
 
Flom:
Reply To:
Subject
Message
File:
Overrixling
Domain:
Local Pun:
Plinlivy:
T '1‘,“
 
Sewel Poll:
Email Sand:
Smtislics Col
 
gumlion Send Email
Email 1 - Configuration
25
(Randnrm
(TUrgem (,vagh <8>Nmma\ ()an OVery Law
CF Gloup T
Va‘ua I]
 
 
 
 
8>
 
 
EIImiII EnmilZ Email3 Em H
 
 
To:
C
 
Flom:
Reply To:
Subject
Message
File:
Overrixling
Domain:
Local Pun:
Plinlivy:
T '1‘,“
 
Sewel Poll:
Email Sand:
Smtislics Col
 
gumlion Send Email
Email 1 - Configuration
25
(Randnrm
(TUrgem (,vagh <8>Nmma\ ()an OVery Law
CF Gloup T
Va‘ua I]
 
 
 
 
8>13: Advanced Settings
MatchPort® AR Embedded Device Server User Guide 125
Email Configuration
The MatchPort AR embedded device server allows you to view and configure email alerts relating 
to the events occurring within the system. 
To configure email settings:
1. Select Email on the menu bar, if you are not already at the Email web page.
2. Select an email at the top of the page.
3. Select the Configuration submenu.  The Email Configuration page opens to display the 
current email configuration.
Figure 13-2  Email Configuration
4. Enter or modify the following settings:
Table 13-3  Email Configuration
Email – Configuration 
Settings
Description
To Enter the email address to which the email alerts will be sent.  Multiple 
addresses are separated by semicolon (;). Required field if an email is to be 
sent.

13: Advanced Settings
MatchPort® AR Embedded Device Server User Guide 126
5. Click Submit. 
To test your configuration:
a. Send an email immediately by clicking Send Email at the top of the page.  
b. Refer back to the Statistics page for a log of the transaction.
6. Repeat above steps as desired, according to additional email(s) available.
CC Enter the email address to which the email alerts will be copied.  Multiple 
addresses are separated by semicolon (;).
From Enter the email address to list in the From field of the email alert. Required field 
if an email is to be sent.
Reply-To Enter the email address to list in the Reply-To field of the email alert.
Subject Enter the subject for the email alert.
Message File Enter the path of the file to send with the email alert. This file appears within 
the message body of the email.
Overriding Domain Enter the domain name to override the current domain name in EHLO 
(Extended Hello).
Server Port Enter the SMTP server port number. The default is port 25.
Local Port Enter the local port to use for email alerts. The default is a random port 
number.
Priority Select the priority level for the email alert.
Trigger Email Send Configure these fields to send an email based on a CP Group trigger. The 
device sends an email when the specified Value matches the current Group’s 
value.  The Value field appears once the CP Group is identified.
Email – Configuration 
Settings (continued)
Description
 Cnnllgunllon
 
Command Line Interface Statistics
Salvo! Slams:
Lad Connection:
Upvlmc:
Inlal Byte: In:
Total Bytes 0m:
Culnm Connlfllnns:
Suva! Slams:
Lm Connection:
Upllmo:
Tutal Byte: In:
Total aym Out:
Cunem Connecllum:
Waning
(None)
0 days19:ZJ:3B
u
0
(None)
Waning
(None)
0 days 19:22:33
0
u
 
 
 
 
 
Cnnllgunllon
 
Command Line Interface Statistics
Salvo! Slams:
Lad Connection:
Upvlmc:
Inlal Byte: In:
Total Bytes 0m:
Culnm Connlfllnns:
Suva! Slams:
Lm Connection:
Upllmo:
Tutal Byte: In:
Total aym Out:
Cunem Connecllum:
Waning
(None)
0 days19:ZJ:3B
u
0
(None)
Waning
(None)
0 days 19:22:33
0
u
 
 
 
 
 
13: Advanced Settings
MatchPort® AR Embedded Device Server User Guide 127
Command Line Interface Settings
The Command Line Interface (CLI) web page enables you to view statistics about the CLI servers 
listening on the Telnet and SSH ports and to configure CLI settings.
CLI Statistics
This read-only page shows the 
current connection status of the 
CLI servers listening on the 
Telnet and SSH ports. When a 
connection is active, the 
following display:
Remote client information
Number of bytes that have 
been sent and received
A Kill link  to terminate the 
connection
To view the CLI Statistics:
1. Select CLI on the menu bar. 
The Command Line 
Interface Statistics page 
appears.
CLI Configuration
On this page you can change CLI settings.
To configure the CLI:
1. Select CLI on the menu and then Configuration at the top of the page. The Command Line 
Interface Configuration page appears.
Figure 13-4  CLI Statistics
 SI.
 
i5 Conngnmion
Command Line Interface Configuration
 
Lonin memd:
 
 
SI.
 
i5 Conngnmion
Command Line Interface Configuration
 
Lonin memd: 13: Advanced Settings
MatchPort® AR Embedded Device Server User Guide 128
Figure 13-5  CLI Configuration
2. Enter or modify the following settings:
Table 13-6  CLI Configuration
3. Click Submit. 
Command Line Interface 
Configuration Settings
Description
Login Password Enter the password for Telnet access.
Enable Level Password Enter the password for access to the Command Mode Enable level. There is 
no password by default.
Quit Connect Line Enter a string to terminate a connect line session and resume the CLI. Type 
<control> before any key the user must press when holding down the Ctrl 
key. An example of such a string is <control>L.
Inactivity Timeout Set an Inactivity Timeout value so the CLI session will disconnect if no data is 
received after the designated time period. Default is 15 minutes.  Enter  a 
value of 0 to disable.
Telnet State Select Disabled to disable Telnet access. Telnet is enabled by default.
Telnet Port Enter the Telnet port to use for Telnet access. The default is 23.
Telnet Max Sessions Maximum number of simultaneous Telnet sessions.  The default is 3 and the 
maximum is 10.
SSH State Select Disabled to disable SSH access. SSH is enabled by default.
SSH Port Enter the SSH port to use for SSH access. The default is 22.
SSH Max Sessions  Maximum number of simultaneous SSH sessions. The default is 3 and the 
maximum is 10.

