Introduction; Features And Benefits - Siemens RX1500 User Manual

Ruggedcom rox ii series
Hide thumbs Also See for RX1500:
Table of Contents

Advertisement

RUGGEDCOM ROX II
User Guide

Introduction

Welcome to the RUGGEDCOM ROX II (Rugged Operating System on Linux®) v2.6 User Guide for the RX1500.
This document details how to configure the RX1500 via the ROX II Web interface. ROX II also features a
Command Line Interface (CLI), which is described in a separate User Guide.
IMPORTANT!
This User Guide describes all features of ROX II, but some features can only be configured through the
Command Line Interface (CLI). This is indicated throughout the User Guide where applicable.
The following sections provide more detail about ROX II:
Section 1.1, "Features and Benefits"
Section 1.2, "Feature Keys"
Section 1.3, "Security Recommendations"
Section 1.4, "Available Services by Port"
Section 1.5, "User Permissions"
Section 1.1

Features and Benefits

Feature support in ROX II is driven by feature keys that unlock feature levels. For more information about feature
keys, refer to
Section 1.2, "Feature
The following describes the many features available in ROX II and their benefits:
• Cyber Security
Cyber security is an urgent issue in many industries where advanced automation and communications
networks play a crucial role in mission critical applications and where high reliability is of paramount
importance. Key ROX II features that address security issues at the local area network level include:
Passwords
SSH/SSL
Enable/Disable Ports
802.1Q VLAN
SNMPv3
HTTPS
Firewall
VPN/IPSEC
• Enhanced Rapid Spanning Tree Protocol (eRSTP)™
Siemens's eRSTP allows the creation of fault-tolerant ring and mesh Ethernet networks that incorporate
redundant links that are pruned to prevent loops. eRSTP implements both STP and RSTP to promote
Features and Benefits
Keys".
Multi-level user passwords secures against unauthorized configuration
Extends capability of password protection to add encryption of passwords and data as
they cross the network
Capability to disable ports so that traffic cannot pass
Provides the ability to logically segregate traffic between predefined ports on switches
Encrypted authentication and access security
For secure access to the Web interface
Integrated stateful firewall provides protected network zones
Allows creation of secure encrypted and authenticated tunnels
Chapter 1
Introduction
1

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Rx1501Rx1510Rx1511Rx1512

Table of Contents