
ADAM-4570/4571 & EDG-4504 User Manual 6
Chapter 2 Getting Started
In this chapter, you will be given an overview of the EDG series hardware
installation procedures.
2.1 Understanding the Advantech EDG Series
The EDG series is an advanced data gateway unit. It extends traditional
COM ports of a PC with access over a TCP/IP network. Through net-
working, you can control and monitor remote serial devices either over a
LAN or over the WAN.Since the EDG series is connected through a TCP/
IP network, you will need to know some basic facts about networking in
order to get the server hooked up correctly.
2.1.1 Network Architecture
Traditional serial port communication uses a COM port board that slides
into one of the slots at the back of your PC. In this case, only the com-
puter containing the board can access the serial port. With the EDG
series, you are now able to access the COM port from a distance through
local area network. The EDG series can be integrated within the network
architecture of any protocol. Note, all serial devices which are connected
to the port must have the same protocol running and the same trans- mis-
sion speed. Connect devices running different protocols to different ports
of the EDG series.
2.1.2 Secure Communication
Advanced multiple security features protect the system and make data
more private and secure. The ADAM-4570S/4571S guards your network
and data by multiple security protections: T-DES (Triple Data Encryption
Standard, which is specified in FIPS PUB 46-2 and American National
Standard X9.25) strong encryption, PKCS#5 (Password-based Crypto-
graphic Standard #5), and IP address authorization.
We apply T-DES using three blocks (8 bytes for each block) for plain text
3-time calculation and PKCS#7 for data padding when block of the plain
text isn’t enough for 8 bytes. We apply PKCS#5 algorithm to turn user-
defined password into a unique key by means of a hash algorithm. Users
only need to specify a pass- word when configuring ADAM-4570S/
4571S in utility. This prevents important data from being accessed by
unauthorized users.
Comentarios a estos manuales