13: Advanced Settings
MatchPort® AR Embedded Device Server User Guide 129
XML Settings
MatchPort AR embedded device server allows for the configuration of devices by using XML 
configuration records (XCRs). You can export an existing configuration for use on other  devices or 
import a saved configuration file. 
On the XML: Export Configuration web page, you can export the current system configuration in 
XML format. The generated XML file can be imported later to restore a configuration. It can also be 
modified and imported to update the configuration on this MatchPort AR unit or another. The XML 
data can be exported to the browser window or to a file on the file system.
By default, all groups are selected except those pertaining to the network configuration. This is so 
that if you later import the entire XML configuration, it will not break your network connectivity. You 
may select or clear the checkbox for any group.
In the XML: Import System Configuration Page you can import a system configuration from an 
XML file. The XML data can be imported from a file on the file system or uploaded using HTTP. 
The groups to import can be specified by toggling the respective group item or entering a filter 
string. When toggling a group item, all instances of that group will be imported. The filter string can 
be used to import specific instances of a group. The text format of this string is: 
<g>:<i>;<g>:<i>;...
For example, if you only wanted to import the line 1 setting from an XCR, use a filter string of 
line:1. 
Each group name <g> is followed by a colon and the instance value <i>. Each <g> :<i> value is 
separated with a semicolon. If a group has no instance, specify the group name <g> only.
The number of lines available for importing and exporting differ between Lantronix products.  The 
screenshots in this chapter represent one line, as available, for example, on an XPort Pro 
embedded networking module and EDS1100. However, other device networking products (such 
as EDS2100, EDS4100, XPort AR, MatchPort AR embedded networking modules, EDS8/16PS 
and EDS8/16/32PR) support additional lines. 
 ExponCoIIfiunmlioII ExpoIISmlus lIlI|wIICoIIfiglII-1Iioll
XML: Export Configuration
(é) Expoluo lxlowsel
O Expolilo local file
D Exponseclelsfivse unwywuh ememe caulwn) D Colnlneuls
Linesto Expo": [C‘aavAH] [Se‘edAH]
 
1
 
mm
Glo|l|i5l0 Expo": [C‘eavAH] [Se‘ectAHbulNEquvkmg]
am ch :p gmup
dEVIEE emal‘
ethemel 2th
Imp
authentlcanun un
D Interface emu
dlagnushcs
my server has!
 
Imp sewer Itmp
.pmm
 
lme lpd Managam
mudbus ppp quavy pm
'55 sena‘ :ummand 5MP
made
snmp ssh ssh chem
ssh server 55‘ sys‘ug
Icp Ie‘net Ievmmal
Ifip 52mm mum ancapt mnnm Emmett
Iunne‘ mscunnzm Iunns‘ madam Iunne‘ packing
     
mm sena‘ mp ml Impufl mum
 
 
 
ExponCoIIfiunmlioII ExpoIISmlus lIlI|wIICoIIfiglII-1Iioll
XML: Export Configuration
(é) Expoluo lxlowsel
O Expolilo local file
D Exponseclelsfivse unwywuh ememe caulwn) D Colnlneuls
Linesto Expo": [C‘aavAH] [Se‘edAH]
 
1
 
mm
Glo|l|i5l0 Expo": [C‘eavAH] [Se‘ectAHbulNEquvkmg]
am ch :p gmup
dEVIEE emal‘
ethemel 2th
Imp
authentlcanun un
D Interface emu
dlagnushcs
my server has!
 
Imp sewer Itmp
.pmm
 
lme lpd Managam
mudbus ppp quavy pm
'55 sena‘ :ummand 5MP
made
snmp ssh ssh chem
ssh server 55‘ sys‘ug
Icp Ie‘net Ievmmal
Ifip 52mm mum ancapt mnnm Emmett
Iunne‘ mscunnzm Iunns‘ madam Iunne‘ packing
     
mm sena‘ mp ml Impufl mum
 
 
 
 
 
 
 
 
 
13: Advanced Settings
MatchPort® AR Embedded Device Server User Guide 130
XML: Export Configuration
On this web page you can export the 
current system configuration in XML 
format.
To export the system 
configuration:
1. Select XML on the menu bar. 
The XML: Export Configuration 
page appears. 
The number of Lines to Export 
and the specific Groups to 
Export displayed on your 
screen may vary according to 
your particular product.
2. Enter or modify the following 
settings:
Note: Number of lines and groups 
available for export configuration 
vary between Lantronix products.
Table 13-8  XML Export Configuration
3. Click Export. The groups display if exporting the data to the browser. If exporting the data to a 
local file, the file is stored on the file system. 
XML Export 
Configuration 
Settings
Description
Export to browser Select this option to export the XCR data in the selected fields to a web browser.
Export to local file  Select this option to export the XCR data to a file on the device. If you select this option, 
enter a file name for the XML configuration record.
Export secrets Only use this with extreme caution.  If selected, secret password and key information will 
be exported.  Use only with a secure link, and save only in secure locations.
Lines to Export Select the instances you want to export in the line, tunnel, and terminal groups.
Groups to Export Check the configuration groups that are to be exported to the XML configuration record.
Figure 13-7  XML: Export Configuration
 Expo" Col-figumliou Expo" s.
 
us ImponCoIIfiuumlioII
XML: Export Status
:9 Expo" m blowsel
O Expollio local file
Lineslo Expo": [C‘EavAH] [swam]
 
   
1 netwmk
Gmupsvo Expo": [C‘eavAHI [sexed/an]
      
am My pom :p gmup
cps devme amafl
man my mesystem fip
havdwara mm mm lug
IEmp Warfare mu m
Ip sockels \me mu
memmy mudbus \m:a\ mudbus [Ep
slave sewey addltlunal
madbus mp
SEW Pemm‘ processes query pun
vss sessmns ssh
sysmg tap (2mm
mp mnnel udp
wp x5!
 
 
Expo" Col-figumliou Expo" s.
 
us ImponCoIIfiuumlioII
XML: Export Status
:9 Expo" m blowsel
O Expollio local file
Lineslo Expo": [C‘EavAH] [swam]
 
   
1 netwmk
Gmupsvo Expo": [C‘eavAHI [sexed/an]
      
am My pom :p gmup
cps devme amafl
man my mesystem fip
havdwara mm mm lug
IEmp Warfare mu m
Ip sockels \me mu
memmy mudbus \m:a\ mudbus [Ep
slave sewey addltlunal
madbus mp
SEW Pemm‘ processes query pun
vss sessmns ssh
sysmg tap (2mm
mp mnnel udp
wp x5!
   
