8.4 Remote SSH Access
SSH service
Introduction
SSH authentication
Enabling the Secure
Shell
E-DOC-CTC-20051017-0155 v1.0
SSH (Secure Shell) is to be used to establish privacy between 2 network devices. It
provides a secured layer on top of TCP/IP.
The implementation of SSH in the SpeedTouch™ is mainly targeted to allow privacy
for CLI sessions when remotely managing the SpeedTouch™ from a WAN interface.
The SpeedTouch™ supports the following authentication methods:
password
publickey
The user can configure the authentication to be used during SSH session setup, this
can be done by executing the following CLI command:
=>:ssh config auth=password
By choosing 'password', authentication is based on username / password.
By choosing 'public_key', authentication is based on public key, searching in the
database of installed public keys on the SpeedTouch™.
The Secure Shell service can be enabled by executing the following CLI command:
=>:ssh config shell=enabled
Password Authentication
Public Key Based Authentication
Chapter 8
SpeedTouch™ Remote Access
91