User Manual

iv - Table of Contents DeviceMaster Installation and Configuration Guide: 2000594 Rev. A
Table of Contents
Device Driver (NS-Link) Installation ..............................................................................51
Overview........................................................................................................................................................ 51
Before Installing the NS-Link Driver...................................................................................................... 51
Linux Installations ...................................................................................................................................... 52
Windows Installations ................................................................................................................................ 53
Supported Operating Systems ................................................................................................................. 53
Installation Overview for Windows ......................................................................................................... 53
NS-Link for Windows Installation........................................................................................................... 53
Configuring the NS-Link Driver for Windows......................................................................................58
Configuring COM Port Properties for Windows .................................................................................. 61
Enabling Secure Data Mode...................................................................................................................... 62
Socket Port Configuration .................................................................................................65
SocketServer Overview.............................................................................................................................. 65
Web Page Help System............................................................................................................................. 65
SocketServer Architecture ....................................................................................................................... 66
Accessing Socket Configuration .............................................................................................................. 67
Web Browser ............................................................................................................................................. 67
PortVision DX ........................................................................................................................................... 67
SocketServer Versions ............................................................................................................................... 68
DeviceMaster Security........................................................................................................69
Understanding Security Methods and Terminology........................................................................... 69
TCP and UDP Socket Ports Used by the DeviceMaster ..................................................................... 74
DeviceMaster Security Features.............................................................................................................. 75
Security Modes.......................................................................................................................................... 75
Secure Data Mode and Secure Config Mode Comparison ...................................................................... 76
Security Comparison ................................................................................................................................ 77
SSH Server................................................................................................................................................ 77
SSL Overview............................................................................................................................................ 78
SSL Authentication .................................................................................................................................. 78
Server Authentication........................................................................................................................ 78
Client Authentication ......................................................................................................................... 79
Certificates and Keys ......................................................................................................................... 79
SSL Performance ...................................................................................................................................... 80
SSL Cipher Suites..................................................................................................................................... 81
DeviceMaster Supported Cipher Suites .................................................................................................. 81
SSL Resources .................................................................................................................................... 82
Configure/Enable Security Features Overview ................................................................................... 83
Example 1.................................................................................................................................................. 85
Example 2.................................................................................................................................................. 85
Example 3.................................................................................................................................................. 86
Key and Certificate Management............................................................................................................ 86
Using a Web Browser to Set Security Features....................................................................................88
Changing Security Configuration ............................................................................................................ 88
Changing Keys and Certificates .............................................................................................................. 89