 
 
 
 
 
 
 
 
 
13: Advanced Settings
MatchPort® AR Embedded Device Server User Guide 131
Note: Most browsers will interpret and display the XML data without the XML tags. To 
view the raw XML, choose the view file source feature of your browser.
XML: Export Status
On this page you can export the 
current system status in XML 
format. The XML data can be 
exported to the browser page or to 
a file on the file system.
To export the system status:
1. Select XML on menu bar and 
then Export Status at the top 
of the page. The XML: Export 
Status page appears.
The number of Lines to 
Export and the specific 
Groups to Export displayed 
on your screen may vary 
according to your particular 
product.
2. Enter or modify the following 
settings:
Note: Number of lines and 
groups available for export vary 
between Lantronix products.
Table 13-10  XML Export Status
3. Click Export. The groups display if exporting the data to the browser. If exporting the data to a 
local file system, the file is stored on the file system. 
Note: Most browsers will interpret and display the XML data without the XML tags. To 
view the raw XML, choose the view file source feature of your browser.
XML: Export System 
Status Settings
Description
Export to browser Select this option to export the XML status record to a web browser.
Export to local file  Select this option to export the XML status record to a file on the device. If you 
select this option, enter a file name for the XML status record.
Lines to Export Select the instances you want to export in the line,  tunnel, and terminal groups.
Groups to Export Check the configuration groups that are to be exported into the XML status record.
Figure 13-9  XML: Export Status
 Expon Configuration Expon sums Impon Configunflion
XML: Import Configuration
Impon:
OConfigurauon imm Baemal file
OConfigulaImn [mm Fnesysxem
 
OLme(sHmm smgle lme Semngs on me Filesyslem
 
 
 
ExpollConiiguIalion ExpollSlalus InIpoIlCoIIliguIauI
XML: Import Configuration
llllpoII callfigulalinll ilolll (elllilei exl
|:|
 
ml XCR file:
 
 
 
 
Expon Configuration Expon sums Impon Configunflion
XML: Import Configuration
Impon:
OConfigurauon imm Baemal file
OConfigulaImn [mm Fnesysxem
 
OLme(sHmm smgle lme Semngs on me Filesyslem
 
 
 
ExpollConiiguIalion ExpollSlalus InIpoIlCoIIliguIauI
XML: Import Configuration
llllpoII callfigulalinll ilolll (elllilei exl
|:|
 
ml XCR file:
 
 
 
 
 
13: Advanced Settings
MatchPort® AR Embedded Device Server User Guide 132
XML: Import Configuration
Here you can import a system configuration from an XML file. 
The XML data can be imported from a file on the file system or uploaded using HTTP. The groups 
to import can be specified by toggling the respective group item or entering a filter string. When 
toggling a group item, all instances of that group will be imported. The filter string can be used to 
import specific instances of a group. The text format of this string is:  <g>:<i>;<g>:<i>;...
Each group name <g> is followed by a colon and the instance value <i>. Each <g> :<i> value 
is separated with a semicolon. If a group has no instance, specify the group name <g> only.
To import a system configuration:
1. Select XML on the menu bar and then Import Configuration at the top of the page. The XML: 
Import Configuration web page appears.
Figure 13-11  XML: Import Configuration
2. Click one of the following radio buttons:
-Configuration from External file. See Import Configuration from External File on page 132.
-Configuration from Filesystem. See Import Configuration from the Filesystem on 
page 133.
-Line(s) from single line Settings on the Filesystem. See Import Line(s) from Single Line 
Settings on the Filesystem on page 135.
Import Configuration from External File
This selection shows a field for entering the path and file name of the entire external XCR file you 
want to import. You can also browse to select the XCR file. 
Figure 13-12  XML: Import Configuration from External File
 Expon Col gmalioll Export swam: llnpon Collligulalinll
XML: Import Configuration
llupon collfigmat u «on. me lilesystelu:
FiIeII-lllle
Lines '0 Impon: [CleavAli] [Select/RH]
 
E naiwmk
 
Whole Glollpslolnlpofl: [CizavAll] [SsieciAllbulNeiwurkmg]
 
 
 
   
  
 
 
ch up gmup
magnusucs Email
execute E am oh
“”5‘ aummcamn un
Icmp El interface
.p mm hne
Manageme E mndbus
query pun rss
5min snmp
ssh chant E ssh servev
syslug mp
isvmlnai mp saws!
urinal accept E lunnei connect E tunnel dlscnnneci
E tunnel madam Iunnei packing tunnel senal
E mp mm mm tumvui
 
Tex! List
 
 
 
Expon Col gmalioll Export swam: llnpon Collligulalinll
XML: Import Configuration
llupon collfigmat u «on. me lilesystelu:
FiIeII-lllle
Lines '0 Impon: [CleavAli] [Select/RH]
 
E naiwmk
 
Whole Glollpslolnlpofl: [CizavAll] [SsieciAllbulNeiwurkmg]
 
 
 
   
  
 
 
ch up gmup
magnusucs Email
execute E am oh
“”5‘ aummcamn un
Icmp El interface
.p mm hne
Manageme E mndbus
query pun rss
5min snmp
ssh chant E ssh servev
syslug mp
isvmlnai mp saws!
urinal accept E lunnei connect E tunnel dlscnnneci
E tunnel madam Iunnei packing tunnel senal
E mp mm mm tumvui
 
Tex! List
 
 
 
 
13: Advanced Settings
MatchPort® AR Embedded Device Server User Guide 133
Import Configuration from the Filesystem
This selection shows a page for entering the filesystem and your import requirements – groups, 
lines, and instances. The number of Lines to Import and the specific Whole Groups to Import 
displayed on your screen may vary according to your particular product.
Figure 13-13  XML: Import from Filesystem 

