Partner Name Lantronix
Web Site
Product Name LRS1, LRS2, LRS16, LRS32F
Version & Platform
Product Description Lantronix's LRS line of Remote Access Servers provide
Product Category Remote access server
Last Modified 12/20/99
www.lantronix.com
secure access for Dial-in, Dial-out, LAN-to-LAN,
Console Server and ISP connections. An ideal choice
for secure connectivity, all LRS models support PPP
(PAP/CHAP), SLIP/CSLIP, SecurID, Radius, Kerberos,
Unix, NetWare and local users database for
authentication on both inbound and outbound
connections. All LRS products support dial-back,
Network Address Translation (NAT), routing of TCP/IP,
IPX, and AppleTalk protocols is supported using RIP
and static routes.
1
RSA SecurID Ready Implementation Guide
2. Contact Information
Pre-Sales Post-Sales
Name Sales Technical Support
E-mail
Phone 1-800-422-7055 1-800-422-7044
Web
PAP/CHAP (PPP)
Dial Back
Kerberos Authentication Support
SecurID Authentication Support
Radius Authentication Support
Routing Firewall
Local Users Database
New PIN support All
Next tokencode support Yes
Secondary server support Slave ACE/Server
Location of node secret on client None stored
ACE/Server client definition type Communication Server
SecurID user specification Designated users
SecurID protection of administrators Yes
2
RSA SecurID Ready Implementation Guide
4. Product Specifications
ROUTING PROTOCOLS
SERIAL INTERFACES
ETHERNET INTERFACES
TCP/IP (RIP and Static Routing)
IPX (RIP/SAP and Static Route)
- 16 RJ45 (RS232C / RS423) serial ports support up to 115Kbps
LRS32F
- 32 RJ45 (RS232C / RS423) serial ports support up to 230Kbps
All supporting full modem control, V.90, ISDN modems and
asynchronous CSU/DSUs.
LRS1
- RJ45 (10BASE-T)
LRS2, LRS16
- AUI, RJ45 (10BASE-T), BNC (10BASE2)
LRS32F
- 10/100 (BASE-T), AUI, BNC (10BASE2)
MODEM SHARING
REMOTE ROUTING
FUNCTIONALITY
REMOTE NODE
FUNCTIONALITY
PRINT & TERMINAL
SERVER FUNCTIONALITY
IP hosts
IPX hosts
Free Lantronix Comm Port Redirector Software Supporting:
Windows 95/98, Windows NT, Windows 3.11, DOS. Supports 16and 32-bit applications
Dial-on-Demand Routing
Link Management Features
IPX Protocol Spoofing
Link Timeout Function
Packet Filtering
Support for all PPP-based Client Software including Windows
95/98 & Windows NT DUN
IPX (Novell NetWare) TCP/IP (Unix)
3
RSA SecurID Ready Implementation Guide
5. Product’s ACE/Agent configuration
The LRS supports the ACE/Server security system manufactured by RSA Security Inc.
ACE/Server is a system of client-server sof tware and accompanying token cards.
Note: Refer to your RSA Security document ation for ACE/Server
installation instructions.
The SecurID card generates sing le- use, unpredictable numerical codes. These
"tokencodes," toget her with the user's PIN, form t he basis of the SecurID authentication.
The PIN and generated tok encode ar e referred to collectively as SecurID PASSCODES.
To gain access to a network protect ed by SecurID, both elements of the PASSCODE
must be entered correctly.
The RSA Security SecurID system requires certain communication between the
ACE/Server and the end-user. For example, the user m u st ent er a new PIN when a
SecurID card is first used, and a second PASSCO DE when locked out .
PAP does not allow for these types of messages or additional user input. Therefore, it is
strongly recommended that SecurID be run from character mode only. It is possible to
use SecurID with PAP, provided that situations like those m entioned above are either
prevented or handled in text mode on the next call.
To log into the LRS, the user m ust ent er a username at the username prompt, and the
PASSCODE at the password prompt.
To specify the SecurID ACE/Server for authentication of usernam e/ PASSCODE, use
the Set/Define Authentication Secur ID command:
After SecurID is conf igured on the LRS, the LRS will receive further configuration
information fr om t he ACE/Server. However, this only happens the first time t hat the LRS
and ACE/Server communicate. If you purge the authentication information on the LRS
or change the precedence of SecurI D, this learned information will be lost. You will need
to have your ACE/Server administrator reinit ialize the LRS with ACE/Server for SecurID
to function properly again.
If SecurID receives repeated authent icat ion r equests for an invalid username/password
pair, it assumes that a login att ack is taking place. SecurID will react by continually
slowing its responses to the LRS. This problem can be avoided by ensuring t hat
SecurID has the highest precedence number. For example, if you're using SecurID,
Kerberos, and a UNIX password file, set Secur I D's precedence to 3.
4
RSA SecurID Ready Implementation Guide
Set/Define Authentication SecurID
Specifies that a Security Dynamics ACE/SecurID server will be used f or aut hentication.
Restrictions
You must be the privileged user to use this command.
Parameters
Primary
Specifies the first database or server to be checked. A specific address may be
set with the address parameter, or the None param et er may be used to indicate
that the database or file will not be used.
Secondary
If the LRS fails to aut henticate the user using the primary database or ser ver
(due to network failure, server failure, missing or incorrect user nam e/ password),
the secondary database or server will be checked. A specific address may be set
with the address parameter, or the None paramet er m ay be used to indicat e that
the server will not be used.
If the user cannot be authenticat ed using the secondary database or server, the
database or server with the next precedence level will be checked. If all
precedence levels fail to authenticate the user, t he user is pr evented from
logging in.
address
A text host name (if a DNS is available for nam e r esolution) or an IP address in
standard numeric format ( for example, 193.23.71.49).
None
Clears the current server address.
5
RSA SecurID Ready Implementation Guide
Precedence
Set the precedence in which this database or server is checked. The precedence
number must be specified using the prec_num parameter.
prec_num
A precedence number between 1 and 6.
Encryption
SecurID (SID) or DES encryption will be used for aut hent ication.
SID
Enables use of SecurID encryption.
DES
Enables use of DES encryption.
Maxtries
Specifies the maximum number of t im es the LRS will attempt to contact the
SecurID server. Must be used in conjunction with the tries parameter.
tries
An integer between 1 and 255, inclusive.
Port
Specifies the UDP/IP Port number used t o communicate with the primary and
secondary SecurID servers. Must be used in conjunction with the PortNum
parameter.
PortNum
An integer between 1 and 65535.
Timeout
Specifies the timeout period f or a response from the SecurID server.Must be
used in conjunction with the seconds parameter.