EasyManuals Logo

Opengear ACM7000 User Manual

Opengear ACM7000
246 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #18 background imageLoading...
Page #18 background image
Chapter 2: System Configuration
18
You can allow serial port devices to be accessed from nominated network interfaces using Raw
TCP, direct Telnet/SSH, unauthenticated Telnet/SSH services, etc.
4. Click Apply
Web Management Settings
The Enable HSTS checkbox enables strict HTTP strict transport security. HSTS mode means that a Strict-
Transport-Security header should be sent over HTTPS transport. A compliant web browser remembers
this header, and when asked to contact the same host over HTTP (plain) it will automatically switch to
HTTPS before attempting HTTP, as long as the browser has accessed the secure site once and seen the
S-T-S header.
Brute Force Protection
Brute force protection (Micro Fail2ban) temporarily blocks source IPs that show malicious signs, such as
too many password failures. This may help when the device’s network services are exposed to an
untrusted network such as the public WAN and scripted attacks or software worms are attempting to
guess (brute force) user credentials and gain unauthorized access.
Brute Force Protection may be enabled for the listed services. By default, once protection is enabled 3 or
more failed connection attempts within 60 seconds from a specific source IP trigger it to be banned from
connecting for a configurable time period. Attempt limit and Ban timeout may be customized. Active Bans
are also listed and may be refreshed by reloading the page.
NOTE When running on an untrusted network, consider using a variety of strategies are used to lock
down remote access. This includes SSH public key authentication, VPN, and Firewall Rules to
whitelist remote access from trusted source networks only. See the Opengear Knowledge Base
for details.
2.5 Communications Software
You have configured access protocols for the administrator client to use when connecting to the console
server. User clients also use these protocols when accessing console server serial attached devices and
network attached hosts. You need communications software tools set up on the administrator and user
client’s computer. Opengear provides the SDT Connector as the recommended client software tool. You
may use other tools such as PuTTY and SSHTerm.
SDT Connector is a lightweight tool that enables users to securely access the Console server and various
computers, network devices, and appliances that are serially or network connected to the console server.

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Opengear ACM7000 and is the answer not in the manual?

Opengear ACM7000 Specifications

General IconGeneral
RS-232 ports8
SIM card slotYes
USB 2.0 ports quantity4
Number of simultaneous SIM cards2
CertificationEN 55022:2010, CISPR 22:2008, FCC Part 15 B:2015, ICES-003 5 (2014), AS/NZS CISPR 22:2009+A1:2010, EN 61000-3-2:2006/A2:2009, EN 61000-3-3:2008 EN 55024:2010, CISPR 24:2010, EN 61000-4-2:2009, EN 61000-4-3:2006+A2:2010, EN 61000-4-4:2004+A1:2010, EN 61000-4-5:2006, EN 61000-4-6:2009, EN 61000-4-8:2010, EN 61000-4-11:2004 CE, UL 1950, TUV, C-Tick, RoHS
Mounting typeRack mounting
Product colorBlack, Red
Antenna connector typeSMA
Flash memory32 MB
Internal memory256 MB
Processor frequency800 MHz
Control display unitNo
Internal memory typeDDR3
Input voltage110 - 240 V
DC input voltage12 V
Storage temperature (T-T)-40 - 75 °C
Operating temperature (T-T)-25 - 60 °C
Operating relative humidity (H-H)5 - 90 %
Security algorithmsIPSec, SSH-2, SSL/TLS
Weight and Dimensions IconWeight and Dimensions
Depth120 mm
Width130 mm
Height35 mm
Weight6000 g

Related product manuals