13: Advanced Settings
MatchPort® AR Embedded Device Server User Guide 134
1. Enter or modify the following settings.
Figure 13-14  XML: Import Configuration from Filesystem
2. Click Import.
Import Configuration from 
Filesystem  Settings
Description
Filename Enter the name of the file on the device (local to its filesystem) that contains 
XCR data.
Lines to Import Select the lines or network whose settings you want to import. Click the 
Select All link to select all the serial lines and the network lines. Click the 
Clear All link to clear all of the checkboxes. By default, all line instances 
are selected.
Only the selected line instances will be imported in the line, tunnel, and 
terminal groups.
Whole Groups to Import Select the configuration groups to import from the XML configuration 
record. This option imports all instances of each selected group unless it is 
one of the Lines to Import. 
Note: By default, all groups are checked except those pertaining to the 
network configuration; this is so that import will not break your network 
connectivity. 
You may check or uncheck any group to include or omit that group from 
import. To import all of the groups, click the Select All but Networking link 
to import all groups. To clear all the checkboxes, click the Clear All link. 
Text List Enter a string to import specific instances of a group. The textual format of 
this string is: 
<g>:<i>;<g>:<i>;...
Each group name <g> is followed by a colon and the instance value <i> and 
each <g>:<i> value is separated by a semi-colon. If a group has no 
instance, then specify the group name <g> only. 
Use this option for groups other than those affected by Lines to Import.
 ExponConflgumllon Expun Slams
XML: Import Configuration
llllpon Linem «mm single line seuiugs on me filesysiem:
name
Lllleslo “upon: [CleavAH] [Salem/w]
Fi
 
   
   
    
 
1 mum
Wlmle Gmllpslo Ilium": [glam] [WW]
arp E clI E :p gruup
devlce dlagnosllcs emawl
EMEmEt EXEEute EX‘I ch
np server host E “"F
authenucalmn url
hnp server IEmp D mmrface
Ip Ip fiflev \Ine
lpd Managsme E mndhus
ppp query pun E rss
museenal :ummand 5mm E snmp
ssh ssh :llsm ssh serve!
ssl syslug E (cp
mum Isrmma‘ mp sewer
tunnel canned tunnel dlsEunnEEt
 
mum accept
lurme‘ mudem Iunnel packmg E tunnel senal
 
W m Impufl cunlml
 
 
 
ExponConflgumllon Expun Slams
XML: Import Configuration
llllpon Linem «mm single line seuiugs on me filesysiem:
name
Lllleslo “upon: [CleavAH] [Salem/w]
Fi
 
   
   
    
 
1 mum
Wlmle Gmllpslo Ilium": [glam] [WW]
arp E clI E :p gruup
devlce dlagnosllcs emawl
EMEmEt EXEEute EX‘I ch
np server host E “"F
authenucalmn url
hnp server IEmp D mmrface
Ip Ip fiflev \Ine
lpd Managsme E mndhus
ppp query pun E rss
museenal :ummand 5mm E snmp
ssh ssh :llsm ssh serve!
ssl syslug E (cp
mum Isrmma‘ mp sewer
tunnel canned tunnel dlsEunnEEt
 
mum accept
lurme‘ mudem Iunnel packmg E tunnel senal
 
W m Impufl cunlml
 
 
 
 
 
13: Advanced Settings
MatchPort® AR Embedded Device Server User Guide 135
Import Line(s) from Single Line Settings on the Filesystem
This selection copies line settings from the single line instance in the input file to selected lines. 
The import file may only contain records from a single line instance; this is done by selecting a 
single Line to Export when exporting the file.  The number of Lines to Import and the specific 
Whole Groups to Import displayed on your screen may vary according to your particular product.
To modify Single Line Settings on the Filesystem:
Figure 13-15  XML: Import Line(s) from Single Line Settings on the Filesystem

13: Advanced Settings
MatchPort® AR Embedded Device Server User Guide 136
1. Enter or modify the following settings:
Table 13-16  XML: Import Line(s) from Single Line Settings
2. Click Import.
Import Line(s)  Settings Description
Filename Provide the name of the file on the device (local to its file system) that 
contains XCR data.
Lines to Import Select the line(s) whose settings you want to import. Click the Select All link 
to select all the serial lines and the network lines. Click the Clear All link 
clear all of the checkboxes. By default, all serial line instances are selected.
Whole Groups to Import Select the configuration groups to import from the XML configuration record. 
Note: By default, all groups are checked except those pertaining to the 
network configuration; this is so that import will not break your network 
connectivity. 
You may check or uncheck any group to include or omit that group from 
import. To import all of the groups, click the Select All but Networking link 
to import all groups. To clear all the checkboxes, click the Clear All link. 

MatchPort® AR Embedded Device Server User Guide 137
14: Security in Detail
Public Key Infrastructure
Public key infrastructure (PKI) is based on an encryption technique that uses two keys: a public 
key and private key.  Public keys can be used to encrypt messages which can only be decrypted 
using the private key.  This technique is referred to as asymmetric encryption, as opposed to 
symmetric encryption, in which a single secret key is used by both parties.
TLS (SSL)
Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), use asymmetric 
encryption for authentication. In some scenarios, only a server needs to be authenticated, in 
others both client and server authenticate each other. Once authentication is established, clients 
and servers use asymmetric encryption to exchange a secret key. Communication then proceeds 
with symmetric encryption, using this key.
SSH and some wireless authentication methods on the MatchPort AR embedded device server 
make use of SSL. The MatchPort AR unit supports SSLv2, SSlv3, and TLS1.0.
TLS/SSL application hosts use separate digital certificates as a basis for authentication in both 
directions: to prove their own identity to the other party, and to verify the identity of the other party. 
In proving its own authenticity, the MatchPort AR embedded device server will use its own 
"personal" certificate. In verifying the authenticity of the other party, the MatchPort AR unit will use 
a "trusted authority" certificate.
Digital Certificates
The goal of a certificate is to authenticate its sender. It is analogous to a paper document that 
contains personal identification information and is signed by an authority, for example a notary or 
government agency. With digital certificates, a cryptographic key is used to create a unique digital 
signature. 
Trusted Authorities
A private key is used by a trusted certificate authority (CA) to create a unique digital signature.  
Along with this private key is a certificate of authority, containing a matching public key that can be 
used to verify the authority's signature but not re-create it.
A chain of signed certificates, anchored by a root CA, can be used to establish a sender's 
authenticity.  Each link in the chain is certified by a signed certificate from the previous link, with 
the exception of the root CA. This way, trust is transferred along the chain, from the root CA 
through any number of intermediate authorities, ultimately to the agent that needs to prove its 
authenticity. 
 www ogenssl org or www madboa com/geeklogenssl
 
www ogenssl org or www madboa com/geeklogenssl
 
14: Security in Detail
MatchPort® AR Embedded Device Server User Guide 138
Obtaining Certificates
Signed certificates are typically obtained from well-known CAs, such as VeriSign.  This is done by 
submitting a certificate request for a CA, typically for a fee.  The CA will sign the certificate request, 
producing a certificate/key combo: the certificate contains the identity of the owner and the public 
key, and the private key is available separately for use by the owner.
As an alternative to acquiring a signed certificate from a CA, you can act as your own CA and 
create self-signed certificates. This is often done for testing scenarios, and sometimes for closed 
environments where the expense of a CA-signed root certificate is not necessary.
Self-Signed Certificates
A few utilities exist to generate self-signed certificates or sign certificate requests. The MatchPort 
AR embedded device server also has the ability to generate its own self-signed certificate/key 
combo. You can use XML to export the certificate in PEM format, but you cannot export the key. 
Hence the internal certificate generator can only be used for certificates that are to identify that 
particular MatchPort AR unit.
Certificate Formats
Certificates and private keys can be stored in several file formats. The best known formats are 
PKCS12, DER and PEM. Certificate and key can be in the same file or in separate files. 
Additionally, the key can either be encrypted with a password or left in the clear. However, the 
MatchPort AR embedded device server currently only accepts separate PEM files, with the key 
unencrypted.
Several utilities exist to convert between the formats.
OpenSSL
OpenSSL is a widely used open source set of SSL related command line utilities. It can act as 
server or client. It can also generate or sign certificate requests, and can convert from and to 
several different of formats.
OpenSSL is available in binary form for Linux and Windows.
To generate a self-signed RSA certificate/key combo:
openssl req -x509 -nodes -days 365 -newkey rsa:1024 -keyout mp_key.pem -
out mp_cert.pem
See www.openssl.org or www.madboa.com/geek/openssl for more information.
Note: Signing other certificate requests is also possible with OpenSSL but the details of 
this process are outside the scope of this document.

MatchPort® AR Embedded Device Server User Guide 139
15: Branding the MatchPort AR Unit
This chapter describes how to brand your MatchPort AR embedded device server by using Web 
Manager and Command Line Interface (CLI). It contains the following sections on customization:
 Web Manager Customization
 Short and Long Name Customization 
Web Manager Customization
Customize the Web Manager’s appearance by modifying index.html and style.css. The style 
(fonts, colors, and spacing) of the Web Manager is controlled with style.css and the text and 
graphics are controlled with index.html. 
The Web Manager files are hidden and are incorporated directly into the firmware image but may 
be overridden by placing the appropriate file in the appropriate directory on the AR embedded 
device server file system. 
Web Manager files can be retrieved and overridden with the following procedure:
1. FTP to the MatchPort AR device.
2. Make a directory (mkdir) and name it http/config
3. Change to the directory (cd) that you created in step 2. (http/config)
4. Get the file by using get <filename>
5. Modify the file as required or create a new one with the same name
6. Put the file by using put <filename>
7. Type quit.  The overriding files appear in the file system’s http/config directory.  
8. Restart any open browser to view the changes.  
9. If you wish to go back to the default files in the firmware image, simply delete the overriding 
files from the file system.
Short and Long Name Customization
Short and long names may be customized in Web Manager according to the directions in  System 
Settings. The names display in the CLI show command and in the System web page in the Current 
Configuration table. The short name is used for the show command. Both names display in the CLI 
Product Type field in the following example:
     (enable)# show
The long and short names appear in the Product Type field in the following format:
     Product Type: <long name> (<short name>)
For example:
     (enable)# show 
     Product Information:
     Product Type: Lantronix MatchPort AR (MatchPort AR)
 www.Iantronix.com/suggon/downloads
 
System
 
Reboot Device
 
 
Restore Factory Defaults
Factory Deluults
   
  
  
 
Upload New Firmware
|:|
\m}
Name
Shon Name:
 
 
 
 
Mtg ://
www.Iantronix.com/suggon/downloads
 
System
 
Reboot Device
 
 
Restore Factory Defaults
Factory Deluults
   
  
  
 
Upload New Firmware
|:|
\m}
Name
Shon Name:
 
 
 
 
Mtg ://
 
 
MatchPort® AR Embedded Device Server User Guide 140
16: Updating Firmware
Obtaining Firmware
Obtain up-to-date firmware and release notes for the unit from the Lantronix web site (http://
www.lantronix.com/support/downloads) or by using anonymous FTP (ftp://ftp.lantronix.com/).
Loading New Firmware
Reload the firmware using the device web manager Filesystem page.
To upload new firmware:
1. Select System in the menu bar. The Filesystem page appears.
Figure 16-1  Update Firmware
2. Click Browse to browse to the firmware file.
3. Highlight the file and click Open.
4. Click Upload to install the firmware on the MatchPort AR embedded device server. The device 
automatically reboots on the installation of new firmware.
5. Close and reopen the web manager internet browser to view the device’s updated web pages.
Note: Alternatively, firmware may be updated by sending the file to the MatchPort AR 
embedded device server over a FTP or TFTP connection.
 www amromx om/sugpon/
 
'apan sales@lamronix.com
asiapacific sales@lantronix.com
Ia sales@lantronix.com
www amromx om/sugpon/
 
'apan sales@lamronix.com
asiapacific sales@lantronix.com
Ia sales@lantronix.com
 
MatchPort® AR Embedded Device Server User Guide 141
Appendix A:  Technical Support
If you are unable to resolve an issue using the information in this documentation, please the 
contact Technical Support.
North America
Hours: 6:00am - 5:00pm Pacific Time
Mon. - Fri. (excluding holidays) 
www.lantronix.com/support/
FTP: ftp.lantronix.com
Tel: (800) 422-7044 (US Only)
Tel: (949) 453-7198
Fax: (949) 450-7226 
Europe, Middle East, Africa (EMEA)
www.lantronix.com/support/
Tel: +31 (0)76 52 36 740
Japan
japan_sales@lantronix.com 
Tel: +81-3-6277-8802
Asia / Pacific (APAC)
asiapacific_sales@lantronix.com
Tel: + 852 3428-2338
Latin America & Caribbean
la_sales@lantronix.com
Tel: +1 949 453 3990
 http://www.Iantronix.com/suggort
 
http://www.Iantronix.com/suggort
 
Appendix A: Technical Support
MatchPort® AR Embedded Device Server User Guide 142
Online
Support options listed below are available 24 hours a day, 7 days a week at the Lantronix support 
page at http://www.lantronix.com/support
Download firmware
Search and review Frequently asked Questions (FAQs)
Send a question to technical support
When you report a problem, please provide the following information: 
Your name, and your company name, address, and phone number
Lantronix model number
Lantronix serial number/MAC address
Firmware version (on the first screen shown when you Telnet to the device and type show)
Description of the problem
Status of the unit when the problem occurred (please try to include information on user and 
network activity at the time of the problem) 
Additionally, it may be useful to export and submit the exported XML Configuration file.

MatchPort® AR Embedded Device Server User Guide 143
Appendix B:  Compliance
(According to ISO/IEC Guide 
Manufacturer’s Name & Address:
Lantronix, Inc. 167 Technology Drive, Irvine, CA 92618 USA 
Product Name Model: 
MatchPort® AR Embedded Device Server
Conform to the following standards or other normative documents:
Radiated and Conducted Emissions
CFR Title 47 FCC Part 15, Subpart B and C
Industry Canada ICES-003 Issue 4 2004
VCCI V-3/2007.04
AS/NZS CISPR 22: 2006
EN55022: 1998 + A1: 2000 + A2: 2003
EN61000-3-2: 2000 + A2: 2005
EN61000-3-3: 1995 + A1: 2001 + A2: 2005
Immunity
EN55024: 1998 + A1: 2001 + A2: 2003
Direct & Indirect ESD
EN61000-4-2: 1995
RF Electromagnetic Field Immunity
EN61000-4-3: 2002
Electrical Fast Transient/Burst Immunity
EN61000-4-4: 2004
Surge Immunity
EN61000-4-5: 2006
RF Common Mode Conducted Susceptibility
EN61000-4-6: 1996
Power Frequency Magnetic Field Immunity
EN61000-4-8: 1994
Voltage Dips and Interrupts
EN61000-4-11: 2004
Safety
UL 60950-1
CAN/CSA-C22.2 No. 60950-1-03
EN 60950-1:2001, Low Voltage Directive (73/23/EEC)
 Product Famny Name
Tum: or hazardous Substances and Elemenls
 
Lead (Pb)
Mercury (Hg)
Cadmwum
Hexavalenl
(VD)
Folybrommal
(FEED
Pmybmmmate
emers (PEDE)
 
UDSHUD and 2100
 
EDS
 
M53100
 
InIeH rBox
 
XPress DR & XPress-DR+
 
SecureEux11D|& 21m
 
WrEux
 
Uon
 
MalchPorl
 
SLC
 
XPun
 
WrPun
 
SLE
 
SLP
 
SCS
 
SLS
 
DSC
 
PrermerWave
 
 
MICrO 1 25
 
ooooooooooooooooooo
 
oooooooaooooaoooooo
 
aaaaaaaoaaaaaaaaaaa
 
aaaaaaaaaaaaaaaaaaa
 
aaaaaaaaaaaaaaaaaaa
 
 
ooooooooooooooooooo
 
 
 
Product Famny Name
Tum: or hazardous Substances and Elemenls
 
Lead (Pb)
Mercury (Hg)
Cadmwum
Hexavalenl
(VD)
Folybrommal
(FEED
Pmybmmmate
emers (PEDE)
 
UDSHUD and 2100
 
EDS
 
M53100
 
InIeH rBox
 
XPress DR & XPress-DR+
 
SecureEux11D|& 21m
 
WrEux
 
Uon
 
MalchPorl
 
SLC
 
XPun
 
WrPun
 
SLE
 
SLP
 
SCS
 
SLS
 
DSC
 
PrermerWave
 
 
MICrO 1 25
 
ooooooooooooooooooo
 
oooooooaooooaoooooo
 
aaaaaaaoaaaaaaaaaaa
 
aaaaaaaaaaaaaaaaaaa
 
aaaaaaaaaaaaaaaaaaa
 
 
ooooooooooooooooooo
 
 
Appendix B: Compliance
MatchPort® AR Embedded Device Server User Guide 144
Manufacturer’s Contact:
Lantronix, Inc.
167 Technology Drive, Irvine, CA 92618  USA
Tel:  949-453-3990
Fax: 949-453-3995
RoHS Notice
All Lantronix products in the following families are China RoHS-compliant and free of the following hazardous substances and 
elements:
O: toxic or hazardous substance contained in all of the homogeneous materials for this part is below the limit requirement 
in SJ/T11363-2006.
X:  toxic or hazardous substance contained in at least one of the homogeneous materials used for this part is above the
limit requirement in SJ/T11363-2006.
Lead (Pb)  Mercury (Hg)  Polybrominated biphenyls (PBB)
Cadmium (Cd)  Hexavalent Chromium (Cr (VI))  Polybrominated diphenyl ethers (PBDE)
Product Family Name Toxic or hazardous Substances and Elements
Lead (Pb) Mercury (Hg) Cadmium 
(Cd)
Hexavalent 
Chromium (Cr 
(VI))
Polybrominat
ed biphenyls 
(PBB)
Polybrominate
d diphenyl 
ethers (PBDE)
UDS1100 and 2100 0 0 0 0 0 0
EDS 0 0 0 0 0 0
MSS100 0 0 0 0 0 0
IntelliBox 0 0 0 0 0 0
XPress DR  & XPress-DR+ 0 0 0 0 0 0
SecureBox 1101 & 2101 0 0 0 0 0 0
WiBox 0 0 0 0 0 0
UBox 0 0 0 0 0 0
MatchPort 0 0 0 0 0 0
SLC 0 0 0 0 0 0
XPort 0 0 0 0 0 0
WiPort 0 0 0 0 0 0
SLB 0 0 0 0 0 0
SLP 0 0 0 0 0 0
SCS 0 0 0 0 0 0
SLS 0 0 0 0 0 0
DSC 0 0 0 0 0 0
PremierWave 0 0 0 0 0 0
Micro125 0 0 0 0 0 0

MatchPort® AR Embedded Device Server User Guide 145
Appendix C:  Binary to Hexadecimal Conversions
Many of the unit’s configuration procedures require you to assemble a series of options 
(represented as bits) into a complete command (represented as a byte). 
The resulting binary value must be converted to a hexadecimal representation.
Use this chapter to learn to convert binary values to hexadecimals or to look up hexadecimal 
values in the tables of configuration options. The tables include:
Command Mode (serial string sign-on message)
AES Keys
Converting Binary to Hexadecimal
Conversion Table
Hexadecimal digits have values ranging from 0 to F, which are represented as 0-9, A (for 10), B 
(for 11), etc. To convert a binary value (for example, 0100 1100) to a hexadecimal representation, 
treat the upper and lower four bits separately to produce a two-digit hexadecimal number (in this 
case, 4C). Use the following table to convert values from binary to hexadecimal.
Table C-1  Binary to Hexadecimal Conversion Table
Decimal Binary Hex
0 0000 0
1 0001 1
2 0010 2
3 0011 3
4 0100 4
5 0101 5
6 0110 6
7 0111 7
8 1000 8
9 1001 9
10 1010 A
11 1011 B
12 1100 C
13 1101 D
14 1110 E
15 1111 F
 E Calculator
Edlt View Heb
 
OHu ®Dec One: OBin ®Degees ORafim 0mm
r r
 
 
 
 
 
 
 
Iswl IF-EH [ H 1] [MC] [ 7 H a II a ll / HWHAMI
IdeEwH h] [MR] l '1 H 5 ll 5 H ‘ HDIHMI
IshHWHst [MS] [1 HZII 3” * HMHWI
: lmllmlldl [M H
 
" H'l'H » H ‘ H ' H'ml
mar . E: E a E F
 
 
E Calculator
Edit View Help
 
‘ n
 
DHex ODec ODE! OBh (9wa ODvad OWald OHM
Dim DH» l— l— “E
[5“] m l I n 1 J |ch [ v H a H a II , lelAndl
E] GEEK].-
m E] IIIQEJE]
5 IE] EIDBQE
De» Kan i“ [3m-
 
 
E Calculator
Edlt View Heb
 
OHu ®Dec One: OBin ®Degees ORafim 0mm
r r
 
 
 
 
 
 
 
Iswl IF-EH [ H 1] [MC] [ 7 H a II a ll / HWHAMI
IdeEwH h] [MR] l '1 H 5 ll 5 H ‘ HDIHMI
IshHWHst [MS] [1 HZII 3” * HMHWI
: lmllmlldl [M H
 
" H'l'H » H ‘ H ' H'ml
mar . E: E a E F
 
 
E Calculator
Edit View Help
 
‘ n
 
DHex ODec ODE! OBh (9wa ODvad OWald OHM
Dim DH» l— l— “E
[5“] m l I n 1 J |ch [ v H a H a II , lelAndl
E] GEEK].-
m E] IIIQEJE]
5 IE] EIDBQE
De» Kan i“ [3m-
 
 
 
Appendix C: Binary to Hexadecimal Conversions
MatchPort® AR Embedded Device Server User Guide 146
Scientific Calculator
Another simple way to convert binary to hexadecimal is to use a scientific calculator, such as the 
one available on the Windows operating systems. For example:
1. On the Windows Start menu, click Programs > Accessories > Calculator.
2. On the View menu, select Scientific. The scientific calculator appears.
3. Click Bin (Binary), and type the number you want to convert. 
4. Click Hex. The hexadecimal value appears. 
 hug. lwww.IamronIx.com/sugpon/warramy/Index.html
hug. lwww.IamronIx.com/sugpon/warramy/Index.html
 
MatchPort® AR Embedded Device Server User Guide 147
Appendix D:  Warranty
For details on the Lantronix® warranty policy, go to our web site at 
http://www.lantronix.com/support/warranty/index.html

MatchPort® AR Embedded Device Server User Guide 148
Index
A
Accept Mode 37
Accept Mode 43
Additional Documentation 15
Additional TCP Server Port 103
Address
Ethernet 20
Hardware 20, 21
IP 20
MAC 20, 21
Advanced Settings
Email Configuration 125
XML Configuration 129
Advanced Settings 124
AES 17
Allow Firmware Update 72
Allow TFTP File Creation 72
Allow XCR Import 72
ARP 17
ARP Settings 110, 111
ASCII 99
Auth Type 78
Authentication Mode 69
Authentication Type 78
Authority 97
AutoIP 17
B
Banner 81
Bar Code 21
Bin 146
Binary 61, 81, 145
Binary to Hexadecimal Conversions 145
Bit 61, 64
Block Network 44, 49
Block Serial 49
Block Serial Data 44
BOOTP 17, 30
Branding 139
Web Manager Customization 139
Break Duration 57
C
Challenge Handshake Authentication Protocol 67
CHAP 67
CLI 18
CLI Configuration 127
CLI Statistics 127
Command Line Interface Settings 127
Command Mode 20
Command-Line Interface 18
Common Name 98
Compliance 143
Configurable Pin Manager 59
Configuration Methods 20
Configuration Settings 66
Configured As 61
Connect Mode 37
Connect Mode 46
Connection Value 45
Convert Newlines 82
Count 117
CP 61
CP Output 45, 49
CPM 59
Create New Keys 92
Create New Self-Signed Certificate 97
Custom Groups 59
D
Default Gateway 31
Default Groups 59
Default Server Port Numbers 20
Device Control 18
Device Details 22
Device Details Summary 22
Device Management 19
Device Status 25
DeviceInstaller 22
DeviceInstaller 22
DHCP 17, 31
Diagnostic Toolset 19
Diagnostics 114
Buffer Pools 120
Hardware 114
IP Sockets 116
Memory 119
MIB-II Statistics 115
Ping 116
Processes 121
Diagnostics Log 118
Diagnostics Settings 104
Disconnect Mode 37
Disconnect Mode 50
Disconnection Value 45
DNS 17, 31
DNS Settings 66

MatchPort® AR Embedded Device Server User Guide 149
E
Echo 56, 57
Email on Connect 45, 49
Email on Disconnect 45, 49
Enable Level Password 128
Encryption 19
End of Job 81
Enterprise-Grade Security 18
EOJ String 82
Ethernet address 20
Evolution OS 17
Evolution OS™ 17
Exit Connect Menu 56, 57
Expires 98
Export Secrets 130
Export to Browser 130, 131
Export to Local File 130, 131
F
File System
Browser 105
Statistics 104
Filename 134, 136
Filesystem 27, 140
Firmware 140
Flush Serial Data 44, 49
Formfeed 82
FTP 17, 140
FTP Configuration 71
G
Groups to Export 130, 131
H
Hardware Address 20, 21
Hardware Address 20
Help Area 26
Hex 146
Hexadecimal 145
Host 48, 106, 117, 118
Host Configuration 57
Host Configuration 57
Host IP Promotion 50
Hostname 31
HTTP 17
Authentication 77
Change Configuration 75
Configuration 74
Statistics 74
I
I/O 61
ICMP 17
ICMP Settings 109
Import Configuration from External File 132
Import Configuration from the Filesystem 133
Import Line(s) from Single Line Settings on the File-
system 135
Inactivity Timeout 128
IP 17
Address 20
Address Filter 112
Settings 108
ISO/IEC Guide 143
K
Key Features 16
Key Length 98
Key Type 85, 86, 92
L
Label 21
Lantronix Discovery Protocol 21
Level 61
Line 1
Configuration 34
Statistics 33
Line Settings 33
Lines to Export 130, 131
Lines to Import 134, 136
Loading New Firmware 140
Local IP Address 68
Local Port 44, 48
Logic 61
Login Connect Menu 56, 57
Login Password 128
Logout 26
LPD
Configuration Page 81
Settings 80
LPD Statistics 80

MatchPort® AR Embedded Device Server User Guide 150
M
MAC Address 20, 21
Maintenance and Diagnostics Settings
Protocol Stack 107
Maintenance Settings 104
Manufacturer’s Name & Address 143
Max Entries 79
Modbus Configuration 103
Modbus Statistics 102
Modbus 99
Modbus_Ctl_In 99
Modbus_Ctl_Out 99
Mode 48
Modem Emulation 18
Modem Emulation 52
MTU 31
Multiple Hosts 50
N
Name 123
NAT 67
Network 1 (eth0) Interface Configuration 30
Network 1 Ethernet Link 32
Network Address Translation 67
Network Settings
Network 1 Interface Configuration 30
Network 1 Interface Status 29
Network Settings 29
New Certificate 97
New Private Key 97
O
Obtaining Firmware 140
Organization Unit 97
P
Packing Mode 41
PAP 67
Password 45, 69, 92
Password Authentication Protocol 67
PBX 19
Peer IP Address 68
Persistent 79
Point-to-Point Protocol 67
Port 106
Port Numbers 20
Ports
Serial and Telnet 20
PPP Peer Device 67
PPP Settings  67
Private Branch Exchange 19
Private Key 85, 86, 92
Product Information Label 21
Product Name Model 143
Product Revision 21
Protocol 44, 58
Protocol Support 17
Public Key 85, 86, 92
Q
Query Port 113
Queue Name 82
Quit Connect Line 128
R
Radiated and Conducted Emissions 143
Read Community 70
Really Simple Syndication 18
Reboot Device 122
Reconnect Timer 49
Ref 61
Remote Address 58
Remote Command 92
Remote Port 58
Response Timeout 103
Restore Factory Defaults 122
RFC1334 67
RoHS Notice 144
RSS 17, 18
RSS Feed 79
RSS Settings 79
RSS Trace Input 103
RTU 99
S
Scientific 146
Scientific Calculator 146
SCPR 19
Secure Com Port Redirector 19
Secure Shell 83
Secure Sockets Layer 83, 93
Security
Enterprise-Grade 18
Settings 83
Security Settings 83
SSL Certificates and Private Keys 94
SSL Cipher Suites 93
SSL RSAor DSA 94
SSL Utilities 95
Send Break 57

MatchPort® AR Embedded Device Server User Guide 151
Send Character 43
Serial Settings 40
Serial Transmission Mode 101
Services Settings 66
CHAP Authentication 67
LPD 80
Short and Long Name Customization 139
SMTP 17
SNMP 17
SNMP Configuration 69
SNMP Management 18
SOJ String 82
SSH 17, 83
Client Known Hosts 90
Server Authorized Users 88
Server Host Keys 84
Settings 83
SSH Client Known Hosts 90
SSH Client User Configuration 91
SSH Max Sessions 128
SSH Port 128
SSH Server Authorized Users 88
SSH Server Host Keys 84
SSH State 128
SSH Username 58
SSL 17, 83, 93
Settings 93
SSL Certificates 94
SSL Cipher Suites 93
SSL Configuration 96
SSL RSA or DSA 94
SSL Utilities 95
Start of Job 81
State 109
Syslog 17
Syslog Configuration 73
System Contact 70
System Description 70
System Location 70
System Name 70
System Settings 122
T
TCP 17
TCP Keep Alive 44
TCP Server State 103
TCP Settings 107
TCP/IP 99
Technical Support 141
Telnet 17
Telnet Max Sessions 128
Telnet Port 128
Telnet State 128
Terminal
Server 19
Settings 55
Terminal Type 56, 57
Text List 134
TFTP 17, 140
TFTP Configuration 72
Threshold 43
Timeout 43, 117
TLS 17
Traceroute 117
Trailing Character 43
Traps Primary Destination 70
Traps Secondary Destination 70
Traps State 70
Troubleshooting 19
Troubleshooting Capabilities 19
Tunnel – Accept Mode 43
Tunnel – Connect Mode 46
Tunnel – Disconnect Mode 50
Tunnel – Packing Mode 41
Tunnel 1 – Statistics 38
Tunnel Settings
Connect Mode 46
Modem Emulation
Command Mode 52
Packing Mode 41
Tunnel Settings  37
Type 98
U
UDP 17
Uniform Resource Identifier 77
Updating Firmware 140
Upload Authority Certificate 97
Upload Certificate 97
Upload New Firmware 123
URI 77
Username 69, 92
W
Web Manager
Device Status Web Page 25
Navigating 27
Page Components 26
Page Summary 27
Web Manager Customization 139
Web Manager 24
Web-Based Configuration 18
Whole Groups to Import 134, 136
WLAN
Products related to this Datasheet
MATCHPORT AR DEVICE SERVER, AES
        
    MATCHPORT AR DEVICE SERVER W/ 8M
        
    MATCHPORT AR DEVICE SERVER SAMPL
        
    MATCHPORT AR DEVICE SERVER W/ 8M
        
    MATCHPORT AR DEVICE SERVER W/ 8M
        
    MATCHPORT AR DEVICE SERVER W/ 8M
        
    